0201707195.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Hypothesis-Based Approach to Digital Forensic Investigations (Brian D. Carrier)
CERIAS Tech Report 2006-06 A HYPOTHESIS-BASED APPROACH TO DIGITAL FORENSIC INVESTIGATIONS by Brian D. Carrier Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086 A HYPOTHESIS-BASED APPROACH TO DIGITAL FORENSIC INVESTIGATIONS A Thesis Submitted to the Faculty of Purdue University by Brian D. Carrier In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2006 Purdue University West Lafayette, Indiana ii To my parents, Gerry and Suzanne. iii ACKNOWLEDGMENTS I would first like to thank my advisor, Eugene Spafford (spaf). His advice and guidance helped to shape and direct this work. I would also like to thank my com- mittee for their helpful ideas and comments: Cristina Nita-Rotaru, Sunil Prabhakar, Marc Rogers, and Sujeet Shenoi (University of Tulsa). The Center for Education and Research in Information Assurance and Security (CERIAS) provided me with a great environment and the resources needed to complete this work and my appreciation goes to the faculty and staff. Thanks to the many people in the digital forensics community that have assisted me over the years. Special thanks to Dan Kalil, Chet Maciag, Gary Palmer, and others at the Air Force Research Labs for the creation of the annual Digital Foren- sic Research Workshop (DFRWS). This work is based on concepts from the initial DFRWS Research Roadmap and the framework discussions at DFRWS 2004 helped to direct this work. Simson Garfinkel provided many helpful comments during his review of this document. Lastly, thanks to my family. My parents have always supported my endeavors (and gently guided me towards a degree in engineering instead of one in music). -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
List of TCP and UDP Port Numbers - Wikipedia, the Free Encyclopedia List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
8/21/2014 List of TCP and UDP port numbers - Wikipedia, the free encyclopedia List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) which needed two ports for half duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for bidirectional traffic. The even numbered ports were not used, and this resulted in some even numbers in the well-known port number range being unassigned. The Stream Control Transmission Protocol (SCTP) and the Datagram Congestion Control Protocol (DCCP) also use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Use Description Color Official Port is registered with IANA for the application[1] White Unofficial Port is not registered with IANA for the application Blue Multiple use Multiple applications are known to use this port. Yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[2] They are used by system processes that provide widely used types of network services. -
CERIAS Tech Report 2004-26 a CATEGORIZATION OF
CERIAS Tech Report 2004-26 A CATEGORIZATION OF COMPUTER SECURITY MONITORING SYSTEMS AND THE IMPACT ON THE DESIGN OF AUDIT SOURCES by Benjamin A. Kuperman Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086 A CATEGORIZATION OF COMPUTER SECURITY MONITORING SYSTEMS AND THE IMPACT ON THE DESIGN OF AUDIT SOURCES A Thesis Submitted to the Faculty of Purdue University by Benjamin A. Kuperman In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2004 ii ACKNOWLEDGMENTS There are a number of individuals and organizations that I would like to recognize for their assistance and support throughout the many years of my graduate career. First, I would like to note that portions of this work were supported by a gift from the Intel Corporations, Grant EIA-9903545 from the National Science Foundation, and the sponsors of the Purdue Center for Education and Research in Information Assurance and Security. I would like to personally thank the various sponsors of COAST and CERIAS for both their financial and intellectual support. Many of the opportunities I have had to research computer security would not have been possible without you. I would like to especially thank Hewlett-Packard Corporation including Mark Crosbie, John Trudeau, and Martin Sadler for a wonderful and productive internship and continuing relationship over the years. I would also like to thank my committee for all of their input, feedback, and support, especially my advisor Gene Spafford. Without his assistance and the op- portunities he has made available, I doubt I would be where I am today. -
Redmondmag.Com Group Policy Grows with Windows
0506red_cover.v6 4/18/06 1:31 PM Page 1 AttackAttack ofof thethe Ball-PointBall-Point PensPens 6161 MAY 2006 WWW.REDMONDMAG.COM New Admin Features Are Tough to Beat page 29 > $5.95 05 • MAY Readers’ Choice Awards Apps To Go: 20 Programs Nobody Does It Better 38 That Fit on Your Keychain 53 25274 867 27 71 Project1 4/11/06 3:14 PM Page 1 8)&/ %*4"45&3 i)FMMP IFMQEFTL w 453*,&4 3&"$) '03 "%.*/*453"5034 1", 3FQBJS BO VOCPPUBCMF TZTUFN $IBOHF B MPTU "ENJOJTUSBUPS QBTTXPSE 3FDPWFS EFMFUFE PS MPTU EBUB %JBHOPTF TZTUFN BOE OFUXPSL JTTVFT 3FNPWF NBMXBSF XIJMF B TZTUFN JT PGnJOF #VZ POF "ENJOJTUSBUPST 1BL BOE HFU B TFDPOE GPS 4FFCBDLGPS EFUBJMT '3&& &WBM 8JOUFSOBMTDPN#VZ(FU Project1 4/11/06 3:15 PM Page 2 #VZ POF "ENJOJTUSBUPST 1BL BU MJTU QSJDF BOE HFU B TFDPOE DPQZ GPS POMZ 5XJDF UIF QSPUFDUJPO " GSBDUJPO PG UIF DPTU 5IF5PQ5FO5PPMT"CTPMVUFMZ&WFSZ"ENJOJTUSBUPS/FFET SBUPST 1BL MJTU QSJDF JT $FSUBJO &3%$PNNBOEFS 'JMFNPO #PPUBEFBETZTUFNGSPN$%JOUPBGBNJMJBS8JO 7JFX SFBMUJNF SFQPSUT PG BMM mMF TZTUFN EPXTMJLF SFQBJS FOWJSPONFOU BDUJWJUZ PO B TZTUFN FDUJWF PXOFST JO UIF 64 BOEPS PUIFS DPVOUSJFT 8JOUFSOBMT $SBTI"OBMZ[FS8J[BSE 3FHNPO 1JOQPJOU UIF DBVTF PG TZTUFN DSBTIFT TP UIBU ZPV DBO 7JFX SFBMUJNF SFQPSUT PG BMM SFHJTUSZ BDUJWJUZ PO B NBLF SBQJE SFQBJST TZTUFN 3FNPUF3FDPWFS *OTJHIUGPS"DUJWF%JSFDUPSZ 3FNPUFMZ BDDFTT BO VOCPPUBCMF TZTUFN UP NBLF 7JFX SFBMUJNF SFQPSUT PG BMM -%"1 USBGmD PO B TZTUFN SFQBJST /5'4%041SPGFTTJPOBM "%&YQMPSFS "DDFTT /5'4 WPMVNFT GSPN %04 &YQMPSF UIF "% TUSVDUVSF UP mOE BOE NPEJGZ PCKFDUT BOE UIFJS BUUSJCVUFT 'JMF3FTUPSF -
Session Learning and Teaching Methods, E-Learning + Educational Tools, and Related Issues
Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 | 1 SESSION LEARNING AND TEACHING METHODS, E-LEARNING + EDUCATIONAL TOOLS, AND RELATED ISSUES Chair(s) TBA Copyright © 2014 CSREA Press, ISBN: 1-60132-268-2; Printed in the United States of America 2 Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 | Copyright © 2014 CSREA Press, ISBN: 1-60132-268-2; Printed in the United States of America Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 | 3 Students’ Perception towards Soft CLIL in the Basque Secondary Schools Chiharu Nakanishi1 and Hodaka Nakanishi2 1Music Department, Kunitachi College of Music, Tachikawa, Tokyo, Japan 2Joint Program Center, Teikyo University, Itabashi-ku, Tokyo, Japan language. Each is interwoven, even if the emphasis is greater Abstract - The Basque Autonomous Community, which is a on one or the other in a given time (p.1) [1].” bilingual community of Basque and Spanish, has adopted As CLIL is an innovative approach, well-devised CLIL as a method to teach English as a foreign language materials are to be developed. In order to meet the needs for with on-line materials as well as written materials. The object teachers who want to implement CLIL in their classroom, of this study is to investigate how the students think about several materials are provided on-line such as E-CLIL by studying subjects in English, in the form of Soft CLIL European Resource Centre and EKI project in Basque whose (language-driven) in the Basque-medium school. The materials are used in the schools we observed. -
Symantec 2006 Analyst Day
Symantec 2006 Analyst Day May 31, 2006 Welcome Helyn Corcos Vice President Investor Relations Forward Looking Statements This presentation contains forward-looking statements regarding our financial and business results, including statements relating to projections of future revenue and earnings per share, and projections of deferred revenue, amortization of acquisition-related intangibles and deferred compensation changes. Such forward-looking statements involve known and unknown risks, uncertainties and other factors that may cause our actual results, levels of activity, performance or achievements to differ materially from results expressed in or implied by this presentation, including, among others: whether we can successfully develop new products and the degree to which these gain market acceptance; the sustainability of recent growth rates, particularly in consumer products; the anticipation of the growth of certain market segments; the positioning of our products in those segments; the competitive environment in the software industry; general market conditions; acquisition-related risks; fluctuations in currency exchange rates; and changes to operating systems and product strategy by vendors of operating systems Additional information concerning these and other risk factors is contained in the Risk Factors section of our Form 10-Q for the quarter ended December 31, 2005 We assume no obligation to update any forward-looking information contained in this presentation Symantec 2006 Analyst Day GAAP to Non-GAAP Reconciliation In addition -
Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide
Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.2 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2007 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™, -
Veritas Backup Reporter 6.5 Administrator's Guide Veritas Backup Reporter Administrator's Guide
Veritas Backup Reporter 6.5 Administrator's Guide Veritas Backup Reporter Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm -
Solutions. Services. Response
symantec corporation 2001 annual report Solutions. Services. Response. 2001 annual report 20330 Stevens Creek Blvd. Cupertino, CA 95014 USA www.symantec.com corporate directory Board of Directors Executive Officers Other Senior Executives Tania Amochaev John W. Thompson Cress Carter Chairman of the Executive Committee, Chairman of the Board, President and Vice President, Global Enterprise QRS Corporation (retired) Chief Executive Officer Marketing Charles M. Boesenberg Art Courville Rob Clyde President, Senior Vice President, General Counsel Vice President, Chief Technical Officer Post PC Ventures and Secretary John Holland Dr. Per-Kristian Halvorsen Stephen G. Cullen Vice President, Worldwide Security Services Center Director, Solutions & Services Senior Vice President, Consumer Products Technologies Center, Hewlett-Packard Steve Messick Laboratories Don Frischmann Vice President, North America Senior Vice President, Communications Enterprise Sales Robert S. Miller and Brand Management Chairman of the Board, Federal Mogul Akihiko Narita Corporation Dieter Giesbrecht President SKK and Vice President, Japan Senior Vice President, World Wide Bill Owens Sales and Services Cecil Perez Co-Chief Executive Officer and Vice Vice President, Latin America Chairman, Teledesic LLC Gail E. Hamilton Executive Vice President, Product, Allyson Seelinger George Reyes Delivery and Response Vice President, Consumer Sales Vice President and Treasurer, Sun Microsystems Greg Myers Garry Sexton Senior Vice President, Finance and Chief Vice President, Asia Pacific -
Contents Years, a Majority of IT Security Pros the Judges
2013 SC Awards U.S. Optimistic despite threats When it comes to data protection and risk management planning, informa- tion security professionals are feeling more hopeful than ever. According to our annual “Guarding Against a Data Breach” survey, compared to previous Contents years, a majority of IT security pros The Judges .............................................................................. 54 say their organizations are taking ap- The Sponsors .......................................................................... 55 propriate steps to protect critical data. Word from the co-chair ........................................................... 56 As promising as this feedback is, one has to juxtapose it against the less Reader Trust Awards upbeat happenings of our collective Best Anti-Malware Gateway ................................................... 56 reality. For starters, advanced persistent threats (APTs) and Best Cloud Computing Security ............................................ 57 other more methodical and sophisticated cyber crime attacks Best Computer Forensic Tool ................................................. 57 Best Data Leakage Prevention (DLP) .................................... 58 are becoming the norm, according to most experts. Just look to Best Database Security Solution .......................................... 58 the recent attacks against The New York Times, Twitter or the Best Email Security Solution .................................................. 59 U.S. Department of Energy to get a sense -
Imagine the Possibilities
2003 ANNUAL REPORT IMAGINE THE POSSIBILITIES Company Profile Symantec, the world leader in Internet security technology, provides a broad range of content and network security software and appliance solutions to individuals, enterprises, and service providers. The company is a leading provider of client, gateway, and server security solutions for virus protection, firewall and virtual private network, vulnerability management, intrusion detection, Internet content and email filtering, remote management tech- nologies, and security services to enterprises and service providers around the world. Symantec’s Norton brand of consumer security products is a leader in worldwide retail sales and industry awards. Headquartered in Cupertino, Calif., Symantec has worldwide operations in 36 countries. For more information, please visit www.symantec.com. Financial Highlights Fiscal Year Ended (IN MILLIONS, EXCEPT PER SHARE AMOUNTS) 2003 2002 2001 Reported: Revenues $1,407 $1,071 $854 Operating income $342 $8 $110 Net income (loss) $248 ($28) $64 Diluted earnings (loss) per share $1.54 ($0.20) $0.47 Adjusted:* Operating income $390 $258 $215 Net income $280 $201 $184 Diluted earnings per share $1.72 $1.30 $1.17 Reconciliation: Axent net loss n/a n/a $6 Cost of sales – amortization of other intangibles ($30) ($30) ($16) Operating expenses – amortization of goodwill and other intangibles, acquired in-process R&D, and restructuring and site closures ($19) ($219) ($99) Other expense n/a n/a ($24) Income tax benefit $17 $20 $13 Other Information: Cash flow from operations $584 $511 $325 Total assets $3,266 $2,503 $1,792 Stockholders’ equity $1,764 $1,320 $1,377 Employees 4,344 3,910 3,781 *In addition to reporting financial results in accordance with generally accepted accounting principles, or GAAP, we include non-GAAP financial results in our earnings releases and presentations to investors.