WordPress Security Presentation by Jason Conroy (from Finding Simple - http://findingsimple.com) for the March 2013 WordPress Canberra Meetup (http://wpcanberra.com.au)
WordPress security & performance a beginners guideMickey Mellen
We will cover how to create a secure WordPress environment, including an overview of security plugins, and backup solutions. We’ll provide numerous tips to help you keep your WordPress environments secure.
We’ll also cover some introductory WordPress performance settings. This will not be a very technical or detailed overview, but will include tips and techniques that most WordPress users can follow to improve their site’s performance.
This presentation is my keynote from the Business Meets IT cloud security seminar from 2 years ago, and it is still relevant! What is cloud security, and what is security in the cloud? I also included some best practices for European companies that are moving to the cloud
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...LCloud
Hillel Solow, who is CTO and Co-Founder @ Protego Labs. Prior to co-founding Protego, he was CTO in Cisco’s IoT Security Group, where he worked on innovative security solutions for new technology markets. He covered the topic and conducted the workshop titled Don’t Run with Scissors: Serverless Security Survival Guide on Meetup AWS & Serverless UG Poland in Warsaw
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
The paper is about abusing and exploiting Firefox add-on Security model and explains how JavaScript functions, XPCOM and XPConnect interfaces, technologies like CORS and WebSocket, Session storing and full privilege execution can be abused by a hacker for malicious purposes. The widely popular browser add-ons can be targeted by hackers to implement new malicious attack vectors resulting in confidential data theft and full system compromise. This paper is supported by proof of concept add-ons which abuse and exploits the add-on coding in Firefox 17, the release which Mozilla boasts to have a more secure architecture against malicious plugins and add-ons. The proof of concept includes the implementation of a Local keylogger, a Remote keylogger, stealing Linux password files, spawning a Reverse Shell, stealing the authenticated Firefox session data, and Remote DDoS attack. All of these attack vectors are fully undetectable against anti-virus solutions and can bypass protection mechanisms.
You always think it will never happen to you but when it does, it’s all hands on deck. My personal site was almost hacked and since then I actively looked at what I could improve. During this talk I will talk what I had before and show all the improvements I made since then. It will be a mixed of using using the existing tools and my own creation in managing my sites.
Hard Lessons Learned from defending Adobe Creative Cloud on AWS! Insight into implementing a solid Security Architecture based on a mutual conversation between DevOps and SecOps!
WordPress Security Presentation by Jason Conroy (from Finding Simple - http://findingsimple.com) for the March 2013 WordPress Canberra Meetup (http://wpcanberra.com.au)
WordPress security & performance a beginners guideMickey Mellen
We will cover how to create a secure WordPress environment, including an overview of security plugins, and backup solutions. We’ll provide numerous tips to help you keep your WordPress environments secure.
We’ll also cover some introductory WordPress performance settings. This will not be a very technical or detailed overview, but will include tips and techniques that most WordPress users can follow to improve their site’s performance.
This presentation is my keynote from the Business Meets IT cloud security seminar from 2 years ago, and it is still relevant! What is cloud security, and what is security in the cloud? I also included some best practices for European companies that are moving to the cloud
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...LCloud
Hillel Solow, who is CTO and Co-Founder @ Protego Labs. Prior to co-founding Protego, he was CTO in Cisco’s IoT Security Group, where he worked on innovative security solutions for new technology markets. He covered the topic and conducted the workshop titled Don’t Run with Scissors: Serverless Security Survival Guide on Meetup AWS & Serverless UG Poland in Warsaw
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
The paper is about abusing and exploiting Firefox add-on Security model and explains how JavaScript functions, XPCOM and XPConnect interfaces, technologies like CORS and WebSocket, Session storing and full privilege execution can be abused by a hacker for malicious purposes. The widely popular browser add-ons can be targeted by hackers to implement new malicious attack vectors resulting in confidential data theft and full system compromise. This paper is supported by proof of concept add-ons which abuse and exploits the add-on coding in Firefox 17, the release which Mozilla boasts to have a more secure architecture against malicious plugins and add-ons. The proof of concept includes the implementation of a Local keylogger, a Remote keylogger, stealing Linux password files, spawning a Reverse Shell, stealing the authenticated Firefox session data, and Remote DDoS attack. All of these attack vectors are fully undetectable against anti-virus solutions and can bypass protection mechanisms.
You always think it will never happen to you but when it does, it’s all hands on deck. My personal site was almost hacked and since then I actively looked at what I could improve. During this talk I will talk what I had before and show all the improvements I made since then. It will be a mixed of using using the existing tools and my own creation in managing my sites.
Hard Lessons Learned from defending Adobe Creative Cloud on AWS! Insight into implementing a solid Security Architecture based on a mutual conversation between DevOps and SecOps!
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
I had an opportunity to present end to end Windows AutoPilot process flow at Bangalore IT Pro user group meeting. I covered end to end process to provision Windows 10 devices via Windows AutoPilot service with Intune.
AWS has taken over the responsibilities of patching the OS and securing the underlying physical infrastructure that runs your serverless application, so what's left for you to secure? Quite a bit it turns out.
The moment my site got hacked - WordCamp SofiaMarko Heijnen
You always think it will never happen to you but when it does, it’s all hands on deck. My personal site was almost hacked and since then I actively looked at what I could improve. During this talk I will talk what I had before and show all the improvements I made since then. It will be a mixed of using using the existing tools and my own creation in managing my sites.
Network Interception - Write Swift codes to inspect network requests (even wi...Kenneth Poon
Using a custom URLProtocol class and code injection technique, we can now inspect all requests in an iOS Apps (even when SSL certificate pinning is active). In the hand on demo, I used this technique to inspect all requests in Tinder and Twitter iOS apps
This keynote was presented in https://engineers.sg/video/intercepting-network-requests-ios-dev-scout--2639
Serverless - minimizing the attack surfaceAvi Shulman
Slides from my talk at ServerlessConf NYC 2017.
The talk will cover the various aspects of reducing the attack surface on serverless applications with an emphasis on maintaining least privileged access. I’ll cover the possible ways for attackers to leverage an overly permissive application and what might be the impacts of such attempts. In the talk, I’ll present a demo of an open source tool which can help you maintain least privileged roles and policies for your Lambda functions and reduce the overall attack surface on your serverless application.
Announcement of the Microsoft Web Platform Installer (WebPI) and Web Application Installer (WebAI) which installs the Microsoft Web Platform and both .NET and PHP Open Source Applications quickly and easily.
Pass4sure 70-533 Microsoft Azure Infrastructure Solutions attests your professional competence and helps you achieve your career heights in the most competitive world of Information Technology. Pass4sure ensures you a definite exam success by providing you the most interactive learning experience of your academic career.
Presentation to Lehigh Valley WordPress Meetup on how to run WordPress on Amazon Web Services. Presentation provides tips on automating backups, WordPress installation and which services to utilize.
[NEW LAUNCH!] AWS IoT Device Tester: Enable Your Edge Devices for AWS IoT (IO...Amazon Web Services
AWS IoT Device Tester is a test automation application that enables you to self-test your devices for Amazon FreeRTOS and AWS IoT Greengrass. With AWS IoT Device Tester, you can easily perform qualification testing to determine whether your devices can run Amazon FreeRTOS or AWS IoT Greengrass, and interoperate securely with AWS IoT services. Come learn how AWS IoT Device Tester simplifies the testing of Amazon FreeRTOS and AWS IoT Greengrass devices.
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
Only year ago we launched AWS IoT, and at re:Invent we showed how AWS IoT makes it easy to secure millions of connected devices. However, we have learned from our customers that a number of unique security challenges for the Internet of Things (IoT) exist.
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
I had an opportunity to present end to end Windows AutoPilot process flow at Bangalore IT Pro user group meeting. I covered end to end process to provision Windows 10 devices via Windows AutoPilot service with Intune.
AWS has taken over the responsibilities of patching the OS and securing the underlying physical infrastructure that runs your serverless application, so what's left for you to secure? Quite a bit it turns out.
The moment my site got hacked - WordCamp SofiaMarko Heijnen
You always think it will never happen to you but when it does, it’s all hands on deck. My personal site was almost hacked and since then I actively looked at what I could improve. During this talk I will talk what I had before and show all the improvements I made since then. It will be a mixed of using using the existing tools and my own creation in managing my sites.
Network Interception - Write Swift codes to inspect network requests (even wi...Kenneth Poon
Using a custom URLProtocol class and code injection technique, we can now inspect all requests in an iOS Apps (even when SSL certificate pinning is active). In the hand on demo, I used this technique to inspect all requests in Tinder and Twitter iOS apps
This keynote was presented in https://engineers.sg/video/intercepting-network-requests-ios-dev-scout--2639
Serverless - minimizing the attack surfaceAvi Shulman
Slides from my talk at ServerlessConf NYC 2017.
The talk will cover the various aspects of reducing the attack surface on serverless applications with an emphasis on maintaining least privileged access. I’ll cover the possible ways for attackers to leverage an overly permissive application and what might be the impacts of such attempts. In the talk, I’ll present a demo of an open source tool which can help you maintain least privileged roles and policies for your Lambda functions and reduce the overall attack surface on your serverless application.
Announcement of the Microsoft Web Platform Installer (WebPI) and Web Application Installer (WebAI) which installs the Microsoft Web Platform and both .NET and PHP Open Source Applications quickly and easily.
Pass4sure 70-533 Microsoft Azure Infrastructure Solutions attests your professional competence and helps you achieve your career heights in the most competitive world of Information Technology. Pass4sure ensures you a definite exam success by providing you the most interactive learning experience of your academic career.
Presentation to Lehigh Valley WordPress Meetup on how to run WordPress on Amazon Web Services. Presentation provides tips on automating backups, WordPress installation and which services to utilize.
[NEW LAUNCH!] AWS IoT Device Tester: Enable Your Edge Devices for AWS IoT (IO...Amazon Web Services
AWS IoT Device Tester is a test automation application that enables you to self-test your devices for Amazon FreeRTOS and AWS IoT Greengrass. With AWS IoT Device Tester, you can easily perform qualification testing to determine whether your devices can run Amazon FreeRTOS or AWS IoT Greengrass, and interoperate securely with AWS IoT services. Come learn how AWS IoT Device Tester simplifies the testing of Amazon FreeRTOS and AWS IoT Greengrass devices.
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
Only year ago we launched AWS IoT, and at re:Invent we showed how AWS IoT makes it easy to secure millions of connected devices. However, we have learned from our customers that a number of unique security challenges for the Internet of Things (IoT) exist.
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon Web Services
In this presentation, we take a deeper look at Amazon FreeRTOS. As OEMs work to squeeze more functionality onto cheaper and smaller IoT devices, they face a series of challenges in development and operations that results in security vulnerabilities, inefficient code, compatibility issues, and unclear licensing. With Amazon FreeRTOS, it is now easier to build, deploy, and update connected microcontroller-based devices quickly and economically, while retaining confidence that the devices are secure. Also, learn how Pentair, a leading water treatment company, is developing an IoT solution with the help of Amazon FreeRTOS and Espressif Systems, a hardware partner.
Learning Objectives:
- Understand how IoT is transforming home automation and how you can use it to your advantage
- Learn how the AWS IoT service suite can be used in smart home devices with Alexa integration
- Learn how Hunter Douglas used AWS IoT and Alexa to build a new innovative product
Best Practices for AWS IoT Core (IOT347-R1) - AWS re:Invent 2018Amazon Web Services
There are many different components of AWS IoT Core, including Device gateway, Registry, Message broker, Rules engine, and Device shadow. In this session, we cover each component in depth, how to use them, and best practices. Come away with an understanding of how AWS IoT Core can help you securely connect and manage devices, process and act on device data, and read and set device state. In addition to best practices, we discuss common customer questions when using different features of AWS IoT Core.
The threat model for IoT devices is very different from the threat model for cloud applications. Customers must understand what these threats are, prioritize them effectively, and navigate the growing ecosystem of partners that give customers tools to build secure IoT solutions. We showcase how to leverage partner solutions to mitigate threats, explain how to avoid common pitfalls, and make it clear that all IoT solutions must incorporate end-to-end security from the start. We begin with the steps to take in the manufacturing process, how to provision and authenticate devices in the field, and we cover solutions that can help customers comply with IT requirements in the maintenance phase of the product lifecycle.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. As an IoT developer, you will want to interact with AWS services like Kinesis, Lambda, and Amazon Machine Learning to get the most from your IoT application. In this session, we will do a deep dive on how to define rules in the Rules Engine, or retrieve the last known and desired state of device using Device Shadows, learn about the use cases and benefits of AWS Greengrass, and routing data from devices to AWS services to leverage the entire cloud for your Internet of Things application.
Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...Amazon Web Services
Learning Objectives:
• Learn what core capabilities are necessary for a successful IoT cloud platform
• Understand how the core capabilities work together
• Learn what and how standards are beginning to take shape
As with any other trend in the history of computer software, IoT is being powered by a new generation of cloud platforms. In this tech talk, we will identify and explain what to look for when evaluating an IoT cloud platform to ensure a successful deployment of IoT strategies. Learn what core capabilities are necessary to look for when choosing an IoT cloud platform.
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Learn what core capabilities are necessary for a successful IoT cloud platform
- Understand how the core capabilities work together
- Learn what and how standards are beginning to take shape
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This webinar will introduce the lifecycle of an IoT thing and the mechanisms used by AWS IoT to manage things. These mechanisms can be used to securely build and provision things, manage deployment, manage thing health, and integrate with other AWS services. And when the life of the thing has come to an end, we will show you how to retire the thing, keeping your solution secure.
Learning Objectives:
• Common IoT Thing Management Issues
• AWS IoT Security and Access Control Mechanisms
Who Should Attend:
• Technical Decision Makers, Developers, Makers
Sydney based cloud consultancy Cloudten's Richard Tomkinson shows how masterless Puppet can be used in concert with AWS's services including Lambda to automate server builds and manage code deployments
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018Amazon Web Services
With AWS Greengrass, you can bring local compute, messaging, data caching, sync, and machine-learning inference capabilities to edge devices. Join us in this session to learn about new features that extend the capabilities of AWS Greengrass devices.
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Crescat
Crescat is industry-trusted event management software, built by event professionals for event professionals. Founded in 2017, we have three key products tailored for the live event industry.
Crescat Event for concert promoters and event agencies. Crescat Venue for music venues, conference centers, wedding venues, concert halls and more. And Crescat Festival for festivals, conferences and complex events.
With a wide range of popular features such as event scheduling, shift management, volunteer and crew coordination, artist booking and much more, Crescat is designed for customisation and ease-of-use.
Over 125,000 events have been planned in Crescat and with hundreds of customers of all shapes and sizes, from boutique event agencies through to international concert promoters, Crescat is rigged for success. What's more, we highly value feedback from our users and we are constantly improving our software with updates, new features and improvements.
If you plan events, run a venue or produce festivals and you're looking for ways to make your life easier, then we have a solution for you. Try our software for free or schedule a no-obligation demo with one of our product specialists today at crescat.io
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
5. Amazon FreeRTOS Page 5
The Amazon FreeRTOS Over-the-Air Update service enables you to:
•Digitally sign and encrypt firmware before deployment.
•Securely deploy new firmware images to a single device or a group
•Deploy firmware to devices, reset, or reprovisioned.
•Verify the authenticity and integrity of the new firmware after it's deployed to
devices.
•Monitor the progress of a deployment.
•Debug a failed deployment.
Amazon FreeRTOS Over-the-Air Updates
8. Amazon FreeRTOS Page 8
• Ultra-low-power STM32L4 Series MCUs based on ARM® Cortex® -M4 core with 1
Mbyte of Flash memory and 128 Kbytes of SRAM, in LQFP100 package
• 64-Mbit Quad-SPI (Macronix) Flash memory
• Bluetooth® V4.1 module (SPBTLE-RF)
• Wi-Fi® module Inventek ISM43362-M3G-L44 (802.11 b/g/n compliant)
• High-performance 3-axis magnetometer (LIS3MDL)
• 3D accelerometer and 3D gyroscope (LSM6DSL)
• USB OTG FS with Micro-AB connector
• Arduino™ Uno V3
Important Key Features STM32L4 model B-L475E-IOT01A
10. Amazon FreeRTOS Page 10
• Log to the Amazon Console.
• Under Amazon FreeRTOS Device Software, choose Configure
download.
• Choose Download FreeRTOS Software.
• Under Software Configurations, find Connect to AWS IoT- ST, and
then choose Download.
Alternative source : https://github.com/aws/amazon-freertos
My source: https://github.com/theanto/amazon-freertos
Download the software
11. Amazon FreeRTOS Page 11
In the console, create your user and choose Add permissions.
Choose Attach existing policies directly.
In the search box, type:
1.AmazonFreeRTOSFullAccess
2.AWSIoTFullAccess
User and permissions
13. Amazon FreeRTOS Page 13
This policy grants the following permissions:
•iot:Connect
Grants your device the permission to connect to the AWS IoT message broker.
•iot:Publish
Grants your device the permission to publish an MQTT message on the
freertos/demos/echo MQTT topic.
•iot:Subscribe
Grants your device the permission to subscribe to the freertos/demos/echo MQTT topic.
•iot:Receive
Grants your device the permission to receive messages from the AWS IoT message
broker.
Detail on policy
14. Amazon FreeRTOS Page 14
In the AWS IoT console go to Manage and then create a single Things in this way:
1.Type a name for your thing.
2.Add a certificate for your thing page (choose Create certificate).
3.Download your private key and certificate.
4.Choose Activate, because Certificates must be activated prior to use.
5.Choose Attach a policy to attach.
6.Choose the policy you just created and choose Register thing.
Things
15. Amazon FreeRTOS Page 15
1. Import the Amazon FreeRTOS Sample Code into the STM32 System Workbench
2. Copy your AWS IoT endpoint from the Endpoint text box. It should look like
<1234567890123>.iot.<us-east-1>.amazonaws.com.
3. In aws_clientcredential.h set clientcredentialMQTT_BROKER_ENDPOINT to your AWS
IoT endpoint.
The aws_clientcredential.h file have this constant:
• clientcredentialMQTT_BROKER_ENDPOINT: Your AWS IoT endpoint.
• clientcredentialIOT_THING_NAME: The AWS IoT thing for your board.
• clientcredentialWIFI_SSID: The SSID for your Wi-Fi network.
• clientcredentialWIFI_PASSWORD: The password for your Wi-Fi network.
• clientcredentialWIFI_SECURITY: The security type for your Wi-Fi network.
Software configuration
16. Amazon FreeRTOS Page 16
1. Go to :
<BASE_FOLDER>demoscommondevmode_key_provisioningCertificateConfigurationTool
CertificateConfigurator.html.
2. Under Certificate PEM file, choose the <ID>-certificate.pem.crt you downloaded from the AWS
IoT console.
3. Under Private Key PEM file, choose the <ID>-private.pem.key you downloaded from the AWS
IoT console.
4. Choose Generate and save aws_clientcredential_keys.h, and then save the file in
<BASE_FOLDER>demoscommoninclude. This overwrites the stub file in the directory.
Configure Your AWS IoT Credentials
17. Amazon FreeRTOS Page 17
In the AWS IoT console go to Test
In the Subscription topic text box, type freertos/demos/echo and then choose Subscribe to topic.
Running an example