Product Guide Revision A

Total Page:16

File Type:pdf, Size:1020Kb

Product Guide Revision A Product Guide Revision A McAfee Data Loss Prevention 9.3.1 For use with ePolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright © 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Data Loss Prevention 9.3.1 Product Guide Contents Preface 13 About this guide .................................. 13 Audience ..................................13 Conventions .................................13 Find product documentation ............................. 14 1 Introduction to McAfee Data Loss Prevention 15 Understanding McAfee DLP products ..........................15 McAfee DLP product suite ........................... 15 McAfee DLP data vectors ............................16 How McAfee DLP works ............................... 16 How McAfee DLP handles data ......................... 16 How McAfee DLP acts on data ..........................19 Integrating multiple McAfee DLP products .....................20 Deployment 2 Deployment options 25 Types of installations ................................ 25 Management options ................................ 25 Using McAfee DLP with other McAfee products ...................... 26 3 Deployment scenarios 27 Deployment scenario: McAfee DLP Monitor ....................... 27 Deployment scenario: McAfee DLP Discover and McAfee DLP Prevent .............28 Deployment scenario: Full product suite integration ....................29 4 Plan your deployment 31 Product-specific requirements .............................31 Network integration requirements for McAfee DLP Monitor .............. 31 Requirements for configuring MTA servers with McAfee DLP Prevent .......... 33 Supported repositories with McAfee DLP Discover ..................33 Network placement .................................34 Default ports used in McAfee DLP communications .................... 34 Order of deployment ................................ 36 Deployment Checklist ................................37 Installation 5 Set up the hardware 41 Check the shipment .................................41 Rack mount the appliance .............................. 41 Identify network ports ................................42 Configure SPAN or tap mode for McAfee DLP Monitor ................... 43 McAfee Data Loss Prevention 9.3.1 Product Guide 3 Contents Integrate the appliance using a SPAN port .....................43 Integrate the appliance using a network tap ....................44 Connect the management port ............................ 44 Serial console settings ................................44 6 Install or upgrade the system 45 Installing or upgrading the software on 4400 and 5500 appliances ..............45 Download the 4400 or 5500 archive ....................... 45 Install a new image on 4400 or 5500 appliances .................. 46 Upgrading appliances in a managed environment ..................47 Upgrade the products on 4400 or 5500 appliances ................. 47 Boot options .................................49 Set the next boot image ............................50 Installing or upgrading the software on 1650 and 3650 appliances ..............51 Download the 1650 or 3650 archive .......................51 Install a new image on 1650 or 3650 appliances .................. 51 Upgrading appliances in a managed environment ..................52 Upgrade the products on 1650 or 3650 appliances ................. 53 Applying hotfixes ..................................54 Re-imaging an appliance ...............................54 7 Complete post-installation tasks 55 Add NAT IP addresses ................................55 Configure McAfee DLP Manager ............................ 56 Add McAfee DLP Manager to ePolicy Orchestrator .....................56 Install the network extension ..........................56 Add an ePolicy Orchestrator database user .................... 57 Register McAfee DLP Manager on ePolicy Orchestrator ................57 Install the host extension ........................... 58 Required ePolicy Orchestrator registration information ................58 Register ePolicy Orchestrator on McAfee DLP Manager ................59 Add McAfee DLP devices to McAfee DLP Manager .....................59 Configure standalone McAfee DLP appliances using the Setup Wizard .............60 Configure servers for McAfee DLP Prevent ........................61 Link negotiation for McAfee DLP appliances ....................... 61 Testing the system ................................. 62 Additional tasks .................................. 62 System configuration 8 Integrating network servers 67 Using external authentication servers ......................... 67 OpenLDAP and Active Directory server differences ................. 67 How directory server accounts are accessed ................... 67 How directory servers are used with DLP systems ................. 68 How LDAP user accounts are monitored ......................68 Monitoring LDAP users ............................ 69 Add Active Directory servers .......................... 69 Add Active Directory or OpenLDAP users ..................... 71 Export certificates from Active Directory servers .................. 71 How ADAM servers extend McAfee DLP Manager .................. 72 Mapping default to custom attributes .......................72 Using Active Directory attributes ........................ 73 Viewing Active Directory incidents ........................73 Search for user attributes in LDAP data ......................74 Find user attributes in LDAP data ........................ 74 4 McAfee Data Loss Prevention 9.3.1 Product Guide Contents LDAP columns available for display ....................... 75 Add columns to display user attributes ...................... 75 Using McAfee Logon Collector .............................75 Connect McAfee Logon Collector to McAfee DLP .................. 76 How McAfee Logon Collector enables user identification ...............76 How McAfee DLP uses SIDs .......................... 77 Using DHCP servers .................................77 Add DHCP servers .............................. 77 Using NTP servers ................................. 78 Configure time settings ............................ 78 Synchronize McAfee DLP devices with NTP .................... 79 Reset the hardware clock ........................... 79 Using syslog servers ................................ 80 9 Administrator accounts 81 Managing user accounts ...............................81 Configure primary administrator accounts .....................81 Activate a failover account ...........................82 Customize logon settings ........................... 82 Customize password settings ..........................82 Managing user groups ................................83 Add user groups ............................... 83 Delete user groups ..............................84 Managing permissions ................................84 Assign incident permissions .......................... 84 Assign task and policy permissions ....................... 85 Check user permissions ............................ 85 Check group incident permissions ........................ 85 Policy configuration and data use 10 Policies and rules 89 How policies and rules can be used .......................... 89 Analyzing trends in data matching ........................89 Use Chart and Compare to prioritize policies ....................90 Use Chart and Compare to tune policies and rules ................. 90 Managing policies ................................. 91 Policy inheritance .............................. 91 Policy activation ............................... 92 Activate or deactivate policies ......................... 92 Add, modify, and deploy policies ........................ 92 Managing rules .................................. 96 Add rules ..................................97 Find rules ................................. 97 View rule parameters ............................. 98 Copy rules to policies ............................. 98 Disable rule inheritance ............................ 98 Reconfigure rules for web traffic .........................99 Delete rules .................................99
Recommended publications
  • Imagen Y Diseño # Nombre 1 10 Christmas Templates 2 10 DVD
    Imagen Y Diseño # Nombre 1 10 Christmas Templates 2 10 DVD Photoshop PSD layer 3 10 Frames for Photoshop 4 1000 famous Vector Cartoons 5 114 fuentes de estilo Rock and Roll 6 12 DVD Plantillas Profesionales PSD 7 12 psd TEMPLATE 8 123 Flash Menu 9 140 graffiti font 10 150_Dreamweaver_Templates 11 1600 Vector Clip Arts 12 178 Companies Fonts, The Best Collection Of Fonts 13 1800 Adobe Photoshop Plugins 14 2.900 Avatars 15 20/20 Kitchen Design 16 20000$ Worth Of Adobe Fonts! with Adobe Type Manager Deluxe 17 21000 User Bars - Great Collection 18 240+ Gold Plug-Ins for Adobe Dreamweaver CS4 19 30 PSD layered for design.Vol1 20 300.000 Animation Gif 21 32.200 Avatars - MEGA COLLECTION 22 330 templates for Power Point 23 3900 logos de marcas famosas en vectores 24 3D Apartment: Condo Designer v3.0 25 3D Box Maker Pro 2.1 26 3D Button Creator Gold 3.03 27 3D Home Design 28 3D Me Now Professional 1.5.1.1 -Crea cabezas en 3D 29 3D PaintBrush 30 3D Photo Builder Professional 2.3 31 3D Shadow plug-in for Adobe Photoshop 32 400 Flash Web Animations 33 400+ professional template designs for Microsoft Office 34 4000 Professional Interactive Flash Animations 35 44 Cool Animated Cards 36 46 Great Plugins For Adobe After Effects 37 50 BEST fonts 38 5000 Templates PHP-SWISH-DHTM-HTML Pack 39 58 Photoshop Commercial Actions 40 59 Unofficial Firefox Logos 41 6000 Gradientes para Photoshop 42 70 POSTERS Alta Calidad de IMAGEN 43 70 Themes para XP autoinstalables 44 73 Custom Vector Logos 45 80 Golden Styles 46 82.000 Logos Brands Of The World 47 90 Obras
    [Show full text]
  • LPS-Public Quick Start Guide
    LPS-Public Quick Start Guide This guide is for the beginner user to create and use a Lightweight Portable Security – Public Edition (LPS- Public) CD to more securely browse the Internet and access CAC-enabled websites. For more information on LPS-Public, see http://www.spi.dod.mil/lipose.htm. LPS-Public focuses on safe browsing; it supports thumb drives but intentionally lacks drivers (support) for hard drives and printers. 1. Create a bootable CD from the ISO image (*.iso, an image file of an optical disc). a) Download and save the LPS-Public ISO image from http://www.spi.dod.mil/lipose.htm. b) Burn the image to a blank CD using ISO software (e.g., UltraISO, ISO Maker, K3b, CDBurnerXP, Easy CD Creator, ImgBurn, CDBurn, Nero Burning ROM, Roxio Creator, or one of many others but ATSPI endorses none). This is not the same as just saving the file to a CD. c) Write the LPS version number on the CD. 2. Connect your PC or Intel-based Mac to a wired Ethernet network with DHCP service, or have a wireless (WiFi) or broadband cellular network available. 3. Connect a USB CCID-compliant CAC reader to your PC. Many built-in readers are not supported. Insert your CAC into the reader. If you have an old or non-CCID reader, you may need new firmware from the OEM. LPS contains a Firmware Updating utility that you should run. 4. Insert the LPS-Public CD into the CD drive. Restart your computer. It may take a few minutes to boot LPS.
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Msn 9 Offline Installer
    Msn 9 offline installer click here to download Since the link to install the windows live essentials version has officially dropped from Microsoft Windows Live Essentials () ENG Offline Installer Link alexisnik UTC #9. Internet Explorer 9 is the recommended browser for Windows Vista. Now with Bing and MSN defaults for an improved web experience. Microsoft does not provide any link to download full offline installer of Windows Live Messenger , instead you will find the integrated live. MSN Messenger 9 Offline Installer. Live Messenger Microsoft does not provide any link to download full offline installer of Windows Live. Install MSN software. To download and install MSN software, click Install Now. Install System requirements and recommendations. Minimum. Microsoft®. Follow the instructions to order and install from a CD here. 9. Click Next to complete installation. Once the installation has completed the install wizard will. MSN Windows Live Messenger Full Offline Installer. calculo70 MSN e offline Links Windows XP SP3 Pt Br Original IE 8 MSN 9 a Istalador. msn ie8 windows 7 full installer Download Link . 9/14/ · To download the offline installer for Internet Explorer 11, choose your language and system below. Windows Live Messenger (formerly MSN Messenger) is a software, Using Microsoft, MSN, MSN Windows Live, offline installer, offline setup, Send Sms For. Smash • 9 months ago. Thank you for the offline installer. Well just installed, i choose only to download MSN Messenger, but it said that i had. Yahoo messenger 9 final full offline installer You can add and check status of your MSN Live messenger contacts in Yahoo messenger.
    [Show full text]
  • Fedora 20 Grabar Imágenes ISO En Disco Cómo Descargar Imágenes ISO Y Crear CD Y DVD
    Fedora 20 Grabar imágenes ISO en disco Cómo descargar imágenes ISO y crear CD y DVD Fedora Documentation Project Copyright © 2013 Fedora Project Contributors. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Instant Messaging Video Converter, Iphone Converter Application
    Web Browsing Mozilla Firefox The premier free, open-source browser. Tabs, pop-up blocking, themes, and extensions. Considered by many to be the world's best browser. Download Page Video Player, Torrents, Podcasting Miro Beautiful interface. Plays any video type (much more than quicktime). Subscribe to video RSS, download, and watch all in one. Torrent support. Search and download from YouTube and others. Download Page IM - Instant Messaging Adium Connect to multiple IM accounts simultaneously in a single app, including: AOL IM, MSN, and Jabber. Beautiful, themable interface. Download Page Video Converter, iPhone Converter Miro Video Converter Convert any type of video to mp4 or theora. Convert any video for use with iPhone, iPod, Android, etc. Very clean, easy to use interface. Download Page Application Launching Quicksilver Quicksilver lets you start applications (and do just about everything) with a few quick taps of your fingers. Warning: start using Quicksilver and you won't be able to imagine using a Mac without it. Download Page Email Mozilla Thunderbird Powerful spam filtering, solid interface, and all the features you need. Download Page Utilities The Unarchiver Uncompress RAR, 7zip, tar, and bz2 files on your Mac. Many new Mac users will be puzzled the first time they download a RAR file. Do them a favor and download UnRarX for them! Download Page DVD Ripping Handbrake DVD ripper and MPEG-4 / H.264 encoding. Very simple to use. Download Page RSS Vienna Very nice, native RSS client. Download Page RSSOwl Solid cross-platform RSS client. Download Page Peer-to-Peer Filesharing Cabos A simple, easy to use filesharing program.
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • DLL Hijacking with Metasploit
    Autor :Ô.._ mar Fontenele a k a f0nt Drk Date :// 06 03 2011 DLL Hijacking with Metasploit É o seguinte, a técnica consiste em explorar a DLL vulneravel de algum programa e a exploitar . Primeiro vamos ao nosso Metasploit : user@root ~# msfconsole Agora vamos criar uma DLL maliciosa similar a original da Aplicação . usando este exploit : ## # $Id: webdav_dll_hijacker.rb 10101 2010-08-23 13:41:59Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ManualRanking # # This module acts as an HTTP server # include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, 'Name' => 'WebDAV Application DLL Hijacker', 'Description' => %q{ This module presents a directory of file extensions that can lead to code execution when opened from the share. The default EXTENSIONS option must be configured to specify a vulnerable application type. }, 'Author' => [ 'hdm', # Module itself 'jduck', # WebDAV implementation 'jcran', # Exploit vectors ], 'License' => MSF_LICENSE, 'Version' => '$Revision: 10101 $', 'References' => [ ['URL', 'http://blog.zoller.lu/2010/08/cve-2010-xn- loadlibrarygetprocaddress.html'], ['URL', 'http://www.acrossecurity.com/aspr/ASPR-2010-08-18-1- PUB.txt'], ], 'DefaultOptions' => { 'EXITFUNC' => 'process',
    [Show full text]
  • Guia De Introdução Ao Roxio Easy CD and DVD Burning 5 Easy CD and DVD Burning.Book Page 6 Wednesday, November 28, 2012 2:31 PM
    Easy_CD_and_DVD_Burning.book Page i Wednesday, November 28, 2012 2:31 PM Roxio Easy CD and DVD Burning Guia de Introdução Easy_CD_and_DVD_Burning.book Page ii Wednesday, November 28, 2012 2:31 PM Sobre a Corel A Corel é uma das maiores empresas de software do mundo e fornece algumas das marcas mais conhecidas do setor, entre elas Roxio®, Pinnacle™ e WinZip®. Ostentando o mais abrangente portfólio de produtos gráficos, de produtividade e de mídia digital, construímos uma reputação por oferecermos software inovador que é fácil de aprender e de usar, ajudando as pessoas a atingir novos níveis de criatividade e produtividade. O setor respondeu com centenas de prêmios de inovação, design e valor. Usadas por milhões de pessoas ao redor do mundo, nossas linhas de produtos incluem CorelDRAW® Graphics Suite, Corel® Painter™, Corel® PaintShop® Pro, Corel® VideoStudio®, Corel® WordPerfect® Office, Pinnacle Studio™, Roxio Creator®, Roxio® Toast® e WinZip®. Para obter mais informações sobre a Corel, visite o site www.corel.com. © 2012 Corel Corporation. Todos os direitos reservados. Corel e outras marcas e logotipos da Corel usados no presente documento são marcas comerciais de propriedade da Corel Corporation e/ou de suas subsidiárias. Este produto e seu guia incluem propriedade intelectual (inclusive marcas comerciais) de propriedade dos respectivos terceiros e/ou por eles registradas e/ou licenciadas. ii Roxio Easy CD and DVD Burning Easy_CD_and_DVD_Burning.book Page 3 Wednesday, November 28, 2012 2:31 PM Sumário Neste guia Bem-vindo ao Roxio Easy CD and DVD Burning. 4 Requisitos do sistema . 5 Instalando o software . 6 Sobre o Easy CD and DVD Burning .
    [Show full text]
  • Mining Criminal Networks from Chat Log
    2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology This is the preprint version. See IEEE for the final official version. Mining Criminal Networks from Chat Log Farkhund Iqbal Benjamin C. M. Fung Mourad Debbabi College of Information Technology CIISE CIISE Zayed University Concordia University Concordia University Abu Dhabi, United Arab Emirates Montreal, Canada H3G 1M8 Montreal, Canada H3G 1M8 Email: [email protected] Email: [email protected] Email: [email protected] Abstract—Cybercriminals exploit opportunities for anonymity and masquerade in web-based communication to conduct illegal activities such as phishing, spamming, cyber predation, cyber threatening, blackmail, and drug trafficking. One way to fight cybercrime is to collect digital evidence from online documents and to prosecute cybercriminals in the court of law. In this paper, we propose a unified framework using data mining and natural language processing techniques to analyze online messages for the purpose of crime investigation. Our framework takes the chat log from a confiscated computer as input, extracts the social networks from the log, summarizes chat conversations into topics, identifies the information relevant to crime investigation, and visualizes the knowledge for an investigator. To ensure that the implemented framework meets the needs of law enforcement officers in real-life investigation, we closely collaborate with the cybercrime unit of a law enforcement agency in Canada. Both the feedback from the law enforcement officers and experimental results suggest that the proposed chat log mining framework is effective for crime Fig. 1. Framework overview investigation. Index Terms—crime investigation; criminal networks; data level information, such as IPs, protocols, and path traveled mining; frequent patterns; topic mining.
    [Show full text]
  • Débuter Avec Miranda IM
    Débuter avec Miranda IM TUTORIEL RÉALISÉ PAR DRUSS Présentation Miranda est un client de messagerie instantanée multi-protocoles, gratuit, open-source, léger, portable, personnalisable et esthétique. Il est une alternative à MSN (WLM) qui est un programme propriétaire de Microsoft, et dont certaines fonctionnalités laissent à désirer. Miranda vous permettra non seulement d'utiliser le protocole MSN, mais aussi IRC, AIM, Gtalk, ICQ, Yahoo Messenger, et bien d'autres. Cependant, il est relativement difficile pour un nouvel utilisateur de s'y retrouver dans la multitude d'options que ce programme propose. Ce tutoriel a donc pour but de vous faire découvrir Miranda et de vous guider dans vos premières utilisations, afin que le logiciel soit convivial et adapté à vos besoins. Miranda ne fonctionne actuellement que pour Windows, de 95 à Vista. Des projets pour le porter sous Linux sont en cours, mais pour l'instant, il vous faudra utiliser Wine. Avantages Je liste ci dessous les avantages de Miranda, du moins par rapport à MSN : – multi-protocoles – libre et gratuit – sans publicité – personnalisable, skinnable... esthétique – possibilité de renommer les contacts – possibilité de créer des sous-groupes – discussions par onglets (ou fenêtres, c'est au choix) – des centaines de plugins Sites et IRC Site Français : http://www.miranda-fr.net/ Page de téléchargements : http://www.miranda-fr.net/telechargements/ Le forum français : http://forum.miranda-fr.net/ Officiel, anglais : http://miranda-im.org/ Les addons : http://addons.miranda-im.org/ Liste des tutoriels français : http://forum.miranda-fr.net/tutoriaux-vf14.html Autre tutoriel pour les premiers pas sous Miranda : http://www.miranda-fr.net/faqs/premiers_pas,_installation_et_configuration..html IRC : #miranda-fr et #miranda sur le serveur FreeNode.
    [Show full text]
  • Linux Journal
    Open Science Travel Laptop Auto-Download Means Open Source Tips Linux Journal Since 1994: The original magazine of the Linux community PHOTOGRAPHY AND FOSS +DEEP DIVE: High Performance Computing ISSUE 293 | DECEMBER 2018 www.linuxjournal.com DECEMBER 2018 CONTENTS ISSUE 293 78 DEEP DIVE: High-Performance Computing 79 Linux and Supercomputers by Bryan Lunduke As we sit here, in the year Two Thousand and Eighteen (better known as “the future, where the robots live”), our beloved Linux is the undisputed king of supercomputing. Of the top 500 supercomputers in the world, approximately zero of them don’t run Linux (give or take...zero). 90 Data in a Flash, Part I: the Evolution of Disk Storage and an Introduction to NVMe by Petros Koutoupis NVMe drives have paved the way for computing at stellar speeds, but the technology didn’t suddenly appear overnight. It was through an evolutionary process that we now rely on the very performant SSD for our primary storage tier. 106 Data in a Flash, Part II: Using NVMe Drives and Creating an NVMe over Fabrics Network by Petros Koutoupis By design, NVMe drives are intended to provide local access to the machines they are plugged in to; however, the NVMe over Fabric specification seeks to address this very limitation by enabling remote network access to that same device. 2 | December 2018 | http://www.linuxjournal.com CONTENTS 6 The High-Performance Computing Issue by Bryan Lunduke 10 From the Editor—Doc Searls How Can We Bring FOSS to the Virtual World? 16 Letters UPFRONT 24 Auto-Download Linux Journal Each Month by Mitch Frazier 29 FOSS Project Spotlight: Appaserver by Tim Riley 35 Patreon and Linux Journal 36 Using Linux for Logic by Joey Bernard 44 Lessons in Vendor Lock-in: Messaging by Kyle Rankin 49 Reality 2.0: a Linux Journal Podcast 50 News Briefs COLUMNS 52 Kyle Rankin’s Hack and / Travel Laptop Tips in Practice 56 Reuven M.
    [Show full text]