This document discusses implementing SPF records, including:
1. The technical process of creating and publishing an SPF record, including understanding the required syntax and verifying that the record is published correctly.
2. How to get the required SPF record syntax for an Office 365 environment from the admin portal.
3. Considerations for "mixed mail" infrastructures that use both Office 365 and additional mail servers, requiring the SPF record to include information about both.
4. Online tools that can help generate and validate SPF records.
Enjoy Upto 50% Discounts on all computer training coursesCMS Computer
Happy Dussehra ! Good News for Students and Job Seekers. Enjoy the festival with great discounts of upto 50% on all IT training courses by CMS Computer Training Center, the best IT Training Institute in Bangalore.
Enjoy Upto 50% Discounts on all computer training coursesCMS Computer
Happy Dussehra ! Good News for Students and Job Seekers. Enjoy the festival with great discounts of upto 50% on all IT training courses by CMS Computer Training Center, the best IT Training Institute in Bangalore.
The 2013 Queensland PGA Championship provides a variety of opportunities for businesses to partner with the PGA Tour of Australasia and City Golf Club, Toowoomba via this prestigious and historic professional golf tournament.
Looking at INSPIRE from an Open Source obsessed SMEsmespire
Presentation at the INSPIRE Workshop "Concrete steps to implement INSPIRE: synergies between the public and the private sector" - Florence, 24th June 2013
Hackathon - Mapping da National Core a INSPIRE (Hydrography)smespire
webinar smeSpire "Hackathon Online - “Trasformazione di dataset spaziali open conformemente a INSPIRE” (2014-02-25).
Presentation about possible mapping between Italian topographic database specifications and INSPIRE (Hydrography).
Presented by Giuliana Ucelli (Informatica Trentina) with Daniela Ferrari (Provincia Autonoma Trento), Jody Marca and Piergiorgio Cipriano (Sinergis)
Panel Discussion – Grooming Data Scientists for Today and for TomorrowHPCC Systems
In this session, we will explore the talent gap for data scientists including the potential causes and what academia and the private sector are doing to develop the necessary talent. Will the skills which are in such explosive demand today still be in demand in the future? This panel of professors and practitioners will engage in a conversation about the talent issues facing companies across the country and around the world and what they are doing about it.
What is SPF record good for? | Part 7#17Eyal Doron
What is SPF record good for? | Part 7#17
http://o365info.com/what-is-spf-record-good-for-part-7-17
The purpose of the SPF record and the relation to for our mail infrastructure. How does the SPF record enable us to prevent a scenario in which hostile elements could send E-mail on our behalf.
Eyal Doron | o365info.com
Student NameClassDateVBScript IP File ReportIn the space provide.docxemelyvalg9
Student NameClassDateVBScript IP File Report
In the space provided below, copy and paste your IP_FileWrite.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
In the space provided below to copy and paste the remainder of your IP_FileWrite.vbs sourcecode if it did not fit in the first textbox.
In the space provided below, copy and paste the RUN of your IP_FileWrite.vbs program. Also include the directory listing of all .csv files:
In the space provided below, copy and paste your IP_AppendRead.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
In the space provided below to copy and paste the remainder of your IP_AppendRead.vbs sourcecode if it did not fit in the first textbox.
In the space provided below, copy and paste the RUN of your IP_AppendRead.vbs program.
1
COMP230_W6_IP_File_Report.docx Revision Date: 1213
VBScript IP File Lab
Objectives
In this lab, students will complete the following objectives.
· Create a VBScript program using NotePad++.
· Write a two-dimensional array of IP addresses to a text file.
· Read the IP Addresses text file into a script.
· Append new Room/PC/IP address data to the text file.
· Use the object Scripting.FileSystemObject.
Lab Diagram
During your session you will have access to the following lab configuration.
Connecting to your lab
For this lab, we will only need to connect to Vlab-PC1.
· Vlab-PC1
To start simply click on the named Workstation from the device list (located on the left hand side of the screen) and click the Power on from the in tools bar. In some cases the devices may power on automatically.
During the boot up process an activity indicator will be displayed in the name tab:
· Black - Powered Off
· Orange - Working on your request
· Green - Ready to access
If the remote console is not displayed automatically in the main window (or popup) click the Connect icon located in the tools bar to start your session.
If the remote console does not appear please try the following option:
· Switch between the HTML 5 and Java client versions in the tools bar.
In the event this does not resolve your connectivity problems please visit our Help / Support pages for additional resolution options.
Task 1: Create the IP_FileWrite.vbs Program
Note: All captures must be text only—DO NOT capture the NotePad++ application window or the command prompt window. Use copy and paste of text only.
1) Open NotePad++ and from the menu, select File/Open. Open the file IP_File_start.vbs in the C:\comp230 directory. If you do not see this file, you can download it and extract it from the eCollege Doc Sharing file IP_File_start.zip.
Modify the Programmer Header as needed and Save As the VBScript file as IP_FileWrite.vbs.
We are using the array of IP addresses that was used in Lab 4. The line dim ipAddress(5,3) declare 6x4 two-dimensio.
SecOps 2021 Today: Using AWS Services to Deliver SecOps - SID304 - re:Invent ...Amazon Web Services
This talk dives deep on how to build end-to-end security capabilities using AWS. Our goal is orchestrating AWS Security services with other AWS building blocks to deliver enhanced security. We cover working with AWS CloudWatch Events as a queueing mechanism for processing security events, using Amazon DynamoDB to provide a stateful layer to provide tailored response to events and other ancillary functions, using DynamoDB as an attack signature engine, and the use of analytics to derive tailored signatures for detection with AWS Lambda. Log sources include available AWS sources and also more traditional logs, such as syslog. The talk aims to keep slides to a minimum and demo live as much as possible. The demos come together to demonstrate an end-to-end architecture for SecOps. You'll get a toolkit consisting of code and templates so you can hit the ground running.
The 2013 Queensland PGA Championship provides a variety of opportunities for businesses to partner with the PGA Tour of Australasia and City Golf Club, Toowoomba via this prestigious and historic professional golf tournament.
Looking at INSPIRE from an Open Source obsessed SMEsmespire
Presentation at the INSPIRE Workshop "Concrete steps to implement INSPIRE: synergies between the public and the private sector" - Florence, 24th June 2013
Hackathon - Mapping da National Core a INSPIRE (Hydrography)smespire
webinar smeSpire "Hackathon Online - “Trasformazione di dataset spaziali open conformemente a INSPIRE” (2014-02-25).
Presentation about possible mapping between Italian topographic database specifications and INSPIRE (Hydrography).
Presented by Giuliana Ucelli (Informatica Trentina) with Daniela Ferrari (Provincia Autonoma Trento), Jody Marca and Piergiorgio Cipriano (Sinergis)
Panel Discussion – Grooming Data Scientists for Today and for TomorrowHPCC Systems
In this session, we will explore the talent gap for data scientists including the potential causes and what academia and the private sector are doing to develop the necessary talent. Will the skills which are in such explosive demand today still be in demand in the future? This panel of professors and practitioners will engage in a conversation about the talent issues facing companies across the country and around the world and what they are doing about it.
What is SPF record good for? | Part 7#17Eyal Doron
What is SPF record good for? | Part 7#17
http://o365info.com/what-is-spf-record-good-for-part-7-17
The purpose of the SPF record and the relation to for our mail infrastructure. How does the SPF record enable us to prevent a scenario in which hostile elements could send E-mail on our behalf.
Eyal Doron | o365info.com
Student NameClassDateVBScript IP File ReportIn the space provide.docxemelyvalg9
Student NameClassDateVBScript IP File Report
In the space provided below, copy and paste your IP_FileWrite.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
In the space provided below to copy and paste the remainder of your IP_FileWrite.vbs sourcecode if it did not fit in the first textbox.
In the space provided below, copy and paste the RUN of your IP_FileWrite.vbs program. Also include the directory listing of all .csv files:
In the space provided below, copy and paste your IP_AppendRead.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
In the space provided below to copy and paste the remainder of your IP_AppendRead.vbs sourcecode if it did not fit in the first textbox.
In the space provided below, copy and paste the RUN of your IP_AppendRead.vbs program.
1
COMP230_W6_IP_File_Report.docx Revision Date: 1213
VBScript IP File Lab
Objectives
In this lab, students will complete the following objectives.
· Create a VBScript program using NotePad++.
· Write a two-dimensional array of IP addresses to a text file.
· Read the IP Addresses text file into a script.
· Append new Room/PC/IP address data to the text file.
· Use the object Scripting.FileSystemObject.
Lab Diagram
During your session you will have access to the following lab configuration.
Connecting to your lab
For this lab, we will only need to connect to Vlab-PC1.
· Vlab-PC1
To start simply click on the named Workstation from the device list (located on the left hand side of the screen) and click the Power on from the in tools bar. In some cases the devices may power on automatically.
During the boot up process an activity indicator will be displayed in the name tab:
· Black - Powered Off
· Orange - Working on your request
· Green - Ready to access
If the remote console is not displayed automatically in the main window (or popup) click the Connect icon located in the tools bar to start your session.
If the remote console does not appear please try the following option:
· Switch between the HTML 5 and Java client versions in the tools bar.
In the event this does not resolve your connectivity problems please visit our Help / Support pages for additional resolution options.
Task 1: Create the IP_FileWrite.vbs Program
Note: All captures must be text only—DO NOT capture the NotePad++ application window or the command prompt window. Use copy and paste of text only.
1) Open NotePad++ and from the menu, select File/Open. Open the file IP_File_start.vbs in the C:\comp230 directory. If you do not see this file, you can download it and extract it from the eCollege Doc Sharing file IP_File_start.zip.
Modify the Programmer Header as needed and Save As the VBScript file as IP_FileWrite.vbs.
We are using the array of IP addresses that was used in Lab 4. The line dim ipAddress(5,3) declare 6x4 two-dimensio.
SecOps 2021 Today: Using AWS Services to Deliver SecOps - SID304 - re:Invent ...Amazon Web Services
This talk dives deep on how to build end-to-end security capabilities using AWS. Our goal is orchestrating AWS Security services with other AWS building blocks to deliver enhanced security. We cover working with AWS CloudWatch Events as a queueing mechanism for processing security events, using Amazon DynamoDB to provide a stateful layer to provide tailored response to events and other ancillary functions, using DynamoDB as an attack signature engine, and the use of analytics to derive tailored signatures for detection with AWS Lambda. Log sources include available AWS sources and also more traditional logs, such as syslog. The talk aims to keep slides to a minimum and demo live as much as possible. The demos come together to demonstrate an end-to-end architecture for SecOps. You'll get a toolkit consisting of code and templates so you can hit the ground running.
Intro to the Salesforce Command Line Interface for AdminsSalesforce Admins
A few years ago, Salesforce introduced a new tool to make changes to your org: the Salesforce Command Line Interface (CLI). While it was introduced as one of the Salesforce DX (Developer Experience) tools, there are plenty of features to supercharge your work as an Admin. Join Salesforce experts Marc, Kieren, and Peter for an overview of why you should add command lines to your toolkit, how to use a command line (on Windows and Mac), and a few specific command line recipes to help you solve day-to-day Admin problems faster.
This is a short articles for readers about how we are using let’s encrypt with pfsense. The pfsense itself is an application that help us to setup firewall against intruders with their feature like snort and many more. Services like HAProxy, Captive Portal, OpenVPN, Ipsec are provided by pfsense with completely different. They are easy to use, Graphical User Interface base. Pfsense has been chosen as an alternative approach for every stakeholders, because organizations of all sizes and industries struggle with budgeting for technology.
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Amazon Web Services
Infrastructure-as-Code (IaC) has emerged as an essential element of organizational DevOps practices. Tools such as AWS CloudFormation and Terraform allow software-defined infrastructure to be deployed quickly and repeatably to AWS. But the agility of CI/CD pipelines also creates new challenges in infrastructure security hardening. How do you ensure that your CloudFormation templates meet your organization's security, compliance, and governance needs before you deploy them? How do you deploy infrastructure securely to production environments, and monitor the security posture on a continuous basis? And how do you do this repeatedly without hitting a speed bump? This session provides a foundation for how to bring proven software hardening practices into the world of infrastructure deployment. We discuss how to build security and compliance tests for infrastructure analogous to unit tests for application code, and showcase how security, compliance and governance testing fit in a modern CI/CD pipeline.
Session Sponsored by: Dome9
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation.
The current article series include two articles.
The former article is – How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
The process of “sender verification”, enables us to distinguish between a legitimate sender versus an attacker who spoof his identity.
In the current article, we will review in details the five available methods that we can use for fighting the phenomena of Spoof mail attack.
http://o365info.com/how-does-sender-verification-work-how-we-identify-spoof-mail-the-five-heros-spf-dkim-dmarc-exchange-and-exchange-online-protection-part-9-of-9
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack.
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.”
Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some point, that your organization will experience the bitter taste of Spoofing or Phishing attacks!
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...Eyal Doron
In the current article, we will continue our journey to the land of “mail threats and dangers,” and this time; our main focus will be on one of the most dangerous and deadly types of mail attack – the Phishing mail attack!
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
The special character of the spoofing attack is – that the “spoof action”, serves as a spearhead for most of the other mail attacks.
In other words – the Spoof mail attack is accompanied by an additional type of mail attacks such as Phishing mail attack or spam mail.
What is so special about Spoof mail attack? |Part 3#9
http://o365info.com/what-is-so-special-spoof-mail-attack-part-3-of-9/
What are the possible damages of phishing and spoofing mail attacks part 2#...Eyal Doron
We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and to us.
In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail attacks are realized.
http://o365info.com/what-is-the-possible-damages-of-phishing-spoofing-mail-attacks-part-2-of-9/
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which the attacker manages to successfully execute a Phishing mail attack.
The reaction of the involved persons is known in advance, and the sad end of the story is known in advance.
The main goal of the story is - to serve as a wakeup call, so you do not have to be a character in the play of – Phishing mail attack!
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
http://o365info.com/exchange-in-place-ediscovery-hold-introduction-part-5-7
The Exchange In-Place Hold & eDiscovery, is a very powerful tool that can help us to accomplish three main tasks.
1. Search for information (mail items) in single or multiple mailboxes
2. Put specific information on “hold” (enable to save the information for an unlimited time period)
3. Recover deleted mail items
In this article, we will review the logic and the concepts of the Exchange In-Place Hold & eDiscovery toll.
In the next article xx, we will demonstrate how to use the Exchange In-Place Hold & eDiscovery toll for recovering deleted mail items.
Eyal Doron | o365info.com
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
Mail migration to Office 365 | Measure and estimate Mail Migration throughputs | Part 4/4
http://o365info.com/mail-migration-office-365-measure-estimate-mail-migration-throughputs-part-44/
Information about the “expected mail migration throughput” and includes a nice Excel based utility (Office 365 – Multiple and Single Mailbox Migration throughput calculator) that will help us to provide an estimation of the expected data transfer rate. Based on this information we can provide a reasonable “end date” for the completion of the mail migration project (this is the fourth article on a series of four articles).
Eyal Doron | o365info.com
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
Mail migration to Office 365| Factors that impact mail Migration throughput | Part 2/4
http://o365info.com/mail-migration-office-365-factors-impact-mail-migration-throughput-part-24/
Reviewing the different factors that impact the performance of the mail migration throughput to Office 365 (Exchange Online based mail infrastructure) (this is the first second article on a series of four articles).
Eyal Doron | o365info.com
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
Mail migration to Office 365 | Mail Migration methods | Part 1/4
http://o365info.com/mail-migration-office-365-mail-migration-methods-part-14
Reviewing the different mail migration options that are available to us for migrating existing mail infrastructure to Office 365 (Exchange Online). We will focus on the features and the characters of the different mail migration methods (this is the first article on a series of four articles).
Eyal Doron | o365info.com
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
SMTP Relay in Office 365 environment | Troubleshooting scenarios |Part 4#4
http://o365info.com/smtp-relay-in-office-365-environment-troubleshooting-scenarios-part-4-4
Reviewing a possible troubleshooting scenario that relate to the SMTP mail relay server infrastructure for sending mail to the Office 365 mail infrastructure.
Eyal Doron | o365info.com
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
Stage migration, Exchange and Autodiscover infrastructure | Part 1#2 | Part 35#36
Description of the subject of using Exchange stage migration from the perspective of configuring a new Outlook mail profile.
We will learn about the Challenges that we are facing when trying to create a new Outlook mail profile for users which their mailbox was migrated to Exchange Online.
This is the first article, in a series of two articles.
http://o365info.com/stage-migration-exchange-and-autodiscover-infrastructure-part-1-of-2-part-35-of-36
Eyal Doron | o365info.com
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
Autodiscover flow in an Office 365 environment | Part 3#3 | Part 31#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the mail infrastructure is an Office 365 environment (Exchange Online).
This is the third article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-office-365-environment-part-3-of-3-part-31-of-36
Eyal Doron | o365info.com
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
Autodiscover flow in an Exchange Hybrid environment | Part 1#3 | Part 32#36
A detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in an Exchange hybrid environment (an environment that includes Exchange on-Premises server infrastructure + Exchange Online infrastructure).
This is the first article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-hybrid-environment-part-1-of-3-part-32-of-36
Eyal Doron | o365info.com
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 3#3 | Part 28#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the Exchange infrastructure is - Exchange on-Premises and, the Autodiscover Endpoint is located in a non-Active Directory based environment.
This is the third article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-on-premises-environment-non-active-directory-environment-part-3-of-3-part-28-of-36
Eyal Doron | o365info.com
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 2#3 | Part 27#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the Exchange infrastructure is - Exchange on-Premises and, the Autodiscover Endpoint is located in a non-Active Directory based environment.
This is the second article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-on-premises-environment-non-active-directory-environment-part-2-of-3-part-27-of-36
Eyal Doron | o365info.com
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 1#3 | Part 26#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the Exchange infrastructure is - Exchange on-Premises and, the Autodiscover Endpoint is located in a non-Active Directory based environment.
This is the first article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-on-premises-environment-non-active-directory-environment-part-1-of-3-part-26-of-36
Eyal Doron | o365info.com
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. Page 1 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
IMPLEMENTING SPF RECORD |
PART 8#17
The current article is a continuation of the former article: What
is SPF record good for? | Part 7#17
The former article focused upon the purpose of the SPF record
and why is it so important for preventing a scenario, in which
spammers could present them self is our legitimate mail
server.
This article, focus on the “technical side” of the SPF record
such as: the structure of SPF record, the way that we create
SPF record, what is the required syntax for the SPF record in
2. Page 2 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
an Office 365 environment + Mix mail environment, how to
verify the existence of SPF record and so on.
SPF record task list.
Technically speaking, the process of creating and publishing
SPF record.
The “issue” is that not all of us are familiar with the importance
of the SPF record (this subject was discussed in the former
article – What is SPF record good for? | Part 7#17) and about
the different technical aspects of SPF records such as:
The “content” and the syntax that the SPF record should include
How to publish the SPF record
How to verify that the SPF record that we have published
includes the right syntax and point to our mail server that send
mail on behalf of our organization.
Q: Can you provide me an SPF record task list?
A: The task list of the “SPF record project” include the following
tasks:
1. Understand what should be the content (the information that
appear) of our SPF record.
2. Create an SPF record in our public DNS (publish the information
about the SPF record).
3. Verify that the SPF record was successfully published.
4. Verify that the SPF record syntax and structure is correct.
5. Verify that our SPF record includes “pointers” to all of our mail
servers.
3. Page 3 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Get the required information for SPF record
syntax in an Office 365 environment
Q: How do I know, what is the required “content” for the SPF
record of my organization in an Office 365 environment?
A: In Office 365 and Exchange Online environment, the
information about the required content of the SPF record
appears in the Office 365 management portal, under the DNS
setting of your public domain name who was registered.
Important note
1. The uniqueness of the SPF record in Office 365 based
environment
4. Page 4 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
The value of the SPF record that appears in the Office 365
management portal is identical to all the Office 365 customers
and domain names.
In other words, the SPF record that represents your domain
name in Office 365 is not unique or, includes values that are
relevant only to your domain name.
The value of the SPF record in Office 365 is based on the SPF
value named: “include” that point to an information about all
the available Exchange Online servers who are authorized to
send E-mail on behalf of the Office 365 customers.
2. Using the suggested Office 365 value for the SPF record
The “default value” of the SPF record that appears in the Office
365 management portal is suitable only for a “cloud only
scenario”.
The meaning is that the value of the SPF record is “right” only
in a scenario in which all the organization mail infrastructure is
hosted at Office 365 and Exchange Online.
In a scenario, in which we use additional mail servers, such as
hybrid configuration or mail relay, we should add the
information about the “additional mail server” to the “original
SPF record” syntax that appears in the portal.
You can read more information in the section: SPF record
and “Mixed mail” infrastructure
Get the information about the SPF record
5. Page 5 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
To be able to get the required information about the content
of the SPF record, use the following steps:
Login to Office 365 portal, choose the DOMAINS menu, choose
the specific domain that you want to see his required DNS
record (o365info.com in our scenario), and click on the manage
DNS option.
In the following screenshot, we can see under the Exchange
Online section the value of the SPF text record that we will
need to create in our public DNS.
6. Page 6 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Publish the SPF record on your public DNS
After we got the value for the SPF record in an Office 365
environment, we will need to create the required SPF record in
our public DNS server (SPF record is implemented as a text
record).
To demonstrate this procedure, I will use my “GoDaddy” DNS
management interface” for adding the required SPF record.
Note – it’s oblivious that in case that you use the other DNS
management infrastructure, the interface will be different, but the
concept stays the same.
Step 1 – add a new record.
Choose the option: Add Record
7. Page 7 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Step 2 – choose TXT record
Choose the option of: TXT (Text)
(Don’t forget that SPF record is just a simple TXT record).
Step 3 – add the value of the SPF record
In the “HOST:” text box ass the @ sign In the TXT VALUE: – Paste
or add the value of the SPF record that we got from the Office
365 management portal.
8. Page 8 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Step 4 – verify that the SPF record was successfully added
In the following screenshot, we can see that the SPF record
(the TXT record) was added
Verifying that the SPF record is published
Q: How to verify that the SPF record is published?
9. Page 9 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
A: To be able to verify that the SPF record is published, we can
query any public DNS server and “ask him” to display
information about a specific record of a specific domain.
In our scenario, we want to “ask” from a DNS server to display
information about all of the TXT records that exist for a
specific domain: o365info.com (an SPF record is implemented
as TXT record)
We will use the command line tool: nslookup for query the
DNS server.
1. Open the command prompt
2. Type the command: nslookup
3. Type the command: set type=txt
4. Type the domain name, in our scenario: o365info.com
In the following screenshot, we can see the information about
the SPF record that was configured for the domain. In our
scenario, the value of the SPF record is:
v=spf1 include:spf.protection.outlook.com –all
10. Page 10 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Verifying that SPF record syntax is valid.
Using online tools to verify our SPF record
The nslookup tool can help us to query DNS servers about the
“existence” of SPF record but, “knowing” that the SPF record
exists, doesn’t “tell” as if the SPF record syntax is correct or
valid.
To be able to answer the “second part”, in which we want to
verify that syntax of the SPF record, we will need to use our
“knowledge” or instead, use a free online tool that can
examine and verify the syntax of our SPF record.
In the next section, we will demonstrate how to check the
“validity” of our SPF record using two online web-based tools.
11. Page 11 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Example 1: using the SPF Record Testing Tools
http://www.kitterman.com/spf/validate.html
In the following example, we use the SPF checker for testing
the SPF record the represent the domain name: o365info.com
In the Domain name box: we add the domain name that we
want to check.
In the following screenshot, we can see the result from the
test.
12. Page 12 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
The test found that the domain uses the following SPF record:
The TXT records found for your domain are: v=spf1
include:spf.protection.outlook.com –all
Additionally, the test “approve” that the syntax of our SPF
record is correct:
SPF record passed validation test with pySPF (Python SPF
library)!
Example 2: using mxtoolbox SPF tool
http://mxtoolbox.com/spf.aspx
Personally, I like to use the mxtoolbox site because, the
interface are more user friendly and the test result includes
more detailed information.
13. Page 13 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
For example, in the test result of the SPF record, we can see
additional information such as:
less than two SPF record found”, the meaning that it’s “OK”
because we don’t use more than one SPF record.
14. Page 14 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Additional reading
Attached links to additional SPF validator online tools
SPF Record Testing Tools
SPF Records
Beveridge Hosting – SPF Test
SPF record and “Mixed mail” infrastructure
In a scenario which I described as: “Mixed mail infrastructure
environment”, we use the Office 365 (Exchange Online) as our
15. Page 15 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
mail infrastructure + use an additional mail server that will
send E-mail “on behalf” of our domain name.
In this case, we will need to “inform” another mail server that
our organization domain name is “represented” by “two
different entities”: the Office 365 (Exchange Online) mail server
+ a specific mail server that is hosted in our organization.
To be able to demonstrate this type of configuration, let’s use
the following scenario:
Our mail infrastructure is hosted on Office 365 but in addition,
we use on-Premises mail server that uses the public IP address:
212.25.80.239
Our organization domain name is: o365info.com
16. Page 16 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Creating the required SPF record
We want to create an SPF record that “confirms” these two
different mail servers infrastructure.
Q: What is the syntax that I need to use for my SPF record, in
case I have an additional mail servers?
A: We will need to use the “original syntax” of the Office 365
SPF record + add the information about the on-Premise mail
server that uses the public IP address: 212.25.80.239
In our scenario, the “original Office 365 SPF record syntax” is:
17. Page 17 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
We will need to “extend” the original SPF record so, the SPF
record will include additional information about our On-
Premises mail server.
The SPF record syntax is very “flexible” meaning; we can relate
to the additional mail server in many ways, such as – A record,
MX record, IP4 address, IP6 addresses and so on.
In the following diagram, we can see an example of the “new
SPF record” that includes the information about the additional
On-Premises mail server that uses the public IP address:
212.25.80.239
Q: Is there an online tool that could help me in the task of
creating the syntax for
my SPF record?
A: Yes, there are a couple of online tools that could be
described as: SPF Generator
In the following example, we will use an online SPF Generator
of a website named: mailradar
In our scenario, we will need to provide three parameters:
1. Domain name – in our example our domain name
is: o365info.com
18. Page 18 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
2. The Office 365 SPF syntax that includes all the available
Exchange Online server lists:spf.protection.outlook.com
3. The IP address of our on-Premises mail server: 212.25.80.239
At the bottom of the screen, in the section SPF result, we can
see the SPF record “content” that we will need to use (by
adding a TXT record to our public DNS server).
19. Page 19 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
20. Page 20 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Additional reading
SPF Generator
SPF Wizard
Microsoft’s Sender ID Framework SPF Record Wizard
SPF Record Generator
SPF Wizard
SPF syntax and information
How to Check, Test and Validate SPF Record in DNS is
Correct and Valid
Sender Policy Framework
Sender authentication part 9: SPF Syntax
Sender Policy Framework
SPF Record Syntax
More Information About Txt Record
SPF Record Syntax
Protect your SMTP domain with SPF records
Writing an SPF Record
Sender Policy Framework and Sender ID FAQs
Managing Exchange Online Sender Protection Framework
Records (SPF)
SPF Records – creating and testing
21. Page 21 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Internal outbound spam in Office 365
environment | Article series index
A quick reference for the article series
My E-mail appears as a spam | Article
series index | Part 0#17
The article index of the complete
article series
Introduction to the concept of internal outbound spam in general
and in Office 365 and Exchange Online environment
My E-mail appears as a spam –
Introduction | Office 365 | Part 1#17
The psychological profile of the
phenomenon: “My E-mail appears as
a spam!”, possible factors for causing
our E-mail to appear a “spam mail”,
the definition of internal outbound
spam.
Internal spam in Office 365 –
Introduction | Part 2#17
Review in general the term: “internal
outbound spam”, miss conceptions
that relate to this term, the risks that
22. Page 22 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
are involved in this scenario,
outbound spam E-mail policy and
more.
Internal spam in Office 365 –
Introduction | Part 3#17
What are the possible reasons that
could cause to our mail to appear as
spamjunk mail, who or what are this
“elements”, that can decide that our
mail is a spam mail?, what are the
possible “reactions” of the destination
mail infrastructure that identify our E-
mail as spamjunk mail?.
Commercial E-mail – Using the right
tools | Office 365 | Part 4#17
What is commercial E-mail?
Commercial E-mail as part of the
business process. Why do I think that
Office 365 Exchange Online is
unsuitable for the purpose of
commercial E-mail?
Introduction if the major causes for a scenario in which your
organization E-mail appears as spam
My E-mail appears as spam | The 7
major reasons | Part 5#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
23. Page 23 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
1. E-mail content, 2. Violation of the
SMTP standards, 3. BulkMass mail
My E-mail appears as spam | The 7
major reasons | Part 6#17
Review three major reasons, that
could lead to a scenario, in which E-
mail that is sent from our
organization identified as spam mail:
4. False positive, 5. User Desktop
malware, 6. “Problematic” Website
Introduction if the subject of SPF record in general and in Office
365 environment
What is SPF record good for? | Part
7#17
The purpose of the SPF record and the
relation to for our mail infrastructure.
How does the SPF record enable us to
prevent a scenario in which hostile
elements could send E-mail on our
behalf.
Implementing SPF record | Part 8#17
The “technical side” of the SPF record:
the structure of SPF record, the way
that we create SPF record, what is the
required syntax for the SPF record in
an Office 365 environment + mix mail
environment, how to verify the
existence of SPF record and so on.
24. Page 24 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
Introduction if the subject of Exchange Online - High Risk Delivery
Pool
High Risk Delivery Pool and Exchange
Online | Part 9#17
How Office 365 (Exchange Online) is
handling a scenario of internal
outbound spam by using the help of
the Exchange Online- High Risk
Delivery Pool.
High Risk Delivery Pool and Exchange
Online | Part 10#17
The second article about the subject
of Exchange Online- High Risk
Delivery Pool.
The troubleshooting path of internal outbound spam scenario
My E-mail appears as spam –
Troubleshooting path | Part 11#17
Troubleshooting scenario of internal
outbound spam in Office 365 and
Exchange Online environment.
Verifying if our domain name is
blacklisted, verifying if the problem is
related to E-mail content, verifying if
the problem is related to specific
organization user E-mail address,
moving the troubleshooting process
to the “other side.
25. Page 25 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
My E-mail appears as spam |
Troubleshooting – Domain name and
E-mail content | Part 12#17 Verify if
our domain name appears as
blacklisted, verify if the problem
relates to a specific E-mail message
content, registering blacklist
monitoring services, activating the
option of Exchange Online outbound
spam.
My E-mail appears as spam |
Troubleshooting – Mail server | Part
13#17
What is the meaning of: “our mail
server”?, Mail server IP, host name
and Exchange Online. One of our
users got an NDR which informs him,
that his mail server is blacklisted!,
How do we know that my mail server
is blacklisted?
My E-mail appears as spam |
Troubleshooting – Mail server | Part
14#17
The troubleshooting path logic. Get
the information from the E-mail
message that was identified as
spamNDR. Forwarding a copy of the
NDR message or the message that
saved to the junk mail
26. Page 26 of 26 | Implementing SPF record | Part 8#17
Written by Eyal Doron | o365info.com
My E-mail appears as spam |
Troubleshooting – Mail server | Part
15#17
Step B – Get information about your
Exchange Online infrastructure, Step
C – fetch the information about the
Exchange Online IP address, Step D –
verify if the “formal “Exchange Online
IP address a
De-list your organization from a
blacklist | My E-mail appears as spam
| Part 16#17
Review the charters of a scenario in
which your organization appears as
blacklisted. The steps and the
operations that need to be
implemented for de-list your
organization from a blacklist.
Summery and recap of the troubleshooting and best practices in a
scenario of internal outbound spam
Dealing and avoiding internal spam |
Best practices | Part 17#17
Provide a short checklist for all the
steps and the operation that relates
to a scenario of – internal outbound
spam.