Cisco Firepower Application Detector Reference - VDB 307

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Firepower Application Detector Reference - VDB 307 Cisco Firepower Application Detector Reference - VDB 307 First Published: 2018-12-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2018 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for Cisco Vulnerability Database (VDB) Update 307 1 About the Cisco Vulnerability Database 2 About the Cisco Firepower Application Detector Reference 3 Supported Platforms and Software Versions 4 Supported Detector Types 5 Total Applications Supported in Vulnerability Database Update 307 6 Vulnerability Database Update 307 Changelog 7 For Assistance 10 About Talos 11 CHAPTER 2 Applications: 0-9 13 050plus 15 1&1 Internet 16 1-800-Flowers 17 1000mercis 18 100Bao 19 12306.cn 20 123Movies 21 126.com 22 17173.com 23 1fichier 24 2345.com 25 24/7 Media 26 247 Inc. 27 2channel 28 2Leep 29 Cisco Firepower Application Detector Reference - VDB 307 iii Contents 33Across 30 360 Safeguard 31 39.net 32 3Com AMP3 33 3COM-TSMUX 34 4399.com 35 4chan 36 4shared 37 500px 38 51.com 39 56.com 40 58 City 41 5by5 Radio 42 6.pm 43 7digital 44 914CG 45 9Gag 46 9P 47 9p.com 48 CHAPTER 3 Applications: A 49 ABC 56 Abonti 57 About.com 58 ABS-CBN 59 ACA Services 60 ACAP 61 Access Network 62 AccessBuilder 63 AccuWeather 64 Ace Hardware Corporation 65 Acer 66 AcFun 67 ACI 68 Cisco Firepower Application Detector Reference - VDB 307 iv Contents Acoon.de 69 ACR-NEMA 70 Acrobat.com 71 Active Networks 72 ActiveSync 73 Ad Advisor 74 AD Backup 75 AD DRS 76 AD DSAOP 77 AD DSROL 78 AD File Replication Service 79 Ad Marvel 80 Ad Master 81 Ad Mob 82 Ad Nexus 83 AD NSP 84 Ad Redirector 85 AD Restore 86 Ad Tech 87 AD XDS 88 AD-X Tracking 89 Ad4mat 90 Adap.tv 91 Adaptive Receive Node Scheduling 92 Adblade 93 Adcash 94 Adconion Media Group 95 Addicting Games 96 Addictive Mobility 97 AddThis 98 AddThis Bot 99 AddToAny 100 AdF.ly 101 AdGear 102 Cisco Firepower Application Detector Reference - VDB 307 v Contents Adify 103 AdJuggler 104 Admeld 105 ADMETA 106 Admin5 107 AdNetwork.net 108 ADNStream 109 Ado Tube 110 Adobe Analytics 111 Adobe Connect 112 Adobe Creative Cloud 113 Adobe PostScript 114 Adobe Software 115 AdobeAIR 116 Adorama 117 ADP 118 ADP GlobalView 119 ADP Resource 120 ADP Streamline 121 ADP TotalSource 122 ADP Vantage 123 ADP Workforce Now 124 AdReady 125 ADrive 126 AdRoll 127 adSage 128 AdSame 129 Adtech 130 Adtegrity 131 Adult Friend Finder 132 Adult World 133 Advanced Hosters 134 Advanced Packaging Tool 135 Advertising.com 136 Cisco Firepower Application Detector Reference - VDB 307 vi Contents Adweek 137 AdXpose 138 AED512 139 Aeolon Core Protocol 140 AEP 141 AFP 142 Afreeca 143 After School 144 AgentX 145 Aggregate Knowledge 146 AhrefsBot 147 Aili 148 AIM Express 149 Airbnb 150 AirPlay 151 Airsoft Powerburst 152 Airspace 153 Airtime 154 AirTunes 155 Aizhan 156 AJP 157 Akamai 158 Akamai NetSession Interface 159 Al Jazeera 160 Albawaba 161 Alias 162 Alibaba 163 Aliexpress 164 Alipay 165 Alisoft 166 Aliwangwang 167 Aliyun 168 Allegro.pl 169 Allmyapps 170 Cisco Firepower Application Detector Reference - VDB 307 vii Contents AllRecipes 171 Allstate 172 ALPES 173 ALTools 174 AMANDA 175 Amazon 176 Amazon Ads System 177 Amazon Cloud Drive 178 Amazon Cloud Drive Authenticate 179 Amazon Cloud Drive Download 180 Amazon Cloud Drive Upload 181 Amazon Cloud Player 182 Amazon Instant Video 183 Amazon Unbox 184 Amazon Web Services 185 AMD 186 Ameba 187 American Airlines 188 American Express 189 AMInet 190 AMMYY 191 Amobee 192 AMQP 193 AMQPS 194 Ancestry.com 195 Ando Media 196 Android Asynchronous Http Client 197 Android browser 198 Android Client 199 Android Download Manager 200 Android Music 201 Android.com 202 ANET 203 Anghami 204 Cisco Firepower Application Detector Reference - VDB 307 viii Contents Angry Birds 205 Anipang 206 ANSA Notify 207 ANSA REX Trader 208 ANSI Z39.50 209 Answers.com 210 any host 211 AnyConnect 212 AnyConnect IPSec Client 213 AnyConnect SSL Client 214 AnyDesk 215 AODV 216 AOL 217 AOL Ads 218 AOL Games 219 AOL Instant Messenger 220 AOL Instant Messenger Netscape 221 AOL Mail 222 AOL Video 223 Apache Nutch 224 Apertus Tech Load Distribution 225 APNS 226 AppGlu 227 Apple App Store 228 Apple Developer 229 Apple iForgot 230 Apple Mail 231 Apple Maps 232 Apple Mobile Yahoo API 233 Apple Pipeline 234 Apple PubSub 235 Apple Remote Desktop 236 Apple sites 237 Apple Stocks 238 Cisco Firepower Application Detector Reference - VDB 307 ix Contents Apple Store 239 Apple Syndication 240 Apple Trailers 241 Apple TV 242 Apple Update 243 AppleCoreMedia 244 Applejuice 245 Applejuice GUI 246 appleqtcsrvr 247 AppleShare 248 AppleTalk Routing Maintenance 249 AppleTalk Unused 203 250 AppleTalk Unused 205 251 AppleTalk Unused 207 252 AppleTalk Unused 208 253 AppleTalk Zone Information Protocol 254 ApplianceWare Managment Protocol 255 Applix ac 256 AppNeta 257 AppNexus 258 Aptean 259 ArcGIS 260 ARCISDMS 261 ARCServe 262 Ares 263 Argos 264 Argus 265 Ariel 266 Ariel2 267 Ariel3 268 ARIS 269 Arizona Public Media 270 ARNS 271 Arora 272 Cisco Firepower Application Detector Reference - VDB 307 x Contents ArtStack 273 AS Server Mapper 274 ASA 275 asa-appl-proto 276 Asana 277 ASF 278 Asia Times Online 279 Asipregistry 280 Ask.com 281 ASKfm 282 asos 283 ASProxy 284 Associated Press 285 Asterisk PBX 286 Astraweb 287 Asus 288 AT&T 289 ATEXSSTR 290 ATG Live Help 291 ATI Technologies 292 Atlas Advertiser Suite 293 Atlassian 294 Atom 295 Atom.com 296 Audible.com 297 AudienceScience 298 AudioDocumentary.org 299 AUDIT 300 auditd 301 Auditude 302 Aurora 303 Aurora CMGR 304 AURP 305 Authentication Service 306 Cisco Firepower Application Detector Reference - VDB 307 xi Contents Autoblog 307 Autodesk 308 Autohome.com.cn 309 AutoTrader.com 310 AutoZone 311 Avast 312 Avaya 313 Avaya Audio 314 Avaya Live 315 Avaya Video 316 AVG 317 Avian 318 Avira Download/Update 319 Avito 320 Avocarrot 321 Avocent 322 Avoidr 323 Aweber 324 AX.25 325 Azar Live 326 AZLyrics 327 Azure cloud portal 328 CHAPTER 4 Applications: B 329 B&H Photo Video 334 Babelgum 335 Babylon 336 Babytree 337 Backblaze 338 Backpack 339 Backpage.com 340 Backupgrid 341 BackWeb 342 BACnet 343 Cisco Firepower Application Detector Reference - VDB 307 xii Contents Badoo 344 Baidu 345 Baidu Movies 346 Baidu Yun 347 BaiduHi 348 Baiduspider 349 Baike.com 350 Balatarin 351 Bandcamp 352 Bank of America 353 Banyan VIP 354 banyan-rpc 355 Barnes and Noble 356 Barneys New York 357 Basecamp 358 Battle.net 359 Battle.net Desktop 360 Battle.net Protocol 361 Battle.net site 362 Battlefield 363 Baydin 364 Bazaarvoice 365 BB 366 BBB 367 BBC 368 BBC iPlayer 369 BBN RCC 370 BearShare 371 Bebo 372 Beeg 373 Behance 374 Bejeweled Blitz 375 Bejeweled Chrome Extension 376 Benefitfocus 377 Cisco Firepower Application Detector Reference - VDB 307 xiii Contents

  3848
Recommended publications
  • Kakaotalk Theme Guide
    kakaotalkThemeGuide Creat My Own Theme Android UPDATE 2017/02/23 STEP1 Check Points Customized Themes Create a unique look and feel that is all your own. With the custom theme feature, you can transform your wallpaper, chat bubbles, font, color scheme and more. Check point - This feature is available in KakaoTalk version 5.1.0 or later. - The color of the text can be changed. - Layout cannot be modified. - Produce based on a 480PX x 800PX (HDPI) resolution. - Produse based on a 1080x1920(xxhdpi) resolution Download File KakaoTalk Theme has been designed so that it is created in an APK file format, with execution speed and scalability in mind kakao.com > services > kakaotalk > Customized Themes download KakaoTalk sample themes. http://www.kakao.com/services/talk/theme STEP2 Modify Resources 1) Modify Images The package name/res/drawable-xxhdpi folder contains sample images that can be modified using the theme function. Refer to the resources list in the “Check Modifiable Resource” page and replace the image you wish to change with the identical file name. For example, if you wish to change the Splash screen that is displayed when KakaoTalk is executed, then change the thm_general_splash_img.png file shown in the folder above. Leave as-is or delete if there is no image that needs to be changed. Images that change size depending on the size of the phone or the situation are those categorized as “9-patch” in the recommended type column in the list and requires additional modification. Please refer to the URL below for more information on 9-patch.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Thesis Submitted for Examination for the Degree of Master of Science in Technology
    Extending the Functionality of the Realm Gateway Maria Riaz School of Electrical Engineering Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 25.09.2019 Supervisor Prof. Raimo Kantola Advisors Juha-Matti Tilli Hammad Kabir Copyright ⃝c 2019 Maria Riaz Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of the master’s thesis Author Maria Riaz Title Extending the Functionality of the Realm Gateway Degree programme Masters in Computer, Communication and Information Sciences Major Communications Engineering Code of major ELEC3029 Supervisor Prof. Raimo Kantola Advisors Juha-Matti Tilli, Hammad Kabir Date 25.09.2019 Number of pages 86 Language English Abstract The promise of 5G and Internet of Things (IoT) expects the coming years to witness substantial growth of connected devices. This increase in the number of connected devices further aggravates the IPv4 address exhaustion problem. Network Address Translation (NAT) is a widely known solution to cater to the issue of IPv4 address depletion but it poses an issue of reachability. Since Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) application layer protocols play a vital role in the communication of the mobile devices and IoT devices, the NAT reachability problem needs to be addressed particularly for these protocols. Realm Gateway (RGW) is a solution proposed to overcome the NAT traversal issue. It acts as a Destination NAT (DNAT) for inbound connections initiated towards the private hosts while acting as a Source NAT (SNAT) for the connections in the outbound direction. The DNAT functionality of RGW is based on a circular pool algorithm that relies on the Domain Name System (DNS) queries sent by the client to maintain the correct connection state.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • Internet Engineering Task Force A. Hutton Internet-Draft Unify Intended Status: Standards Track J
    Internet Engineering Task Force A. Hutton Internet-Draft Unify Intended status: Standards Track J. Uberti Expires: December 29, 2014 Google M. Thomson Mozilla June 27, 2014 HTTP Connect - Tunnel Protocol For WebRTC draft-hutton-httpbis-connect-protocol-00 Abstract This document describes a mechanism to enable HTTP Clients to provide an indication within a HTTP Connect request as to which protocol will be used within the tunnel established to the Server identified by the target resource. The tunneled protocol is declared using the Tunnel- Protocol HTTP Request header field. Label usage relating to the use of HTTP Connect by WebRTC clients (e.g. turn, webrtc) are described in this document. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on December 29, 2014. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document.
    [Show full text]
  • Tencent and China Mobile's Dilemma
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face.
    [Show full text]
  • Executive Summary
    Executive Summary Chat apps are quickly becoming the preferred medium for digital communication in some of the world’s fastest-growing markets. Global monthly users of the top four chat apps (WhatsApp, Messenger, WeChat, and Viber) now exceed those of the top four traditional social media networks (Facebook, Instagram, Twitter, and LinkedIn) (Business Insider Intelligence, 2017). The most popular chat app, WeChat, had 889 million monthly active users as of Q4 2016 (according to Tencent Penguin Intelligence’s 2017 WeChat User Behavior Report [as cited in Brennan, 2017]). Given these radical shifts, the Institute for the Future (IFTF), with support from the Google News Lab, conducted an ethnographic case study of the chat app news media ecosystem in Korea. The goal was to better understand the role chat apps will play in the creation and propagation of news around the world, highlighting key challenges and opportunities for newsrooms and journalists. Our study focuses primarily on KakaoTalk, the most popular chat app in South Korea. South Korea has the fastest internet speed in the world (averaging 28.6 Mbps in the first quarter of 2017 [Akamai, 2017]), the highest smartphone ownership rates in the world (Hana, 2016), free access to global media and internet, and high saturation of both indigenous (KakaoTalk) and foreign chat apps, making the country a good indicator where news media are headed both in the region and around the world. We found three key insights for journalists and newsrooms to consider: 1. MILLIONS OF ORDINARY PEOPLE ARE DRIVING THE FLOW OF NEWS THROUGH CHAT APPS, FURTHER EVOLVING THE INFORMATION ECOSYSTEM IN THE DIGITAL WORLD: The flow of information today within chat apps is similar to a massive, virtual version of the children’s game of telephone, in which individuals whisper messages to each other one by one, the final message inevitably differing significantly from the original.
    [Show full text]
  • Comparison of Ftp V/S Ftps
    www.ijcrt.org © 2018 IJCRT | Volume 6, Issue 1 March 2018 | ISSN: 2320-2882 COMPARISON OF FTP V/S FTPS Subhasish Das ,VIT Kusumakar Kashyap,VIT Abstract: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet.FTP is built on a clientserver architecture and uses separate control and data connections between the client and the server.FTP users may authenticate themselves using clear sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). FTPS helps to encrypt and transfer private information within the constraints of regulatory requirements. Many industries rely on the timely and effective transfer of files to provide services to consumers. For example, the healthcare industry requires exchanging sensitive information between healthcare providers, insurance providers, and eligibility services, to name a few. Regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA) provide requirements for the use and disclosure of patients'private healthcare information (PHI). FTP services exchange information between caregivers and insurance companies, but the FTP protocol lacks the level of protection needed to meet regulatory requirements for the safeguarding of PHI. However, encrypting private information over the wire using FTPS helps meet this requirement. Introduction Working of FTP FTP control connection created after TCP connection is established. Internal FTP commands are passed over this logical connection based on formatting rules established by the Telnet protocol.Each command sent by the client receives a reply from the server to indicate whether it succeeded or failed.
    [Show full text]
  • Forensic Study and Analysis of Different Artifacts of Web Browsers in Private Browsing Mode
    || Volume 5 || Issue 6 || June 2020 || ISSN (Online) 2456-0774 INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH AND ENGINEERING TRENDS FORENSIC STUDY AND ANALYSIS OF DIFFERENT ARTIFACTS OF WEB BROWSERS IN PRIVATE BROWSING MODE Rinchon Sanghkroo1, Dr. Deepak Raj Rao G.2 and Kumarshankar Raychaudhuri3 M.Sc. (Forensic Science) Final Semester Student, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India 1 Assistant Professor, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India2 Junior Research Fellow, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India3 [email protected], [email protected], [email protected] ------------------------------------------------------ ***-------------------------------------------------- Abstract: - Web browsers today have become one of the most commonly used applications in digital devices, storing and maintaining huge information on user activities. The privacy mode has been introduced to combat the privacy issues related with browsers. This feature keeps the browsing activities of a user private by not storing or removing the traces of artifacts related to the browsing session on the system. In this study, we test the effectiveness of this claim and to ensure ways in which a forensic investigation may be done in such cases. The private modes of different browsers have been tested in Windows and MAC OS by performing pre-defined browsing activities in each of the browsers in both the operating systems. Moreover, the default locations of normal web browser artifacts are also examined to find whether artifacts of private browsing activities are stored in such locations or not. Keywords: - Private Browsing, Windows, MAC, Safari, Microsoft Edge, Brave Browser ------------------------------------------------------ ***-------------------------------------------------- I INTRODUCTON artifacts related to it on the end device.
    [Show full text]
  • Vmware Vrealize Configuration Manager Installation Guide Vrealize Configuration Manager 5.8
    VMware vRealize Configuration Manager Installation Guide vRealize Configuration Manager 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-001815-00 vRealize Configuration Manager Installation Guide You can find the most up-to-date technical documentation on the VMware Web site at: Copyright http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] © 2006–2015 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 5 Preparing to Install VCM 7 Typical or Advanced Installation 7 VCM Installation Configurations 8 Create VCM Domain Accounts 8 VCM Account Configuration 9 VCM Administrator Account 10 VCM User Accounts 10 Service Accounts 10 Network Authority Account 11 ECMSRSUser Account 12 SQL Server Permissions and Constructs 12 Gather Supporting Software
    [Show full text]