The document outlines the agenda for a presentation on fundamentals of web design, which includes 9 topics:
1. Internet history from the origins of ARPAnet and DARPA to the modern World Wide Web Consortium.
2. Internet protocols including IP, TCP/IP, routing, FTP, and HTTP.
3. The client-server model and examples of client-server architectures and protocols.
4. Web servers including IIS, PWS, Apache, and server-side scripting examples.
5. Internet service providers including their architecture, bandwidth options, and connection types.
6. Internet security topics such as cookies, firewalls, passwords, DNS spoofing, and viruses
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
A presentation+class delivered to a PHP developer group at Brown University that discussed Web Application Security with a heavy emphasis on PHP, and discussed security in the SDLC, and showed with some examples what to do and not do
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Hackfest Communication
La détection des nouvelles variantes doit se faire extrêmement rapidement car ils apparaissent maintenant au rythme de 1 toutes les 1,5 secondes. Nous ne pouvons pas nous fier juste à la soumission des fichiers suspects par nos clients ou nos partenaires. Nous avons donc du développer un vaste réseau de sondes (honey pots) et développer des nouvelles façons de trouver le malware. Nous allons discuter des différentes techniques et de leur efficacité dans le monde réel.
Over the last couple of years SOA and Web services has been over-hyped. Web 2.0 is beginning to be over-hyped. Because of the hype, it is easy to dismiss these application development architectures as irrelevant yet that would be a serious mistake. Both of these architectures are in the early stages of influencing how applications are developed, and applications using either are likely to run poorly and be difficult to manage. This presentation will detail management and performance issues associated with SOA and Web 2.0 and provide insights into what you can do to avoid them.
A presentation+class delivered to a PHP developer group at Brown University that discussed Web Application Security with a heavy emphasis on PHP, and discussed security in the SDLC, and showed with some examples what to do and not do
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Hackfest Communication
La détection des nouvelles variantes doit se faire extrêmement rapidement car ils apparaissent maintenant au rythme de 1 toutes les 1,5 secondes. Nous ne pouvons pas nous fier juste à la soumission des fichiers suspects par nos clients ou nos partenaires. Nous avons donc du développer un vaste réseau de sondes (honey pots) et développer des nouvelles façons de trouver le malware. Nous allons discuter des différentes techniques et de leur efficacité dans le monde réel.
Over the last couple of years SOA and Web services has been over-hyped. Web 2.0 is beginning to be over-hyped. Because of the hype, it is easy to dismiss these application development architectures as irrelevant yet that would be a serious mistake. Both of these architectures are in the early stages of influencing how applications are developed, and applications using either are likely to run poorly and be difficult to manage. This presentation will detail management and performance issues associated with SOA and Web 2.0 and provide insights into what you can do to avoid them.
1. Pembentangan Fundamental of Web Design
TarikhPembentangan: 28/12/12 dan 4/1/12 shj
Tajuk Ahli Kumpulan
1 Internet History (What, When, Where, Who) Shamim
DARPA Suhaili
ARPA Hisyammudin
ARPANET Nurfariza
Command line Interface to friendly user interface Rashidi
World Wide Web Consortium (W3C)
Internet History in Malaysia
2 Protocol for using internet Anuar
IP , TCP/IP Nazzila
IP – How to ping IP Fathiah
Routing Shahida
FTP Hayati
HTTP
3 Client Server Model Afifi
What is CSM Azella
Client server architecture AmiraSyarina
Client server protocol AnisFatin
Client server protocolvs P2P
Example of CSM
4 Web Server Aiman
IIS Taufiq
PWS Syamimi
APACHE Nabila
HTTP Request Types FathinHafizah
System Architecture
Example - Web server scripting
Example - Client server scripting
5 ISP Nadia
What is ISP Aqilah
ISP Architecture Wardah
Bandwidth Nazmi
Dial-up / ASL /DSL / Fiber optic / Ethernet / Intranet
6 Internet Security Farahwahida
Cookies Fathihah
Firewalls Maisarah
Password cracking Suraiya
DNS spoofing
Mail bombing
Virus
Privacy
7 Network Topology Nazrin
(how it works, advantage and disadvantages, diagram) Ameer
Bus Aliff
Star AmirulHisham
Ring Asril
Hybrid
Mesh
2. 8 Seven Security Threats to Sites Taifiq Ali
Malicious code Ridzwan
Hacking and cyber vandalism Hamira
Spoofing Izzati
Credit card fraud FatinIzzati
Denial of Service Attacks
Sniffing
Insider Jobs
9 Ethics Theeba
Ethical Principles Vasugi
Computer Ethics Christin
Netiquette Shalinita
Whistle-blowing Velaitham
Plagiarism
Libel
Software Piracy
PembentanganadalahdidalamBahasaMelayu.
Silacetakkanslaidanda.