Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes

Size: px
Start display at page:

Download "Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes"

Transcription

1 Software Security Encryption Week 5 Part 1 Masking Data from Unwelcome eyes Encryption Encryption Encryption is the process of transforming data into another form Designed to make it readable only by those with special knowledge The original data (without encryption) is called plaintext Even though it can be anything from text to an image 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Encryption Encryption The mathematical function / algorithm used to encrypt the plaintext is called a cipher The result of the process is encrypted data called ciphertext (even though it can contain anything) Plaintext Cipher Ciphertext 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

2 Friends & enemies: Alice, Bob, Trudy Friends & enemies: Alice, Bob, Trudy Plaintext Plaintext Ciphertext Plaintext Alice All your data are belong to us! Bob Alice Curses! Bob Trudy Trudy 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Importance of Cryptology Terminology The Internet was not designed with much security in mind As a result, all the data being sent over the network can be copied by anyone If they are malicious, they can intercept passwords, and other information Cryptography allows the data to be hidden so only the recipient can read it Cryptology is the umbrella study of cryptography and cryptanalysis Cryptosystems disguise messages, allowing only selected people to see through it Cryptography is the science (or art) of designing, building, and using cryptosystems Cryptanalysis is the science (or art) of breaking a cryptosystem 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Basic Methods Two Basic Methods Relies on two basic methods: transposition: letters (data) are rearranged into a different order substitution: letters (data) are replaced by other letters and/or symbols Frequency of letters in a typical sample of text has a distinctive & predictable shape Transposition letters (data) are rearranged into a different order e.g. cat tca Substitution letters (data) are replaced by other letters and/or symbols e.g. cat dbu 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

3 Letter Frequency Example: Caesar Cipher Caesar cipher was named after Julius Caesar who used it to communicate with his generals Uses substitution based on a shifting letters 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Caesar Cipher: How to Use Example ROT13 Letters are replaced with letters a fixed number of positions up/down the alphabet So, if the shift is 1, A B, B C, etc ROT13 is a substitution cipher that replaces each letter with the another by shifting 13 positionsso conversion is quite easy! It is the Caesar Cipher using 13 Can you decode this? T b d s b n f o u p T u b u f Decrypt this: Z b e r u b z r j b e x c y r n f r 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Example ROT13 Main types of cryptography Decrypt this: Z b e r u b z r j b e x c y r n f r A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Most major ciphers use a complex mathematical algorithm to encrypt data It can only be decrypted using a large unique value called a key 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

4 Main types of cryptography Symmetric: Private Key Encryption The more of bits in the key, typically the better the security Two approaches to keys: symmetric private keys asymmetric public and private keys It uses the same key to both encrypt and decrypt a message This is a shared secret! Most significant challenge: sharing keys prior to needing them and keeping others from learning them 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Common Ciphers Commonly Ciphers (low to high) Commonly used symmetric key encryptions: DES, 3DES, IDEA, AES, and Blowfish Data Encryption Standard (DES) was selected by the U.S. in 1976 It was broken in Jan 1999 and is no longer considered to be secure This is true of all ciphers, as computers become faster and more powerful, the size of the key must increase Cipher Bit Size Data Encryption Standard (DES) 56 Advanced Encryption Standard (AES) 64 Triple DES (3DES) 168, 112, 56 International Data Encryption Algorithm (IDEA) 128 Blowfish 32 to 448 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Asymmetric Encryption Asymmetric Encryption Enables you to communicate over any open channel with a high degree of confidence It uses two keys: one public and one private Two Keys! Too Cool! 6/25/2018 CSC Cook - Sacramento State - Summer

5 Advantages Asymmetric Encryption 1. Authentication: Messages you receive are from their advertised source 2. Privacy: Messages you send can be read only by their intended receiver(s) 3. Message integrity: All messages sent and received arrive intact Typically, the key lengths that are used with strong asymmetric key cryptography are 1024 bits (128 bytes) Messages are encrypted using both keys The two keys that compose a pair are mathematically related, but neither can be derived from the other 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer The Keys Pretty Good Privacy The Public Key shared with everyone you want to communicate with privately it is validated by a separate, independent, source called a certificate authority The Private Key still kept private like before must be shared secretly Pretty Good Privacy (PGP) is distributed key management approach that does not rely on certificate authorities Created in 1991 by Philip Zimmermann 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer PGP: How it Works Battle Over PGP Users sign other s user public keys someone who signs another s public key acts as an introducer for that person to someone so, there is no single authority government enforcement not possible So, if someone trusts the introducer they should also trust the new person adds some confidence to a key s validity His goal was to create the equivalent of a sealed envelope However, PGP started a conflict started between Zimmerman and the U.S. Government 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

6 Battle Over PGP Battle of PGP The Federal Government was about to pass legislation requested by the FBI prohibiting encryption information that law enforcement could not decode Not possible with PGP FBI started hounding Zimmermann and in 1993 there was formal criminal investigation for munitions export without a license After several years the case was closed without filing criminal charges 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer PGP Goes Public The source code was then published in a book that cost only $60 It was scanned, modified, and spread around the World becoming the most popular cipher Often used to encrypt documents that can be shared via over the open Internet Open sesame! Passwords 6/25/2018 CSC Cook - Sacramento State - Summer How Passwords Work How Passwords Work Passwords are stored on the server Protecting these passwords from hackers is vital Either... passwords are encrypted or a hash is created for each password A "hash" is unique digital value created from a piece of text, file, etc... They are like a digital "fingerprint" and are used throughout computer science 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

7 When the User Enters a Password Password Weaknesses Hash is created using the user s input This hash value is compared to the hash in the data file If they match, then the password matches and access is granted Note: the hashes are compared, not real passwords They are dependent on human memory humans can only memorize a limited # of items long, complex passwords are most effective but are more difficult to memorize Security policies mandate passwords must expire users must repeatedly memorize passwords 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Password Weaknesses Attacks on Passwords Users don t like to remember multiple passwords And often take shortcuts weak passwords: common words, personal info reuse the same password for multiple accounts Social engineering trick the user into giving up a password e.g. phishing, shoulder surfing Capturing get the original password from the computer e.g. keylogger, sniffer 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Attacks on Passwords Password Cracker Resetting gain physical access to computer and reset password Offline cracking method used by most password attacks today steal encrypted password file compare with encrypted passwords they have created A password cracker is software used to break encrypted password files Generally uses brute force and/or a word list 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

8 Password Cracker Beowulf Cluster Works by: generating possible passwords creating the hashes for each look in the password file for a match Hacker may use a Beowulf Cluster 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Attack Program Methods Attack Program Methods Tests password file against 1000 common passwords Combines common passwords with common suffixes Uses 5000 common dictionary words, 10,000 names, 100,000 comprehensive dictionary words Uses lowercase, initial uppercase, all uppercase, and final character uppercase Makes common substitutions for letters in the dictionary words Examples: $ for for a 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer John the Ripper Password Crackers Are Useful John the Ripper is a freely available password cracker Used by both criminals and system administers to find weak passwords Sac State College of Engineering and Computer Science (ECS) uses them Used on password file to identify all weak passwords Students, who passwords are broken, are notified to change it 90% of past break-ins to ECS were caused by weak passwords 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

9 A Possible Scenario Worst Passwords of 2016 Attacker scans a network and finds a running service that has a security hole They then attack exploit the hole and get "super user" powers download the password file use a nuker to destroy evidence Later, on their computer they run password crackers on the stolen file using found passwords, they login as real users password qwerty football baseball 11. welcome abc qaz2wsx 16. dragon 17. master 18. monkey 19. letmein 20. login 21. princess 22. qwertyuiop 23. solo 24. passw0rd 25. starwars 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Password Defenses Creating Strong Passwords Creating strong passwords examining attack methods the less a password is formatted how "they" expect to be, the harder it is to break Most passwords consist of: root attachment Prefix or suffix 6/25/2018 CSC Cook - Sacramento State - Summer Do not use dictionary words or phonetic words Do not use birthdays, family names, pet names, addresses or any personal info Do not repeat characters or use sequences Do not use short passwords Optional defense use non-keyboard chars Unicode contains 65,000+ characters access them with the Character Map or holding down the ALT and type a number on the keypad 6/25/2018 CSC Cook - Sacramento State - Summer Character Map Good Password Management Alt keystroke Change passwords frequently Do not reuse old passwords Never write password down Use unique passwords for each account Set up temporary password for another user s access 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

10 Good Password Management Password Supplements Do not allow computer to automatically sign in to an account Do not enter passwords on public access computers Never enter a password while connected to an unencrypted wireless network Problem: managing numerous strong passwords is burdensome for users One solution: rely on technology to store and manage passwords Disadvantages of password supplements password information specific to one computer passwords vulnerable if another user allowed access to the computer 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Password Supplements Password Supplements Password management applications passwords stored in single user vault file protected by one strong master password Common features drag and drop capability enhanced encryption encrypted in memory timed clipboard clearing Web browsers web browsers can save user passwords encrypted and stored in Windows registry Problems: if you leave an unintended computer, person can log in as you generally you never log out which is a security risk 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Various Applications Password Defense Type Installed application Portable application Internet Storage Description Application installed on local computer Stand-alone application carried on USB drive Application and/or vault is stored online Advantages Can access computers with memorizing them Not limited to computer with preinstalled app and vault file Can access from any computer with Internet access Disadvantages Must be installed on each computer and vault file uploaded User must have USB drive present to use application Storing passwords online may expose them to attacks One important defense: prevent attacker from obtaining encrypted password file Defenses against password file theft do not leave computer unattended screensavers should be set to resume with a password password protect the ROM BIOS physically lock the computer case so it cannot be opened 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

11 Identification Systems Identification Systems Systems that Tell Who is Who Different software/network systems exist that are used to identify users Uses a single authentication credential shared across multiple networks 6/25/2018 CSC Cook - Sacramento State - Summer Identification Systems Windows Live ID Called Federated Identity Management (FIM) when networks are owned by different organizations Single sign-on (SSO) promises to reduce burden of passwords to just one Introduced in 1999 as.net passport Name changed to Microsoft Passport Network, then Windows Live ID Designed as an SSO for Web commerce 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Windows Live ID: Authentication Process User logs into system Given time limited global cookie stored on computer with encrypted ID tag ID tag sent to web site Site uses tag for authentication Site stores encrypted, timelimited, local cookie on user s computer Windows Live ID (cont d.) Windows Live ID was not widely supported Currently used for authentication on: Windows Live Office Live Xbox Live MSN and other Microsoft online services 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

12 OpenID OpenID: Authentication Process Decentralized open source FIM Does not require specific software to be installed on the desktop URL-based identity system OpenID provides a means to prove a user owns the URL User goes to free site and given OpenID account of Me.myopenID.com User visits Web commerce or other site and signs in using his Open ID Site redirects user to MyOpenID.com where he enters password to authenticate MyOpenID.com sends him back to Web site, now authenticated 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer OpenID: Security Weaknesses Relies on DNS which may have own weaknesses Not considered strong enough for most banking and e-commerce Web sites Securing the Operating System Protect the Master Software 6/25/2018 CSC Cook - Sacramento State - Summer Securing the Operating System 5 Steps to Securing the Operating System The operating system is the master control software of a system If it is compromised, all the data and applications are compromised Sadly, operating systems are quite complex allow for multiple exploits 1. Develop the security policy 2. Perform host software baselining 3. Configure operating system security and settings 4. Deploy the settings 5. Implement patch management 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

13 Develop the security policy Perform Host Software Baselining Clearly defines the defense mechanisms Policy should be "written in stone" Baseline: standard or checklist against which systems can be evaluated Configuration settings that are used for each computer in the organization 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer Configure Security and Settings Deploy the Settings Hundreds of different security settings can be manipulated Typical configuration baseline changing insecure default settings eliminating unnecessary software, services, protocols enabling security features such as a firewall 6/25/2018 CSC Cook - Sacramento State - Summer Security template: collections of security settings Process can be automated Group policy windows feature providing centralized computer management a single configuration may be deployed to many users 6/25/2018 CSC Cook - Sacramento State - Summer Implement Patch Management Estimated Size of Some Operating Systems Operating systems have increased in size and complexity New attack tools have made secure functions vulnerable Operating System Linux Kernel 2.6 FreeBSD Red Hat Linux 7 Microsoft Windows 7 Mac OS X 10.4 Debian 5.0 Lines of Code (Approximate) 5 million 9 million 30 million 50 million 86 million 324 million 6/25/2018 CSC Cook - Sacramento State - Summer /25/2018 CSC Cook - Sacramento State - Summer

14 Implement Patch Management Automated Patch Updates Security patch is a general software update to cover discovered vulnerabilities Service pack accumulates security updates and additional features However patches can sometimes create new problems vendor should thoroughly test before deploying 6/25/2018 CSC Cook - Sacramento State - Summer Modern operating systems can download and install updates However, many administrators manage updates manually Advantages don't rely on vendor s online update service can force updates to install by specific date computers not on the Internet can receive updates users cannot disable or circumvent update 6/25/2018 CSC Cook - Sacramento State - Summer

Physical Barriers. Physical Security. Mantraps. Mantrap. Week 6 Part 1. A chain is only as strong as its weakest link

Physical Barriers. Physical Security. Mantraps. Mantrap. Week 6 Part 1. A chain is only as strong as its weakest link Physical Security Physical Barriers Week 6 Part 1 A chain is only as strong as its weakest link Physical Barriers Mantraps Naturally, physical barriers must be in place to prevent physical access to a

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written

More information

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. B. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in

More information

AGENTLESS ARCHITECTURE

AGENTLESS ARCHITECTURE ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little

More information

Lecture 1: Introduction

Lecture 1: Introduction Lecture 1: Introduction Instructor: Omkant Pandey Spring 2018 (CSE390) Instructor: Omkant Pandey Lecture 1: Introduction Spring 2018 (CSE390) 1 / 13 Cryptography Most of us rely on cryptography everyday

More information

MA 111, Topic 2: Cryptography

MA 111, Topic 2: Cryptography MA 111, Topic 2: Cryptography Our next topic is something called Cryptography, the mathematics of making and breaking Codes! In the most general sense, Cryptography is the mathematical ideas behind changing

More information

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix

More information

Ansible Tower on the AWS Cloud

Ansible Tower on the AWS Cloud Ansible Tower on the AWS Cloud Quick Start Reference Deployment Tony Vattathil Solutions Architect, AWS Quick Start Reference Team April 2016 Last update: May 2017 (revisions) This guide is also available

More information

IE11, Edge (current version), Chrome (current version), Firefox (current version)

IE11, Edge (current version), Chrome (current version), Firefox (current version) Quick Start Guide DocuSign for SharePoint Online v3.4 Published: October 13, 2017 Overview DocuSign for SharePoint Online allows users to sign or send documents for signature from a SharePoint Online library.

More information

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method Sorting Encryption Systems CSC121, Introduction to Computer Programming We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method >>> a = [ 5, 2, 3, 1, 4 ] >>> a.sort(

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington Why Study Cryptography? Secrets are intrinsically interesting So much real-life drama: Mary Queen of Scots executed for treason

More information

Network Scanner Guide for Fiery S300 50C-KM

Network Scanner Guide for Fiery S300 50C-KM Network Scanner Guide for Fiery S300 50C-KM Read this manual before printing. Keep readily available for reference. User's Guide Introduction Thank you very much for purchasing the Fiery S300 50C-KM. This

More information

Celtx Studios Owner's Manual January 2011

Celtx Studios Owner's Manual January 2011 January 2011 Get the most out of Celtx Studios with the latest version of Celtx - available free at http://celtx.com Screen captures are made using Windows OS. Some image dialogs differ slightly on Mac

More information

Block Ciphers Security of block ciphers. Symmetric Ciphers

Block Ciphers Security of block ciphers. Symmetric Ciphers Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 26 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable

More information

Study Guide. Expertise in Ansible Automation

Study Guide. Expertise in Ansible Automation Study Guide Expertise in Ansible Automation Contents Prerequisites 1 Linux 1 Installation 1 What is Ansible? 1 Basic Ansible Commands 1 Ansible Core Components 2 Plays and Playbooks 2 Inventories 2 Modules

More information

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary We spoke about defense challenges Crypto introduction o Secret, public algorithms o Symmetric, asymmetric crypto, one-way hashes Attacks on cryptography o Cyphertext-only, known, chosen, MITM, brute-force

More information

Vernam Encypted Text in End of File Hiding Steganography Technique

Vernam Encypted Text in End of File Hiding Steganography Technique Vernam Encypted Text in End of File Hiding Steganography Technique Wirda Fitriani 1, Robbi Rahim 2, Boni Oktaviana 3, Andysah Putera Utama Siahaan 4 1,4 Faculty of Computer Science, Universitas Pembanguan

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Interactive Game Design with Alice Bit by Bit: Advancing Cyber Security

Interactive Game Design with Alice Bit by Bit: Advancing Cyber Security MESA VIRTUAL CONTEST CYBER RULES FOR 2018 Interactive Game Design with Alice Bit by Bit: Advancing Cyber Security Level: Type of Contest: Composition of Team: Number of Teams: Middle School Team 3 4 students

More information

Kaseya 2. User Guide. Version 7.0

Kaseya 2. User Guide. Version 7.0 Kaseya 2 vpro User Guide Version 7.0 May 30, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from time

More information

Diffie-Hellman key-exchange protocol

Diffie-Hellman key-exchange protocol Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users

More information

Network Security: Secret Key Cryptography

Network Security: Secret Key Cryptography 1 Network Security: Secret Key Cryptography Henning Schulzrinne Columbia University, New York schulzrinne@cs.columbia.edu Columbia University, Fall 2000 cfl1999-2000, Henning Schulzrinne Last modified

More information

The little BIG book of badness

The little BIG book of badness The little BIG book of badness (how to stay safe on the Internet - a guidebook for students and parents) You re safer in our world Use this book to find out how you and your computer can stay away from

More information

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence. Section 4.4 Linear Congruences Definition: A congruence of the form ax b (mod m), where m is a positive integer, a and b are integers, and x is a variable, is called a linear congruence. The solutions

More information

CDMA Physical Layer Built-in Security Enhancement

CDMA Physical Layer Built-in Security Enhancement CDMA Physical Layer Built-in Security Enhancement Jian Ren Tongtong Li 220 Engineering Building Department of Electrical & Computer Engineering Michigan State University East Landing, MI 48864-226 Email:

More information

Please insert^w inject more coins

Please insert^w inject more coins Please insert^w inject more coins Defcon Press XXI start Me? Nicolas Oberli (aka Balda) Swiss security engineer No, I don't speak swedish CTF enthusiast Retro gamer Beer drinker / brewer N00b speaker Any

More information

Contents. Prerequisites 1. Linux 1. Installation 1. What is Ansible? 1. Basic Ansible Commands 1. Ansible Core Components 2. Plays and Playbooks 8

Contents. Prerequisites 1. Linux 1. Installation 1. What is Ansible? 1. Basic Ansible Commands 1. Ansible Core Components 2. Plays and Playbooks 8 Contents Prerequisites 1 Linux 1 Installation 1 What is Ansible? 1 Basic Ansible Commands 1 Ansible Core Components 2 Plays and Playbooks 2 Inventories 2 Modules 2 Variables 3 Ansible Facts 3 Ansible config

More information

Breaking RSA semiprimes

Breaking RSA semiprimes Factorial impact on number theory and understanding discreet logarithms A mouse can eat an elephant but it has to do it a bite at a time. The security of RSA asymmetric public key systems rests on the

More information

DUBLIN CITY UNIVERSITY

DUBLIN CITY UNIVERSITY DUBLIN CITY UNIVERSITY SEMESTER ONE EXAMINATIONS 2013/2014 MODULE: CA642/A Cryptography and Number Theory PROGRAMME(S): MSSF MCM ECSA ECSAO MSc in Security & Forensic Computing M.Sc. in Computing Study

More information

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8)

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8) Merkle s Puzzles See: Merkle, Secrecy, Authentication, and Public Key Systems, UMI Research press, 1982 Merkle, Secure Communications Over Insecure Channels, CACM, Vol. 21, No. 4, pp. 294-299, April 1978

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

18 April To: ICANN Board From: SSAC Chair Via: SSAC Liaison to the ICANN Board

18 April To: ICANN Board From: SSAC Chair Via: SSAC Liaison to the ICANN Board 18 April 2013 To: ICANN Board From: SSAC Chair Via: SSAC Liaison to the ICANN Board ICANN Board of Directors Resolution 2012.09.13.06, dated 13 September 2012, asks the Security and Stability Advisory

More information

Cryptography s Application in Numbers Station

Cryptography s Application in Numbers Station Cryptography s Application in Numbers Station Jacqueline - 13512074 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia

More information

EE 418: Network Security and Cryptography

EE 418: Network Security and Cryptography EE 418: Network Security and Cryptography Homework 3 Solutions Assigned: Wednesday, November 2, 2016, Due: Thursday, November 10, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University

More information

TMA4155 Cryptography, Intro

TMA4155 Cryptography, Intro Trondheim, December 12, 2006. TMA4155 Cryptography, Intro 2006-12-02 Problem 1 a. We need to find an inverse of 403 modulo (19 1)(31 1) = 540: 540 = 1 403 + 137 = 17 403 50 540 + 50 403 = 67 403 50 540

More information

Pixel Image Steganography Using EOF Method and Modular Multiplication Block Cipher Algorithm

Pixel Image Steganography Using EOF Method and Modular Multiplication Block Cipher Algorithm Pixel Image Steganography Using EOF Method and Modular Multiplication Block Cipher Algorithm Robbi Rahim Abstract Purpose- This study aims to hide data or information on pixel image by using EOF method,

More information

PaperCut PaperCut Payment Gateway Module - Nelnet Business Solutions Commerce Manager Quick Start Guide

PaperCut PaperCut Payment Gateway Module - Nelnet Business Solutions Commerce Manager Quick Start Guide PaperCut PaperCut Payment Gateway Module - Nelnet Business Solutions Commerce Manager Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CS 6750 Lecture 1 September 10, 2009 Riccardo Pucella Goals of Classical Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to all communications Alice

More information

This guide provides information on installing, signing, and sending documents for signature with

This guide provides information on installing, signing, and sending documents for signature with Quick Start Guide DocuSign for Dynamics 365 CRM 5.2 Published: June 15, 2017 Overview This guide provides information on installing, signing, and sending documents for signature with DocuSign for Dynamics

More information

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over

More information

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator. Lecture 32 Instructor s Comments: This is a make up lecture. You can choose to cover many extra problems if you wish or head towards cryptography. I will probably include the square and multiply algorithm

More information

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete

More information

DUBLIN CITY UNIVERSITY

DUBLIN CITY UNIVERSITY DUBLIN CITY UNIVERSITY SEMESTER ONE EXAMINATIONS 2013 MODULE: (Title & Code) CA642 Cryptography and Number Theory COURSE: M.Sc. in Security and Forensic Computing YEAR: 1 EXAMINERS: (Including Telephone

More information

LSB Encoding. Technical Paper by Mark David Gan

LSB Encoding. Technical Paper by Mark David Gan Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.

More information

Codes and Nomenclators

Codes and Nomenclators Spring 2011 Chris Christensen Codes and Nomenclators In common usage, there is often no distinction made between codes and ciphers, but in cryptology there is an important distinction. Recall that a cipher

More information

Chapter 4 The Data Encryption Standard

Chapter 4 The Data Encryption Standard Chapter 4 The Data Encryption Standard History of DES Most widely used encryption scheme is based on DES adopted by National Bureau of Standards (now National Institute of Standards and Technology) in

More information

Drill Time: Remainders from Long Division

Drill Time: Remainders from Long Division Drill Time: Remainders from Long Division Example (Drill Time: Remainders from Long Division) Get some practice finding remainders. Use your calculator (if you want) then check your answers with a neighbor.

More information

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,

More information

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Sumathra T 1, Nagaraja N S 2, Shreeganesh Kedilaya B 3 Department of E&C, Srinivas School of Engineering, Mukka, Mangalore Abstract-

More information

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography Prajakta Akole 1, Nikita Mane 2, Komal Shinde 3, Prof. Swati A. Khodke 4 123Student of Computer Engineering, JSPM s BSIOTR

More information

Created by Angela Jurgensen 2018

Created by Angela Jurgensen 2018 Created by Angela Jurgensen 2018 Hello, Humankits, and welcome to our ewarrior training program! When you complete it, you will have joined an elite taskforce, super prepared to explore the awesome online

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Colored Image Ciphering with Key Image

Colored Image Ciphering with Key Image EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 5/ August 2016 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Colored Image Ciphering with Key Image ZAINALABIDEEN ABDULLASAMD

More information

PaperCut Cloud Services: FAQs and Troubleshooting. Channel Availability Release: 18.3

PaperCut Cloud Services: FAQs and Troubleshooting. Channel Availability Release: 18.3 PaperCut Cloud Services: FAQs and Troubleshooting Channel Availability Release: 18.3 Notice While every effort has been taken to ensure the accuracy and usefulness of this guide, we cannot be held responsible

More information

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1 Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption

More information

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here Course Business Homework 2 Due Now Midterm is on March 1 Final Exam is Monday, May 1 (7 PM) Location: Right here Harry Hagrid 1 Cryptography CS 555 Topic 17: DES, 3DES 2 Recap Goals for This Week: Practical

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10 Dynamic extended DES Yi-Shiung Yeh 1, I-Te Chen 2, Ting-Yu Huang 1, Chan-Chi Wang 1, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta-Hsueh Road, HsinChu

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Proceedings of Meetings on Acoustics Volume 19, 213 http://acousticalsociety.org/ ICA 213 Montreal Montreal, Canada 2-7 June 213 Signal Processing in Acoustics Session 2pSP: Acoustic Signal Processing

More information

Computer Science as a Discipline

Computer Science as a Discipline Computer Science as a Discipline 1 Computer Science some people argue that computer science is not a science in the same sense that biology and chemistry are the interdisciplinary nature of computer science

More information

Number Theory and Public Key Cryptography Kathryn Sommers

Number Theory and Public Key Cryptography Kathryn Sommers Page!1 Math 409H Fall 2016 Texas A&M University Professor: David Larson Introduction Number Theory and Public Key Cryptography Kathryn Sommers Number theory is a very broad and encompassing subject. At

More information

#27: Number Theory, Part II: Modular Arithmetic and Cryptography May 1, 2009

#27: Number Theory, Part II: Modular Arithmetic and Cryptography May 1, 2009 #27: Number Theory, Part II: Modular Arithmetic and Cryptography May 1, 2009 This week you will study modular arithmetic arithmetic where we make the natural numbers wrap around by only considering their

More information

Endurance R/C Wi-Fi Servo Controller 2 Instructions

Endurance R/C Wi-Fi Servo Controller 2 Instructions Endurance R/C Wi-Fi Servo Controller 2 Instructions The Endurance R/C Wi-Fi Servo Controller 2 allows you to control up to eight hobby servos, R/C relays, light controllers and more, across the internet

More information

Sending Messages Using Morse Code

Sending Messages Using Morse Code Sending Messages Using Morse Code NATURE Sunday Academy 2012 2013 Project Description: In this lesson we will examine the background and history of Morse code. We will utilize internet websites and computer

More information

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques Aniketkulkarni Sheela.c DhirajDeshpande M.Tech, TOCE Asst.Prof, TOCE Asst.prof,BKIT aniketoxc@gmail.com

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Child Check In Frequently Asked Questions

Child Check In Frequently Asked Questions Child Check In Frequently Asked Questions Does Child Check In print to label printers (like Dymo)? Does Child Check In also print badges for the workers? How are the badges worn? How are the badges reused?

More information

Facebook Fan Page Secrets... 3 Section 1 Social Media Optimization... 4 Set Up Your Facebook Page... 4 Section 2 Fan Page Customization...

Facebook Fan Page Secrets... 3 Section 1 Social Media Optimization... 4 Set Up Your Facebook Page... 4 Section 2 Fan Page Customization... Facebook Fan Page Secrets... 3 Section 1 Social Media Optimization... 4 Set Up Your Facebook Page... 4 Section 2 Fan Page Customization... 6 Legitimize Your URL... 6 Customize the Look of Your Page...

More information

New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256

New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 New Linear Cryptanalytic Results of Reduced-Round of CAST-28 and CAST-256 Meiqin Wang, Xiaoyun Wang, and Changhui Hu Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education,

More information

DIY Pencil-and-Paper Encryption

DIY Pencil-and-Paper Encryption DIY Pencil-and-Paper Encryption Today we re surrounded by massive computational power and vast communication systems. When you visit your bank s site, you don t think about negotiating cryptographic keys

More information

DES Data Encryption standard

DES Data Encryption standard DES Data Encryption standard DES was developed by IBM as a modification of an earlier system Lucifer DES was adopted as a standard in 1977 Was replaced only in 2001 with AES (Advanced Encryption Standard)

More information

PaperCut VCA Cash Acceptor Manual

PaperCut VCA Cash Acceptor Manual PaperCut VCA Cash Acceptor Manual Contents 1 Introduction... 2 2 How PaperCut interfaces with the VCA... 2 3 Setup Phase 1: Device/Hardware Setup... 3 3.1 Networking/Firewall Configuration... 3 3.2 IP

More information

Go Daddy Online Photo Filer

Go Daddy Online Photo Filer Getting Started and User Guide Discover an easier way to share, print and manage your photos online! Online Photo Filer gives you an online photo album site for sharing photos, as well as easy-to-use editing

More information

Combinational Mathematics - I

Combinational Mathematics - I Combinational Mathematics - I Jon T. Butler Naval Postgraduate School, Monterey, CA, USA We are here I live here Meiji University 10:50-12:30 September 28, 2018 J. T. Butler Combinatorial Mathematics I

More information

UCP-Config Program Version: 3.28 HG A

UCP-Config Program Version: 3.28 HG A Program Description HG 76342-A UCP-Config Program Version: 3.28 HG 76342-A English, Revision 01 Dev. by: C.M. Date: 28.01.2014 Author(s): RAD Götting KG, Celler Str. 5, D-31275 Lehrte - Röddensen (Germany),

More information

METAVERSE WALLET USER MANUAL

METAVERSE WALLET USER MANUAL METAVERSE WALLET USER MANUAL V1.4 applies to version 0.7.1 of the Metaverse Wallet 2017-10-18 The Metaverse operation team CONTENTS 1. Preface... 3 1.1 Purpose... 3 1.2 Background... 3 2. Wallet Overview...

More information

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 7 and 8 Math Circles March 19th/20th/21st Cryptography Introduction Before we begin, it s important

More information

e-submission Quick Reference Guide for Economic Operators

e-submission Quick Reference Guide for Economic Operators e-submission Quick Reference Guide for Economic Operators e-submission Quick Guide for Economic Operators Page 1 Welcome to e-submission. This quick reference guide contains: Introduction to e-submission

More information

A Balanced Introduction to Computer Science, 3/E

A Balanced Introduction to Computer Science, 3/E A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN 978-0-13-216675-1 Chapter 10 Computer Science as a Discipline 1 Computer Science some people

More information

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and Effective Date: 2017/05/10 Updated date: 2017/05/25 This Privacy Policy describes the types of personal information SF Express Co., Ltd. and its affiliates (collectively as "SF") collect about consumers

More information

Managing Encryption. A guide for public safety decision makers. White Paper.

Managing Encryption. A guide for public safety decision makers. White Paper. Managing Encryption A guide for public safety decision makers White Paper Contents Introduction...03 System security...03 Level of Security...03 Encryption considerations... 04 End to end... 04 Managing

More information

PaperCut PaperCut Payment Gateway Module - Realex Realauth Redirect Quick Start Guide

PaperCut PaperCut Payment Gateway Module - Realex Realauth Redirect Quick Start Guide PaperCut PaperCut Payment Gateway Module - Realex Realauth Redirect Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting

More information

ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal

ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ABSTRACT Apple introduced ibeacons with ios 7, revolutionizing the way our phones interact with real- life places

More information

Chapter 4 MASK Encryption: Results with Image Analysis

Chapter 4 MASK Encryption: Results with Image Analysis 95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including

More information

Hacking for Beginners: The Complete Guide

Hacking for Beginners: The Complete Guide Hacking for Beginners: The Complete Guide Tim Barnes Copyright 2017 by Tim Barnes - All rights reserved. The following ebook is reproduced below with the goal of providing information that is as accurate

More information

COALESCE V2 CENTRAL COALESCE CENTRAL USER GUIDE WC-COA 24/7 TECHNICAL SUPPORT AT OR VISIT BLACKBOX.COM. Display Name.

COALESCE V2 CENTRAL COALESCE CENTRAL USER GUIDE WC-COA 24/7 TECHNICAL SUPPORT AT OR VISIT BLACKBOX.COM. Display Name. COALESCE CENTRAL USER GUIDE WC-COA COALESCE V2 CENTRAL 24/7 AT OR VISIT BLACKBOX.COM BY Import Displays Discover CSV File Manual Your Coalesce Instances Appearance and Usage Display Name Network Security

More information

Math 1111 Math Exam Study Guide

Math 1111 Math Exam Study Guide Math 1111 Math Exam Study Guide The math exam will cover the mathematical concepts and techniques we ve explored this semester. The exam will not involve any codebreaking, although some questions on the

More information

EOS 80D (W) Wireless Function Instruction Manual ENGLISH INSTRUCTION MANUAL

EOS 80D (W) Wireless Function Instruction Manual ENGLISH INSTRUCTION MANUAL EOS 80D (W) Wireless Function Instruction Manual ENGLISH INSTRUCTION MANUAL Introduction What You Can Do Using the Wireless Functions This camera s wireless functions let you perform a range of tasks wirelessly,

More information

Please insert inject more coins

Please insert inject more coins Please insert inject more coins Defcon Press XXI start Me? Nicolas Oberli (aka Balda) Swiss security engineer CTF enthusiast Retro gamer Beer drinker / brewer 2 It all started so simply... I wanted to

More information

AT-D868UV CodePlug Programming Guide

AT-D868UV CodePlug Programming Guide INTRODUCTION The AnyTone D868UV radio is a VHF and UHF radio with both Digital DMR (Tier I and II) and Analog capabilities. It offers a total of 4,000 channels (Analog and Digital) and up to 130,000 contacts,

More information

DRAFT 2016 CSTA K-12 CS

DRAFT 2016 CSTA K-12 CS 2016 CSTA K-12 CS Standards: Level 1 (Grades K-5) K-2 Locate and identify (using accurate terminology) computing, input, and output devices in a variety of environments (e.g., desktop and laptop computers,

More information

Random Bit Generation and Stream Ciphers

Random Bit Generation and Stream Ciphers Random Bit Generation and Stream Ciphers Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 8-1 Overview 1.

More information

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical

More information

Security Note. BBM Enterprise

Security Note. BBM Enterprise Security Note BBM Enterprise Published: 2017-10-31 SWD-20171031151244990 Contents Document revision history... 4 About this guide... 5 System requirements...6 Using BBM Enterprise... 8 How BBM Enterprise

More information

Service Pack Notes. Service Pack Notes for May 5, New Signing Experience Updates. Extended Transition Deadline

Service Pack Notes. Service Pack Notes for May 5, New Signing Experience Updates. Extended Transition Deadline Service Pack Notes Service Pack Notes for May 5, 2015 This document provides information about the updates deployed to the DocuSign Production environment as part of May 5, 2015 Service Pack. There are

More information

PaperCut PaperCut Payment Gateway Module Authorize.Net Quick Start Guide

PaperCut PaperCut Payment Gateway Module Authorize.Net Quick Start Guide PaperCut PaperCut Payment Gateway Module Authorize.Net Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up, and

More information

1 Document history Version Date Comments

1 Document history Version Date Comments V1.4 Contents 1 Document history... 2 2 What is TourneyKeeper?... 3 3 Creating your username and password... 4 4 Creating a tournament... 5 5 Editing a tournament... 8 6 Adding players to a tournament...

More information

How To Find Out What Facebook Knows About You

How To Find Out What Facebook Knows About You How To Find Out What Facebook Knows About You By Bob Cusick (Spoiler Alert: AAAAAAAAH!) So, after I wrote the last PDF called How To Stop (Some) Facebook Data Leaks (download here: https://bit.ly/2dlejbv)

More information

GPG Keysigning. Matthew Walster, Fastly UKNOF34, 21 April 2016

GPG Keysigning. Matthew Walster, Fastly UKNOF34, 21 April 2016 GPG Keysigning Matthew Walster, Fastly UKNOF34, 21 April 2016 Making encryption practical What is GPG? Making signing practical Making the internet safer Objective for this presentation UKNOF wants you

More information