MPTC 5.0 reviews text files; Microsoft (MS) Word, PowerPoint, and Excel in the MS Office 2000, XP, and 2003 formats; MS Access in the XP and 2003 formats; and dxf CAD files for keywords supplied by the reviewer. Keywords are specified in a keyword file or entered via the GUI at review time so that each document review can be customized. In addition, MPTC detects embedded objects and removes Microsoft-documented metadata from the supported MS Office file formats. After each review, a user can examine the review log for MPTC's findings. A file can be opened with its creating application from within MPTC for visual review and resolution of review failures. If MPTC pases the file file or the reviewer has resolved review failures, the reviewer can transfer the file to an unclassified, removable medium with the following caveats: MPTC prohibits the transfer of any file containing a hidden data stream. Compressed files and file archives cannot be transferred without first uncompressing or extracting the files. MPTC provides a detection mechanism for Java-based intelligent agents and rudimentary steganography detection capability. MPTC ensures that only the designated files are copied, moved, or deleted and confirms each operation after completion. MPTC records all transactions and user logon identities in encrypted review, transfer, and session log files. MPTC compiles with the DOE/NNSA two-person rule by requiring that the names of two reviewers be enetered prior to file transfer. The MPTC code is designed to accommodate additional review tools to enhance the effectiveness of the Authorized Derivative Classifier (ADC) or other authorized user and reduce the security risks associated with file transfers. Cross-plaform: Runs on Windows 2000, Windows XP, Red Hat Enterprise Linux Workstation, Fedora Core 2 and 3, Red Hat Linux 9, Solaris 8, and Solaris 9.
To order this software or receive further information, please fill out the following request: Request Software
Bintz, Karen, Michelsen, Rebecca, Lyon, Stephanie, and Schear, Nabil. Multi Platform Trusted Copy (MPTC) V 5.0.
Computer software. Version 00. March 1, 2005.
@misc{osti_1230860,
title = {Multi Platform Trusted Copy (MPTC) V 5.0, Version 00},
author = {Bintz, Karen and Michelsen, Rebecca and Lyon, Stephanie and Schear, Nabil},
abstractNote = {MPTC 5.0 reviews text files; Microsoft (MS) Word, PowerPoint, and Excel in the MS Office 2000, XP, and 2003 formats; MS Access in the XP and 2003 formats; and dxf CAD files for keywords supplied by the reviewer. Keywords are specified in a keyword file or entered via the GUI at review time so that each document review can be customized. In addition, MPTC detects embedded objects and removes Microsoft-documented metadata from the supported MS Office file formats. After each review, a user can examine the review log for MPTC's findings. A file can be opened with its creating application from within MPTC for visual review and resolution of review failures. If MPTC pases the file file or the reviewer has resolved review failures, the reviewer can transfer the file to an unclassified, removable medium with the following caveats: MPTC prohibits the transfer of any file containing a hidden data stream. Compressed files and file archives cannot be transferred without first uncompressing or extracting the files. MPTC provides a detection mechanism for Java-based intelligent agents and rudimentary steganography detection capability. MPTC ensures that only the designated files are copied, moved, or deleted and confirms each operation after completion. MPTC records all transactions and user logon identities in encrypted review, transfer, and session log files. MPTC compiles with the DOE/NNSA two-person rule by requiring that the names of two reviewers be enetered prior to file transfer. The MPTC code is designed to accommodate additional review tools to enhance the effectiveness of the Authorized Derivative Classifier (ADC) or other authorized user and reduce the security risks associated with file transfers. Cross-plaform: Runs on Windows 2000, Windows XP, Red Hat Enterprise Linux Workstation, Fedora Core 2 and 3, Red Hat Linux 9, Solaris 8, and Solaris 9.},
doi = {},
url = {https://www.osti.gov/biblio/1230860},
year = {Tue Mar 01 00:00:00 EST 2005},
month = {Tue Mar 01 00:00:00 EST 2005},
note =
}