COMP 4580 Computer Security
|
|
- Filip Kuipersё
- 5 jaren geleden
- Aantal bezoeken:
Transcriptie
1 COMP 4580 Computer Security Software Security I Dr. Noman Mohammed Winter 2019 Including slides from: David Brumley & others!
2 Software Security Software Lifecycle Requirements Design Implementation Testing Use Software problems are ubiquitous Therac-25 medical accelerator AT&T network outage 2
3 Adversarial Failures Software bugs are bad Consequences can be serious Even worse when an intelligent adversary wishes to exploit them! Force bugs into worst possible conditions/states Attacker able to violate security of your system (control, obtain private information,...) 3
4 Basics of Exploits A bug is a place where real execution behavior may deviate from expected behavior. An exploit is an input that gives an attacker an advantage Method Control Flow Hijack Denial of Service Information Disclosure Objective Gain control of the instruction pointer %eip Cause program to crash or stop servicing clients Leak private information, e.g., saved password 4
5 Control Flow Hijack Attacker s goal: Take over target machine (e.g. web server) Execute arbitrary code on target by hijacking application control flow Examples: Buffer overflow attacks Format string attacks 5
6 What is needed Attacker needs to know which CPU and OS used on the target machine: Our examples are for x86 running Linux Details vary slightly between CPUs and OSs: n Little endian vs. big endian (x86 vs. Motorola) n Stack Frame structure (Unix vs. Windows) We will review the basics today and will see the attacks in the next class 6
7 Outline Assembly Language Memory Layout 7
8 Turning C into Object Code Code in file: p.c Compile with command: gcc p.c -o p text C program (p.c) Compiler text Asm program (p.s) binary Assembler Object program (p.o) Linker Sta<c libraries (.a) binary Executable program (p) 8
9 The First Program - firstprog.c #include <stdio.h> int main() { int i; for(i=0; i < 10; i++) { printf("hello World!\n"); } } 9
10 How to Compile? 10
11 Assembly Language An assembly language is a low-level language for programming computers. Unlike C and other compiled languages, assembly language instructions have a direct one-to-one relationship with their corresponding machine language instructions. Each instruction (statement) in assembly language typically consists of an operation or opcode plus zero or more operands. 11
12 x86 Processor Registers6 Pro EIP EFLAGS EAX EDX ECX EBX ESP EBP ESI EDI Address of next instruction Condition codes General Purpose 12
13 Basic Ops and AT&T vs Intel Syntax source before destination destination before source Meaning AT&T Intel ebx = eax movl %eax, %ebx mov ebx, eax AT&T is at odds with assignment order. It is the default for objdump, and traditionally used for UNIX. Windows traditionally uses Intel, as is available via the objdump -M intel command line option 13
14 Disassembling Object Code Disassembler Objdump M intel -D a.out grep A20 main.: Objdump D a.out: useful tool for examining assembly code M intel: to show the output in Intel syntax grep A20 main.: piped into grep to display 20 lines after the reular expression main.: 14
15 Memory Address Machine Language Assembly Language 15
16 Hexadecimal Notation Each byte can be represented in hexadecimal notation, which is a base-16 numbering system. 0~9, A~F A byte has 256 (2^8) possible values. Thus, each byte can be described using 2 hexadecimal digits. Old Intel x86 processors have 2^32 possible addresses, while the 64-bit ones have 2^64 possible addresses. The 64-bit processors can run in 32-bit compatibility mode, which allows them to run 32-bit code quickly 16
17 Alternate Disassembly Within gdb Debugger gdb./a.out (gdb)disassemble main n disassembly of the main (gdb)break main n Breakpoint simply tells the debugger to pause the execution at the start of main (gdb)run (gdb)i r eip n The value of the register (instruction pointer) is displayed 17
18 Function Prologue 18
19 Function Prologue Function prologue is generated by the compiler to set up memory for the rest of the function's local variables. Part of the reason variables need to be declared in C is to aid the construction of this section of code. The debugger knows this part of the code is automatically generated and is smart enough to skip over it. 19
20 Examining Memory The GDB debugger provides a direct method to examine memory, using the command x x/11xb main Examine the 11 bytes in hexadecimal starting at main x/2xw $eip Debugger lets you reference registers directly, so $eip is equivalent to the value EIP contains at that moment Examine the 2 words (four-byte) in hexadecimal at $eip x/i $eip To display the memory as disassembled assembly language instructions. 20
21 On the x86 processor, values are stored in little-endian byte order, which means the least significant byte has lowest address 21
22 Outline Assembly Language Memory Layout 22
23 Memory Layout Stack Runtime stack E. g., local variables Heap Dynamically allocated storage When call malloc(), calloc(), new() Data Statically allocated data E.g., arrays & strings declared in code Text Executable machine instructions Read-only high address low address Stack Heap Data Text 23
24 Procedures/Functions We need to address several issues: 1. How to allocate space for local variables 2. How to pass parameters 3. How to pass return values 4. How to share 8 registers with an infinite number of local variables A stack frame provides space for these values Each procedure invocation has its own stack frame Stack discipline is LIFO n If procedure A calls B, B s frame must exit before A s 24
25 Carnegie Mellon Stack Frames Contents Local variables Return information Temporary space Previous Frame Management Space allocated when enter procedure n Set-up code Deallocated when return n Finish code Frame Pointer: %ebp Stack Pointer: %esp Frame for proc Stack Top 25
26 Function Call Chain blue( ) {... green()... } green( ) {... orange()... orange() } orange( ) {... orange()... } blue green orange orange orange
27 Function Call Chain Frame for blue Call to green pushes new frame blue green orange orange When orange returns it pops its frame orange... 27
28 On the stack int blue(int a, int b) { } char buf[16]; int c, d; if(a > b) c = a; else c = b; d = green(c, buf); return d; Need to access arguments Need space to store local vars (buf, c, and d) Need space to put arguments for callee Need a way for callee to return values Calling convention determines the above features 28
29 Carnegie Mellon Register Saving Conventions When procedure blue calls green: blue is the caller green is the callee Conventions Caller Save n Caller saves temporary values in its frame before the call Callee Save n Callee saves temporary values in its frame before using 29
30 Carnegie Mellon Register Usage %eax, %edx, %ecx Caller saves prior to call if values are used later %eax also used to return integer value %ebx, %esi, %edi Callee saves if wants to use them Caller- Save Temporaries Callee- Save Temporaries Special %eax %edx %ecx %ebx %esi %edi %esp %ebp 30
31 cdecl the default for Linux & gcc Int blue(int a, int b) { } char buf[16]; int c, d; if(a > b) c = a; else c = b; d = green(c, buf); return d; parameter area (caller) blue s initial stack frame to be created before calling green After green has been called b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c blue s ebp 31 %ebp frame %esp stack grow
32 Calling Conventions When blue attains control, 1. ess has already been pushed onto stack by caller b a %ebp (caller) %esp 32
33 Calling Conventions When blue attains control, 1. ess has already been pushed onto stack by caller 2. own the frame pointer - push caller s ebp - copy current esp into ebp - first argument is at ebp+8 b a caller s ebp %ebp and %esp 33
34 Calling Conventions When blue attains control, 1. ess has already been pushed onto stack by caller 2. own the frame pointer - push caller s ebp - copy current esp into ebp - first argument is at ebp+8 3. save values of other callee-save registers if used - edi, esi, ebx b a caller s ebp callee-save %ebp %esp 34
35 Calling Conventions When blue attains control, b 1. ess has already been pushed onto stack by caller 2. own the frame pointer - push caller s ebp - copy current esp into ebp - first argument is at ebp+8 3. save values of other callee-save registers if used - edi, esi, ebx blue s initial stack frame a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) %ebp %esp 4. allocate space for locals - subtracting from esp 35
36 Calling Conventions For caller blue to call callee green, b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) %ebp %esp 36
37 Calling Conventions For caller blue to call callee green, 1. push any caller-save registers if their values are needed after green returns - eax, edx, ecx b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save %ebp %esp 37
38 Calling Conventions For caller blue to call callee green, 1. push any caller-save registers if their values are needed after green returns - eax, edx, ecx 2. push arguments to green from right to left (reversed) - from callee s perspective, argument 1 is nearest in stack b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c %ebp %esp 38
39 Calling Conventions For caller blue to call callee green, b 1. push any caller-save registers if their values are needed after green returns - eax, edx, ecx 2. push arguments to green from right to left (reversed) - from callee s perspective, argument 1 is nearest in stack blue s stack frame a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) %ebp 3. push ess, i.e., the next instruction to execute in blue after green returns caller-save buf c %esp 39
40 Calling Conventions For caller blue to call callee green, b 1. push any caller-save registers if their values are needed after green returns - eax, edx, ecx 2. push arguments to green from right to left (reversed) - from callee s perspective, argument 1 is nearest in stack blue s stack frame a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) %ebp 3. push ess, i.e., the next instruction to execute in blue after green returns 4. transfer control to green - usually happens together with step 3 using call caller-save buf c 40 %esp
41 Calling Conventions When green attains control, 1. ess has already been pushed onto stack by blue b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c 41 %ebp %esp
42 Calling Conventions When green attains control, 1. ess has already been pushed onto stack by blue 2. own the frame pointer b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c blue s ebp 42 %ebp and %esp
43 Calling Conventions When green attains control, 1. ess has already been pushed onto stack by blue 2. own the frame pointer 3. (green is doing its stuff) b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c blue s ebp 43 %ebp %esp
44 Calling Conventions When green attains control, 1. ess has already been pushed onto stack by blue 2. own the frame pointer 3. (green is doing its stuff) 4. store return value, if any, in eax 5. deallocate locals - adding to esp 6. restore any callee-save registers b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c blue s ebp 44 %ebp and %esp
45 Calling Conventions When green attains control, 1. ess has already been pushed onto stack by blue 2. own the frame pointer 3. (green is doing its stuff) 4. store return value, if any, in eax 5. deallocate locals - adding to esp 6. restore any callee-save registers 7. restore blue s frame pointer - pop %ebp b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c 45 %ebp %esp
46 Calling Conventions When green attains control, 1. ess has already been pushed onto stack by blue 2. own the frame pointer 3. (green is doing its stuff) 4. store return value, if any, in eax 5. deallocate locals - adding to esp 6. restore any callee-save registers 7. restore blue s frame pointer - pop %ebp 8. return control to blue - ret - pops ess from stack and jumps there b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c 46 %ebp %esp
47 Calling Conventions When blue regains control, b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) caller-save buf c %ebp %esp 47
48 Calling Conventions When blue regains control, 1. clean up arguments to green - adding to esp 2. restore any caller-save registers - pops 3. b a caller s ebp callee-save locals (buf, c, d 24 bytes if stored on stack) %ebp %esp 48
49 Terminology Function Prologue instructions to set up stack space and save callee saved registers Typical sequence: push ebp ebp = esp esp = esp - <frame space> Function Epilogue - instructions to clean up stack space and restore callee saved registers Typical Sequence: leave // esp = ebp, pop ebp ret // pop and jump to ret addr 49
50 Recap Compiler workflow GDB debugger provides a method to examine memory Memory Layout Text, Data, Heap and Stack Stack grows down Pass arguments, callee and caller saved, stack frame 50
Machine-Level Programming III: Procedures
Machine-Level Programming III: Procedures Topics IA32 stack discipline Register saving conventions Creating pointers to local variables IA32 Region of memory managed with stack discipline Grows toward
Nadere informatieSoftware Security III
COMP 4580 Computer Security Software Security III Dr. Noman Mohammed Winter 2019 Including slides from: David Brumley & others! Outline Assembly Language Memory Layout Control Flow Hijacking Methods Buffer
Nadere informatieSettings for the C100BRS4 MAC Address Spoofing with cable Internet.
Settings for the C100BRS4 MAC Address Spoofing with cable Internet. General: Please use the latest firmware for the router. The firmware is available on http://www.conceptronic.net! Use Firmware version
Nadere informatie2019 SUNEXCHANGE USER GUIDE LAST UPDATED
2019 SUNEXCHANGE USER GUIDE LAST UPDATED 0 - -19 1 WELCOME TO SUNEX DISTRIBUTOR PORTAL This user manual will cover all the screens and functions of our site. MAIN SCREEN: Welcome message. 2 LOGIN SCREEN:
Nadere informatieMyDHL+ Van Non-Corporate naar Corporate
MyDHL+ Van Non-Corporate naar Corporate Van Non-Corporate naar Corporate In MyDHL+ is het mogelijk om meerdere gebruikers aan uw set-up toe te voegen. Wanneer er bijvoorbeeld meerdere collega s van dezelfde
Nadere informatieALGORITMIEK: answers exercise class 7
Problem 1. See slides 2 4 of lecture 8. Problem 2. See slides 4 6 of lecture 8. ALGORITMIEK: answers exercise class 7 Problem 5. a. Als we twee negatieve (< 0) getallen bij elkaar optellen is het antwoord
Nadere informatieGeneral info on using shopping carts with Ingenico epayments
Inhoudsopgave 1. Disclaimer 2. What is a PSPID? 3. What is an API user? How is it different from other users? 4. What is an operation code? And should I choose "Authorisation" or "Sale"? 5. What is an
Nadere informatieDeel 1: schriftelijk deel
Examen Computerarchitectuur en systeemsoftware Donderdag 15 januari 2009, namiddag Deel 1: schriftelijk deel Algemene bemerkingen: Het examen bestaat uit 2 delen. Dit zijn de vragen voor het eerste deel.
Nadere informatieDALISOFT. 33. Configuring DALI ballasts with the TDS20620V2 DALI Tool. Connect the TDS20620V2. Start DALISOFT
TELETASK Handbook Multiple DoIP Central units DALISOFT 33. Configuring DALI ballasts with the TDS20620V2 DALI Tool Connect the TDS20620V2 If there is a TDS13620 connected to the DALI-bus, remove it first.
Nadere informatieActivant Prophet 21. Prophet 21 Version 12.0 Upgrade Information
Activant Prophet 21 Prophet 21 Version 12.0 Upgrade Information This class is designed for Customers interested in upgrading to version 12.0 IT staff responsible for the managing of the Prophet 21 system
Nadere informatieFirewall van de Speedtouch 789wl volledig uitschakelen?
Firewall van de Speedtouch 789wl volledig uitschakelen? De firewall van de Speedtouch 789 (wl) kan niet volledig uitgeschakeld worden via de Web interface: De firewall blijft namelijk op stateful staan
Nadere informatieAdd the standing fingers to get the tens and multiply the closed fingers to get the units.
Digit work Here's a useful system of finger reckoning from the Middle Ages. To multiply $6 \times 9$, hold up one finger to represent the difference between the five fingers on that hand and the first
Nadere informatieHoe te verbinden met NDI Remote Office (NDIRO): Apple OS X How to connect to NDI Remote Office (NDIRO): Apple OS X
Handleiding/Manual Hoe te verbinden met (NDIRO): Apple OS X How to connect to (NDIRO): Apple OS X Inhoudsopgave / Table of Contents 1 Verbinden met het gebruik van Apple OS X (Nederlands)... 3 2 Connect
Nadere informatieAVG / GDPR -Algemene verordening gegevensbescherming -General data Protection Regulation
AVG / GDPR -Algemene verordening gegevensbescherming -General data Protection Regulation DPS POWER B.V. 2018 Gegevensbeschermingsmelding Wij, DPS POWER B.V., beschouwen de bescherming van uw persoonlijke
Nadere informatieSAMPLE 11 = + 11 = + + Exploring Combinations of Ten + + = = + + = + = = + = = 11. Step Up. Step Ahead
7.1 Exploring Combinations of Ten Look at these cubes. 2. Color some of the cubes to make three parts. Then write a matching sentence. 10 What addition sentence matches the picture? How else could you
Nadere informatieHandleiding Installatie ADS
Handleiding Installatie ADS Versie: 1.0 Versiedatum: 19-03-2014 Inleiding Deze handleiding helpt u met de installatie van Advantage Database Server. Zorg ervoor dat u bij de aanvang van de installatie
Nadere informatieBasic operations Implementation options
Priority Queues Heaps Heapsort Student questions EditorTrees WA 6 File Compression Graphs Hashing Anything else Written Assignments 7 and 8 have been updated for this term. Each of them is smaller than
Nadere informatieQuality requirements concerning the packaging of oak lumber of Houthandel Wijers vof (09.09.14)
Quality requirements concerning the packaging of oak lumber of (09.09.14) Content: 1. Requirements on sticks 2. Requirements on placing sticks 3. Requirements on construction pallets 4. Stick length and
Nadere informatieIntroductie in flowcharts
Introductie in flowcharts Flow Charts Een flow chart kan gebruikt worden om: Processen definieren en analyseren. Een beeld vormen van een proces voor analyse, discussie of communicatie. Het definieren,
Nadere informatieANGSTSTOORNISSEN EN HYPOCHONDRIE: DIAGNOSTIEK EN BEHANDELING (DUTCH EDITION) FROM BOHN STAFLEU VAN LOGHUM
Read Online and Download Ebook ANGSTSTOORNISSEN EN HYPOCHONDRIE: DIAGNOSTIEK EN BEHANDELING (DUTCH EDITION) FROM BOHN STAFLEU VAN LOGHUM DOWNLOAD EBOOK : ANGSTSTOORNISSEN EN HYPOCHONDRIE: DIAGNOSTIEK STAFLEU
Nadere informatieCalculator spelling. Assignment
Calculator spelling A 7-segmentdisplay is used to represent digits (and sometimes also letters). If a screen is held upside down by coincide, the digits may look like letters from the alphabet. This finding
Nadere informatieMulti user Setup. Firebird database op een windows (server)
Multi user Setup Firebird database op een windows (server) Inhoudsopgave osfinancials multi user setup...3 Installeeren van de firebird database...3 Testing van de connectie met FlameRobin...5 Instellen
Nadere informatieMyDHL+ Tarief berekenen
MyDHL+ Tarief berekenen Bereken tarief in MyDHL+ In MyDHL+ kunt u met Bereken tarief heel eenvoudig en snel opvragen welke producten er mogelijk zijn voor een bestemming. Ook ziet u hierbij het geschatte
Nadere informatieHet beheren van mijn Tungsten Network Portal account NL 1 Manage my Tungsten Network Portal account EN 14
QUICK GUIDE C Het beheren van mijn Tungsten Network Portal account NL 1 Manage my Tungsten Network Portal account EN 14 Version 0.9 (June 2014) Per May 2014 OB10 has changed its name to Tungsten Network
Nadere informatiePreschool Kindergarten
Preschool Kindergarten Objectives Students will recognize the values of numerals 1 to 10. Students will use objects to solve addition problems with sums from 1 to 10. Materials Needed Large number cards
Nadere informatieThe first line of the input contains an integer $t \in \mathbb{n}$. This is followed by $t$ lines of text. This text consists of:
Document properties Most word processors show some properties of the text in a document, such as the number of words or the number of letters in that document. Write a program that can determine some of
Nadere informatieL.Net s88sd16-n aansluitingen en programmering.
De L.Net s88sd16-n wordt via één van de L.Net aansluitingen aangesloten op de LocoNet aansluiting van de centrale, bij een Intellibox of Twin-Center is dat de LocoNet-T aansluiting. L.Net s88sd16-n aansluitingen
Nadere informatieBeter, Sneller, Mooier. Processoren 12 januari 2015
Beter, Sneller, Mooier Processoren 12 januari 2015 Beter! Sneller! Krachtigere CPU: maak instructies die meer doen Snellere CPU: pipeline, out-of-order execution Sneller RAM: cache meer mogelijkheden...
Nadere informatieFOR DUTCH STUDENTS! ENGLISH VERSION NEXT PAGE. Toets Inleiding Kansrekening 1 8 februari 2010
FOR DUTCH STUDENTS! ENGLISH VERSION NEXT PAGE Toets Inleiding Kansrekening 1 8 februari 2010 Voeg aan het antwoord van een opgave altijd het bewijs, de berekening of de argumentatie toe. Als je een onderdeel
Nadere informatieB1 Woordkennis: Spelling
B1 Woordkennis: Spelling Bestuderen Inleiding Op B1 niveau gaan we wat meer aandacht schenken aan spelling. Je mag niet meer zoveel fouten maken als op A1 en A2 niveau. We bespreken een aantal belangrijke
Nadere informatie(1) De hoofdfunctie van ons gezelschap is het aanbieden van onderwijs. (2) Ons gezelschap is er om kunsteducatie te verbeteren
(1) De hoofdfunctie van ons gezelschap is het aanbieden van onderwijs (2) Ons gezelschap is er om kunsteducatie te verbeteren (3) Ons gezelschap helpt gemeenschappen te vormen en te binden (4) De producties
Nadere informatie3HUIRUPDQFH0HDVXUHPHQW RI'\QDPLFDOO\&RPSLOHG -DYD([HFXWLRQV
3HUIRUPDQFH0HDVXUHPHQW RI'\QDPLFDOO\&RPSLOHG -DYD([HFXWLRQV Tia Newhall and Barton P. Miller {newhall *, bart}@cs.wisc.edu Computer Sciences University of Wisconsin 1210 W. Dayton St. Madison, WI 53706
Nadere informatieAssemblers. TU-Delft. in101/99-pds 1
Assemblers in101/99-pds 1 Goals l Assembler is a symbolic notation for machine language l It improves readability: - Assember: Move R0,SUM - Machine code: 0010 1101 1001 0001 (16 bits) in101/99-pds 2 Why
Nadere informatieMyDHL+ Uw accountnummer(s) delen
MyDHL+ Uw accountnummer(s) delen met anderen Uw accountnummer(s) delen met anderen in MyDHL+ In MyDHL+ is het mogelijk om uw accountnummer(s) te delen met anderen om op uw accountnummer een zending te
Nadere informatieHoe met Windows 8 te verbinden met NDI Remote Office (NDIRO) How to connect With Windows 8 to NDI Remote Office (NDIRO
Handleiding/Manual Hoe met Windows 8 te verbinden met NDI Remote Office (NDIRO) How to connect With Windows 8 to NDI Remote Office (NDIRO Inhoudsopgave / Table of Contents 1 Verbinden met het gebruik van
Nadere informatieL.Net s88sd16-n aansluitingen en programmering.
De L.Net s88sd16-n wordt via één van de L.Net aansluitingen aangesloten op de LocoNet aansluiting van de centrale, bij een Intellibox of Twin-Center is dat de LocoNet-T aansluiting. L.Net s88sd16-n aansluitingen
Nadere informatieToday s class. Digital Logic. Informationsteknologi. Friday, October 19, 2007 Computer Architecture I - Class 8 1
Today s class Digital Logic Friday, October 19, 2007 Computer Architecture I - Class 8 1 Digital circuits Two logical values Binary 0 (signal between 0 and 1 volt) Binary 1 (signal between 2 and 5 volts)
Nadere informatieGroup work to study a new subject.
CONTEXT SUBJECT AGE LEVEL AND COUNTRY FEATURE OF GROUP STUDENTS NUMBER MATERIALS AND TOOLS KIND OF GAME DURATION Order of operations 12 13 years 1 ste year of secundary school (technical class) Belgium
Nadere informatieThe genesis of the game is unclear. Possibly, dominoes originates from China and the stones were brought here by Marco Polo, but this is uncertain.
Domino tiles Dominoes is a game played with rectangular domino 'tiles'. Today the tiles are often made of plastic or wood, but in the past, they were made of real stone or ivory. They have a rectangle
Nadere informatieAfter that, the digits are written after each other: first the row numbers, followed by the column numbers.
Bifid cipher The bifid cipher is one of the classical cipher techniques that can also easily be executed by hand. The technique was invented around 1901 by amateur cryptographer Felix Delastelle. The cipher
Nadere informatieopen standaard hypertext markup language internetprotocol transmission control protocol internet relay chat office open xml
DOWNLOAD OR READ : OPEN STANDAARD HYPERTEXT MARKUP LANGUAGE INTERNETPROTOCOL TRANSMISSION CONTROL PROTOCOL INTERNET RELAY CHAT OFFICE OPEN XML PDF EBOOK EPUB MOBI Page 1 Page 2 relay chat office open xml
Nadere informatieMyDHL+ ProView activeren in MyDHL+
MyDHL+ ProView activeren in MyDHL+ ProView activeren in MyDHL+ In MyDHL+ is het mogelijk om van uw zendingen, die op uw accountnummer zijn aangemaakt, de status te zien. Daarnaast is het ook mogelijk om
Nadere informatieNever trust a bunny. D. J. Bernstein University of Illinois at Chicago. Tanja Lange Technische Universiteit Eindhoven
Never trust a bunny D. J. Bernstein University of Illinois at Chicago Tanja Lange Technische Universiteit Eindhoven The HB(n; ; 0 ) protocol (2001 Hopper Blum) Secret s 2 F n 2. Reader sends random C 2
Nadere informatieIntroduction to Compgenomics Part II. Lee Katz January 13, 2010
Introduction to Compgenomics Part II Lee Katz January 13, 2010 All students and groups should be on the Wiki Wiki needs to be closed and secured by Friday How are we doing 2 Introduction to using the server
Nadere informatieRECEPTEERKUNDE: PRODUCTZORG EN BEREIDING VAN GENEESMIDDELEN (DUTCH EDITION) FROM BOHN STAFLEU VAN LOGHUM
Read Online and Download Ebook RECEPTEERKUNDE: PRODUCTZORG EN BEREIDING VAN GENEESMIDDELEN (DUTCH EDITION) FROM BOHN STAFLEU VAN LOGHUM DOWNLOAD EBOOK : RECEPTEERKUNDE: PRODUCTZORG EN BEREIDING VAN STAFLEU
Nadere informatieProcedure Reset tv-toestellen:
Procedure Reset tv-toestellen: Volgende procedure is te volgen wanneer er een tv-toestel, op een van de kamers niet meer werkt. TV Re-installation Factory Default Her-installeren van de TV Fabrieksinstellingen
Nadere informatieGenetic code. Assignment
Genetic code The genetic code consists of a number of lines that determine how living cells translate the information coded in genetic material (DNA or RNA sequences) to proteins (amino acid sequences).
Nadere informatieHandleiding Zuludesk Parent
Handleiding Zuludesk Parent Handleiding Zuludesk Parent Met Zuludesk Parent kunt u buiten schooltijden de ipad van uw kind beheren. Hieronder vind u een korte handleiding met de mogelijkheden. Gebruik
Nadere informatieFOD VOLKSGEZONDHEID, VEILIGHEID VAN DE VOEDSELKETEN EN LEEFMILIEU 25/2/2016. Biocide CLOSED CIRCUIT
1 25/2/2016 Biocide CLOSED CIRCUIT 2 Regulatory background and scope Biocidal products regulation (EU) nr. 528/2012 (BPR), art. 19 (4): A biocidal product shall not be authorised for making available on
Nadere informatieNCTS - INFORMATIE INZAKE NIEUWIGHEDEN VOOR 2010
NCTS - INFORMATIE INZAKE NIEUWIGHEDEN VOOR 2010 Op basis van het nieuwe artikel 365, lid 4 (NCTS) en het nieuwe artikel 455bis, lid 4 (NCTS-TIR) van het Communautair Toepassingswetboek inzake douane 1
Nadere informatieInstallatie instructies
OpenIMS CE Versie 4.2 Installatie instructies OpenSesame ICT BV Inhoudsopgave 1 INLEIDING... 3 2 INSTALLATIE INSTRUCTIES... 4 3 OPENIMS SITECOLLECTIE CONFIGURATIE... 6 OpenIMS CE Installatie instructies
Nadere informatieEsther Lee-Varisco Matt Zhang
Esther Lee-Varisco Matt Zhang Want to build a wine cellar Surface temperature varies daily, seasonally, and geologically Need reasonable depth to build the cellar for lessened temperature variations Building
Nadere informatieMyDHL+ Duties Taxes Paid
MyDHL+ Duties Taxes Paid MyDHL+ - verbeterde werkwijze zending aanmaken met service Duties Taxes Paid Intraship In Intraship kiest u voor de Extra service optie Duty Taxes Paid als u wilt dat de transportkosten,
Nadere informatieSoftware Reverse Engineering. Jacco Krijnen
Software Reverse Engineering Jacco Krijnen Opbouw Inleiding en definitie Techniek Assemblers/Disassemblers Compilers/Decompilers Toepassingen Security Overige Softwarebeveiliging Piracy Anti RE technieken
Nadere informatieConcept of Feedback. P.S. Gandhi Mechanical Engineering IIT Bombay
Concept of Feedback P.S. Gandhi Mechanical Engineering IIT Bombay Recap Goal of the course: understanding and learning Assignments: optional to start with Contact hour with TAs: Monday AN: time? Meeting
Nadere informatieGS1 Data Source. Guide to the management of digital files for data suppliers and recipients
GS1 Data Source Guide to the management of digital files for data suppliers and recipients Version 1.4, Definitief - goedgekeurd, 11 December 2018 Summary Document property Name Value GS1 Data Source Date
Nadere informatieCambridge Assessment International Education Cambridge International General Certificate of Secondary Education. Published
Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education DUTCH 055/02 Paper 2 Reading MARK SCHEME Maximum Mark: 45 Published This mark scheme is published
Nadere informatieMyDHL+ Exportzending aanmaken
MyDHL+ Exportzending aanmaken Exportzending aanmaken In MyDHL+ is het aanmaken van een exportzending zo eenvoudig mogelijk gemaakt. De website en deze handleiding zal u stap voor stap erdoorheen leiden.
Nadere informatieData Handling Ron van Lammeren - Wageningen UR
Data Handling 1 2010-2011 Ron van Lammeren - Wageningen UR Can I answer my scientific questions? Geo-data cycle Data handling / introduction classes of data handling data action models (ISAC) Queries (data
Nadere informatieShipment Centre EU Quick Print Client handleiding [NL]
Shipment Centre EU Quick Print Client handleiding [NL] Please scroll down for English. Met de Quick Print Client kunt u printers in Shipment Centre EU configureren. De Quick Print Client kan alleen op
Nadere informatieHow to install and use dictionaries on the ICARUS Illumina HD (E652BK)
(for Dutch go to page 4) How to install and use dictionaries on the ICARUS Illumina HD (E652BK) The Illumina HD offers dictionary support for StarDict dictionaries.this is a (free) open source dictionary
Nadere informatieSysteem Wand Samenstellings Applicatie. Cabinet configuration tool. Nederlandse handleiding
Systeem Wand Samenstellings Applicatie Cabinet configuration tool Nederlandse handleiding 1 Handleiding bylsma wand configuratie tool... 2 1.1 Disclaimer... 2 2 Wand samenstellen... 2 2.1 Applicatie lay-out...
Nadere informatieLuister alsjeblieft naar een opname als je de vragen beantwoordt of speel de stukken zelf!
Martijn Hooning COLLEGE ANALYSE OPDRACHT 1 9 september 2009 Hierbij een paar vragen over twee stukken die we deze week en vorige week hebben besproken: Mondnacht van Schumann, en het eerste deel van het
Nadere informatieChief Secretary Switch with Htek & Yeastar S-series Versie ( )
2018 Chief Secretary Switch with Htek & Yeastar S-series Versie 1.0.0 (20180919) CONTENT Chef Secretaresse schakeling met de tiptel/htek UC9XX IP toestellen en Yeastar S-series ipbx Chief Secretary switch
Nadere informatieHandleiding Digipass DP310
Handleiding Digipass DP310 Deze handleiding geeft u uitleg over het activeren en gebruik maken van uw Digipass. Toetsen van de Digipass OK: voor het aan- of uitschakelen van het apparaat of om een handeling
Nadere informatie9 daagse Mindful-leSs 3 stappen plan training
9 daagse Mindful-leSs 3 stappen plan training In 9 dagen jezelf volledig op de kaart zetten Je energie aangevuld en in staat om die batterij op peil te houden. Aan het eind heb jij Een goed gevoel in je
Nadere informatieWWW.EMINENT-ONLINE.COM
WWW.EMINENT-OINE.COM HNDLEIDING USERS MNUL EM1016 HNDLEIDING EM1016 USB NR SERIEEL CONVERTER INHOUDSOPGVE: PGIN 1.0 Introductie.... 2 1.1 Functies en kenmerken.... 2 1.2 Inhoud van de verpakking.... 2
Nadere informatieFunctioneel Ontwerp / Wireframes:
Functioneel Ontwerp / Wireframes: Het functioneel ontwerp van de ilands applicatie voor op de iphone is gebaseerd op het iphone Human Interface Guidelines handboek geschreven door Apple Inc 2007. Rounded-Rectangle
Nadere informatieOpen source VoIP Networks
Open source VoIP Networks Standard PC hardware inexpensive add-in vs. embedded designs Ing. Bruno Impens Overview History Comparison PC - Embedded More on VoIP VoIP Hardware VoIP more than talk More...
Nadere informatieClassification of triangles
Classification of triangles A triangle is a geometrical shape that is formed when 3 non-collinear points are joined. The joining line segments are the sides of the triangle. The angles in between the sides
Nadere informatieAim of this presentation. Give inside information about our commercial comparison website and our role in the Dutch and Spanish energy market
Aim of this presentation Give inside information about our commercial comparison website and our role in the Dutch and Spanish energy market Energieleveranciers.nl (Energysuppliers.nl) Founded in 2004
Nadere informatieQuick start guide. Powerbank MI Mah. Follow Fast All rights reserved. Page 1
Quick start guide Powerbank MI 16.000 Mah Follow Fast 2016 - All rights reserved. Page 1 ENGLISH The Mi 16000 Power Bank is a very good backup option for those on the move. It can keep you going for days
Nadere informatieIt s all about the money Group work
It s all about the money Group work Tijdsduur: 45 minuten Kernwoorden: money (geld) coin (munt), banknote (bankbiljet), currency (munteenheid) Herhalings-/uitbreidingswoorden: debate (debat), proposal
Nadere informatiePointers and References
Steven Zeil October 2, 2013 Outline 1 References 2 Working with Can Be Dangerous 3 The Secret World of and Arrays Pointer and Strings and Member Functions Indirection and references allow us to add a layer
Nadere informatieGOVERNMENT NOTICE. STAATSKOERANT, 18 AUGUSTUS 2017 No NATIONAL TREASURY. National Treasury/ Nasionale Tesourie NO AUGUST
National Treasury/ Nasionale Tesourie 838 Local Government: Municipal Finance Management Act (56/2003): Draft Amendments to Municipal Regulations on Minimum Competency Levels, 2017 41047 GOVERNMENT NOTICE
Nadere informatieComputerarchitectuur. H&P Appendix A: Instruction Set Principles
Computerarchitectuur H&P Appendix A: Instruction Set Principles Kristian Rietveld http://ca.liacs.nl/ Instruction Sets Een processor moet precies worden verteld wat deze moet doen. Dit staat opgeschreven
Nadere informatieTentamen Objectgeorienteerd Programmeren
Tentamen Objectgeorienteerd Programmeren 5082IMOP6Y maandag 16 november 2015 13:00 15:00 Schrijf je naam en studentnummer op de regel hieronder. Sla deze pagina niet om tot de surveillant vertelt dat het
Nadere informatieZo werkt het in de apotheek (Basiswerk AG) (Dutch Edition)
Zo werkt het in de apotheek (Basiswerk AG) (Dutch Edition) C.R.C. Huizinga-Arp Click here if your download doesn"t start automatically Zo werkt het in de apotheek (Basiswerk AG) (Dutch Edition) C.R.C.
Nadere informatieEM7680 Firmware Update by OTA
EM7680 Firmware Update by OTA 2 NEDERLANDS/ENGLISH EM7680 Firmware update by OTA Table of contents 1.0 (NL) Introductie... 3 2.0 (NL) Firmware installeren... 3 3.0 (NL) Release notes:... 3 4.0 (NL) Overige
Nadere informatieMemory Management. Virtual Memory. Eisen Memory Management. Verdelen geheugen over meerdere processen
Memory Management Process control information Entry point to program Process Control Block Verdelen geheugen over meerdere processen Program Branch instruction Virtual Memory Data Reference to data Processen
Nadere informatieRegistratie- en activeringsproces voor de Factuurstatus Service NL 1 Registration and activation process for the Invoice Status Service EN 10
QUICK GUIDE B Registratie- en activeringsproces voor de Factuurstatus Service NL 1 Registration and activation process for the Invoice Status Service EN 10 Version 0.19 (Oct 2016) Per May 2014 OB10 has
Nadere informatieDemo document template available on the Rapptorlab website
Proef ingediend met het oog op het behalen van de graad van bachelor in de Ingenieurswetenschappen Demo document template available on the Rapptorlab website Course/thesis example Laurent Segers, Tom van
Nadere informatieMobile Devices, Applications and Data
Mobile Devices, Applications and Data 1 Jits Langedijk Senior Consultant Jits.langedijk@pqr.nl Peter Sterk Solution Architect peter.sterk@pqr.nl Onderwerpen - Rol van Mobile IT in Tomorrow s Workspace
Nadere informatieFour-card problem. Input
Four-card problem The four-card problem (also known as the Wason selection task) is a logic puzzle devised by Peter Cathcart Wason in 1966. It is one of the most famous tasks in the study of deductive
Nadere informatieProgrammeren. Cursus Python
Programmeren Cursus Python Cursus Python Omschrijving In deze cursus leren de deelnemers te programmeren in de objectgeoriënteerde programmeertaal Python. Python is een taal die vaak wordt gebruikt voor
Nadere informatieLDAP Server on Yeastar MyPBX & tiptel 31xx/32xx series
LDAP Server on Yeastar MyPBX & tiptel 31xx/32xx series Tiptel b.v. Camerastraat 2 1322 BC Almere tel.: +31-36-5366650 fax.: +31-36-5367881 info@tiptel.nl Versie 1.2.0 (09022016) Nederlands: De LDAP server
Nadere informatieLeeftijdcheck (NL) Age Check (EN)
Leeftijdcheck (NL) Age Check (EN) [Type text] NL: Verkoopt u producten die niet aan jonge bezoekers verkocht mogen worden of heeft uw webwinkel andere (wettige) toelatingscriteria? De Webshophelpers.nl
Nadere informatieMyDHL+ Dangerous Goods
MyDHL+ Dangerous Goods Dangerous Goods zending aanmaken In MyDHL+ is het aanmaken van uw zending zo eenvoudig mogelijk gemaakt. De website en daarbij deze handleiding zal u stap voor stap erdoorheen leiden.
Nadere informatie1a. We werken het geval voor het tandenpoetsen uit. De concepten zijn (we gebruiken Engelse termen en afkortingen):
Uitwerking Huiswerkopgave Inleiding Modelleren Hoofdstuk 3 1a. We werken het geval voor het tandenpoetsen uit. De concepten zijn (we gebruiken Engelse termen en afkortingen): tube=[cap:{open,close},hand:{l,r,none}]
Nadere informatieCTI SUITE TSP DETAILS
CTI SUITE TSP DETAILS TAPI allows an application to access telephony services provided by a telecom PABX. In order to implement its access to ETRADEAL, a TAPI interface has been developed by Etrali. As
Nadere informatieAgilent EEsof EDA. Waveform Bridge to FlexDCA and Infiniium. New Features for Solving HSD Challenges with ADS Heidi Barnes June 17/18/20, 2013
New Features for Solving HSD Challenges with ADS 2013 Waveform Bridge to FlexDCA and Infiniium Agilent EEsof EDA Heidi Barnes June 17/18/20, 2013 Copyright 2013 Agilent Technologies 1 Agenda Post-Layout
Nadere informatieOpgave 2 Geef een korte uitleg van elk van de volgende concepten: De Yield-to-Maturity of a coupon bond.
Opgaven in Nederlands. Alle opgaven hebben gelijk gewicht. Opgave 1 Gegeven is een kasstroom x = (x 0, x 1,, x n ). Veronderstel dat de contante waarde van deze kasstroom gegeven wordt door P. De bijbehorende
Nadere informatiez x 1 x 2 x 3 x 4 s 1 s 2 s 3 rij rij rij rij
ENGLISH VERSION SEE PAGE 3 Tentamen Lineaire Optimalisering, 0 januari 0, tijdsduur 3 uur. Het gebruik van een eenvoudige rekenmachine is toegestaan. Geef bij elk antwoord een duidelijke toelichting. Als
Nadere informatieChromosomal crossover
Chromosomal crossover As one of the last steps of genetic recombination two homologous chromosomes can exchange genetic material during meiosis in a process that is referred to as synapsis. Because of
Nadere informatieBeter, Sneller, Mooier. Processoren 27 maart 2012
Beter, Sneller, Mooier Processoren 27 maart 2012 Beter! Sneller! Krach:gere CPU: microcode Snellere CPU: pipeline, out- of- order execu:on Sneller RAM: cache meer mogelijkheden... Welke extra s kan processor-
Nadere informatieYes/No (if not you pay an additional EUR 75 fee to be a member in 2020
Meedoen aan dit evenement? Meld je eenvoudig aan Ben je lid? Ja/Nee Do you want to participate? Please apply Are you a LRCH member? Yes/No (if not you pay an additional EUR 75 fee to be a member in 2020
Nadere informatieIntroductie tot het ON0RCL Echolink-systeem
Introductie tot het ON0RCL Echolink-systeem Bijgedragen door Douglas Ros Radio Club Leuven De bedoeling van Echolink is verre spraak-verbindingen tussen radioamateurs mogelijk te maken, gebruik makend
Nadere informatieContents. Introduction Problem Definition The Application Co-operation operation and User friendliness Design Implementation
TeleBank Contents Introduction Problem Definition The Application Co-operation operation and User friendliness Design Implementation Introduction - TeleBank Automatic bank services Initiates a Dialog with
Nadere informatieInteraction Design for the Semantic Web
Interaction Design for the Semantic Web Lynda Hardman http://www.cwi.nl/~lynda/courses/usi08/ CWI, Semantic Media Interfaces Presentation of Google results: text 2 1 Presentation of Google results: image
Nadere informatieLinux Assembly Uitwerkingen van de vragen en opdrachten
Linux Assembly Uitwerkingen van de vragen en opdrachten The choice of a GNU generation Hoofdstuk 3 1. (a) Een system call is een functie geleverd door de kernel (het operating system, een interface tussen
Nadere informatie