This presentation will enable you to install ubuntu from the given opensource links and install basic dependencies to run your scripts of ns3 and show results in the form of animation in netanim. It will also give you a hands-on experience on Ubuntu environment
What is a Computer Network?
Characteristics of a computer network
Network Cables
Distributors
Routers
Internal Network Cards
External Network Cards
Intranet
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Internetwork
Point-to-Point
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
What is a Computer Network?
Characteristics of a computer network
Network Cables
Distributors
Routers
Internal Network Cards
External Network Cards
Intranet
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Internetwork
Point-to-Point
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
En la red encontraremos mucha documentación de servidores DNS con IPv4; este tutorial se enfoca en mostrar la configuración de un servidor DNS en Linux usando IPv6.
Here's the complete guide, how to add a system call to kernel on linux
You can contact me on Gmai
bilal.professional786@gmail.com
You can also contact me on Facebook
https://www.facebook.com/bilalbakhtawar
En la red encontraremos mucha documentación de servidores DNS con IPv4; este tutorial se enfoca en mostrar la configuración de un servidor DNS en Linux usando IPv6.
Here's the complete guide, how to add a system call to kernel on linux
You can contact me on Gmai
bilal.professional786@gmail.com
You can also contact me on Facebook
https://www.facebook.com/bilalbakhtawar
BLCN532 Lab 1Set up your development environmentV2.0.docxmoirarandell
BLCN532 Lab 1
Set up your development environment
V2.0
Introduction
This course introduces students to blockchain development for enterprise environments. Before you can develop software applications, you need to ensue your development environment is in place. That means you’ll need all the tools and infrastructure installed and configured to support enterprise blockchain software development projects.
In this lab you’ll set up your own Hyperledger Fabric development environment and install the course software from the textbook. When you finish this lab, you’ll have a working development environment and will be ready to start running and modifying blockchain applications.
The instructions in your textbook are for Mac and Linux computers.
However
, there is no guarantee that your installation of MacOS or Linux is completely compatible with the environment in which the commands from the textbook work properly. For that reason, I
STRONGLY SUGGEST
that you acquire an Ubuntu 16.04 Virtual Machine (VM) for your labs. Using an Ubuntu 16.04 VM will make the labs far easier to complete.
The instructions in this course’s labs assume that your computer runs the Windows operating system. If you run MacOS or Linux, you can get
Vagrant
and
VirtualBox
for those operating systems and follow the gist of the “Initial setup for Windows computers”.
Lab Deliverables:
To complete this lab, you must create a
Lab Report file
and submit the file in iLearn. The Lab Report file must be a Microsoft Word format (.docx), and have the filename with the following format:
BLCN532_SECTION_STUDENTID_LASTNAME_FIRSTNAME_Lab01.docx
· SECTION is the section number of your current course (2 digits)
· STUDENTID is your student ID number (with leading zeros)
· LASTNAME is your last name, FIRSTNAME is your first name
To get started, create a Microsoft Word document (.docx) with the correct filename for this lab. You’ll be asked to enter text and paste screenshots into the lab report file.
NOTE: All screenshots MUST be readable. Use the Ubuntu Screen Capture utility (see the lab video.) Make sure that you label each screenshot (i.e. Step 2.1.3) and provide screenshots in order. For commands that produce lots of output, I only want to see the last full screen when the command finishes. Provide FULL screenshots, NOT cropped images.
SECTION 1: Initial setup for Windows computers (Chapter 3)
Step 1.1: Install Oracle Virtualbox (Windows, Linux, MacOS)
Oracle Virtualbox is an open source virtualization environment that allows you to run multiple virtual machines and containers on a single personal computer. Virtualbox is free and it is easy to install.
In your favorite web browser, navigate to:
https://www.virtualbox.org/
and click the “Download Virtualbox” button. Click the “Windows hosts” link to download the main installation executable. You should also click the “All supported platforms” under the “Extension Pack” heading to download extra software supp.
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxkarlhennesey
Part 4: Scripting and Virtualization (due Week 7)Objectives
1. To learn scripting on Windows and Linux
2. To add virtualization with a Linux distributionStepsPart 1—Windows Scripting
Basic Script: Scripting is useful for small programming projects or quick tasks. Often, these programs are short and meant for small problems. Unlike compiled programming languages, scripting languages are generally interpreted. Batch files or scripts are created to automate tasks and may contain several commands in one file. Scripts can be created in Notepad. These are short files that run each command in sequence at file execution. The windows command-line interface can be used to run scripts.
Below are some commands.
Echo = Displays a message in the batch file
Echo. displays a blank line
@command turns off the display of the current command
@echo off = does not echo back text
cls = clears your screen
:: = Adds comments to your code; this line will not be displayed
Start = used to start a windows application
Creating a Basic Script
cls
@echo off
::Your Name
echo "Creating a data dump file"
ipconfig /all > C:\Scripts\config_info.txt
echo end of script
Open Notepad by going to Start-> All Programs -> Accessories-> Notepad.
Type the above script into Notepad.
Create a directory named Scripts on the C:\ drive. Save this file in the C:\Scripts folder as myscript.cmd.
Do not close your Notepad file. To run, open a command prompt by typing cmd in the Search Programs and Files box when you click the Start button or search for cmd.
Change directory to the C:\Scripts folder by typing the following.
cd c:\Scripts
Then type in the following.
myscript.cmd
The script should run and will create a file.
Use the dir command to see what files are created.
Keep both the Notepad file and the command prompt open for the next step.
You can also shut down a computer from a script. This is helpful for remote shutdown in a networking situation. Add the following commands to your script and save it in Notepad. (Note: The ping command, though normally used for networking, here waits 4 seconds.)
shutdown /s /t 60 /c "Local shutdown in 1 minute!"
ping -w 1000 0.0.0.0 > nul
shutdown /a
echo "Shutdown has been aborted"
Click back to the command prompt.
Type in myscript.cmd to run the script.
You should see the script attempt to shut down, then abort the shutdown.
Keep both your Notepad and command prompt open.
Environment variables are built-in system variables available for all Windows processes describing users, paths, and so on.
Some common environment variables are as follows.
%PATH% = contains a list of directories with executable files, separated by semicolons. To add a path:
SET PATH = %PATH%;C:\Windows\Eclipse
%DATE% and %TIME% = current date and time
%RANDOM% = returns a random number between 0 and 32767
%WINDIR% = points to the windows directory C:\Windows
%PATHEXT% = displays executable file extensions ie .com, .exe, .bat, .cmd, .vbs, .vbe, ...
Orangescrum In App Chat Add-on User ManualOrangescrum
The In-App chat add-on will help you to install the add-on & guide you about the features of chat add-on.
It's a real-time chat widget built for the Orangescrum Community Version. It offers fully secure, single or multi-user chat with private messaging, chat invitations and more.
Explore chat add-on details at: http://www.orangescrum.org/add-on/chat
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Installation of ubuntu, ns3 and compiling first
1. Installation of Ubuntu, ns3 and
compiling first script for
Network Animator (nam)
JAWAD ALI
UNIVERSITY OF ENGINEERING AND TECHNOLOGY PESHAWAR
2. Portion covered in the presentation
Vmware .exe and Ubuntu .iso downloading and installation
Creating new machine for running Ubuntu
Installation of Ubuntu
Setting Ubuntu dimension for efficient use
Installation of prerequisites for ns3 simulator
Installation of ns3
Compiling first script using ns3 (wap)
Installation of network animator (NetAnim)
Converting example script to NetAnim ready .xml animation
Running .xml animation via NetAnim
3. Vmware installation
Download fresh .exe copy of vmware workstation (likely to be VMWare WS 11)
from
https://my.vmware.com/web/vmware/info/slug/desktop_end_user_computing/vm
ware_workstation/11_0
Install it on your machine in the regular manner
Now, download Ubuntu 14.04 LTE or newer version from Ubuntu official site for
Free from http://www.ubuntu.com/download/desktop
4. Creating New machine for Ubuntu and
Ubuntu installation
Open vmware workstation and go to File>New
In the next window, select Ubuntu 14.04 - 32bit operating system and use
the default specifications for the machine except changing the SCSI hard
drive size to >15GB as shown in Fig. 1
Locate the downloaded .iso of Ubuntu 32bit and proceed with making
machine.
This above step will take few seconds. You need to power up your new
machine so that in installation begins
Figure 1
5. Setting Ubuntu dimensions for efficient
use
After you are finished with the installation
process, you will see a login screen. Logging into
the Administrator account will lead you to your
newly installed Ubuntu desktop as shown in Fig.2.
Now you need to set resolution of Ubuntu
desktop by right clock on the screen and making
it equal to your parent machine dimensions.
The go to vmware preferences in the edit menu
and mark the resolution of guest for having full
screen Ubuntu environment on your vmware.
Figure 2
6. Installation of prerequisites for ns3
simulator
There are several techniques followed now a days for installation of ns3 and
indeed several versions of ns3.
We will install ns-3-dev as we are going to run developmental tasks on it
Follow the instruction manual given on https://www.nsnam.org/wiki/Installation
The core of ns-3 requires a gcc/g++ installation of 3.4 or greater, and Python 2.4
or greater
7. Installation of prerequisites for ns3
simulator (cont.)
All Ubuntu download and install commands are
prefixed by sudo apt-get install <package
name> followed by your Admin password
Install the following packages one by one using
the above syntax in terminal that can be found
by searching it in the computer programs by
clicking on the Ubuntu icon in the upper left
corner of the Ubuntu desktop screen.
gcc g++ python
Mercurial
Python-dev
Qt4-dev-tools
Bzr
Cmake libc6-dev libc6-dev-i386 g++-multilib
7z
Sqlite3 sqlite
Valgrid gdb
Flex bison tcpdump
(other packages are listed in
(https://www.nsnam.org/wiki/Installation))
Note: Copy/Paste works in terminal. Change the
copy/paste short cuts from keyboard shortcuts
settings in the Ubuntu as you are familiar with
Ctrl+C and Ctrl+V version of these shortcuts. By
default its Ctrl+Alt+C/V
8. Solving prerequisite issues using bake
(Cont.)
Bake is one of the convenient way to install all packages and also installing ns3 into the machine
Universal technique: if you get in trouble with downloading any package that you need on Ubuntu
and you are not aware of its presence on the Ubuntu github. You should use the following
universal search technique using terminal
apt-cache search <package name>
This will give u a list of available packages ready to download. For example you want to download
vlc player and you don’t know its store name
Type: apt-cache search vlc, and it will give you something like shown in Fig. 3.
All you need to do is type sudo apt-get install vlc-nox and press enter plus password
Figure 3
9. Using bake (cont.)
Download mercurial using the technique given in the previous slide if u haven’t
downloaded it till now.
Go to home directory and then to resource in the terminal view using the below
command
Cd
Cd resource Note: just type: cd res<tab_key>
Now, type hg clone http://code.nsname.org/bake bake
Your resources now have Bake copied
10. Using bake (cont.)
As you are now in resource directory, cd bake will lead you
to bake directory.
Here type ./bake.py check and you will see the list of
dependencies that are currently required by ns3 for its
installation as shown in Fig. 4
An ok to a module means that module is not required. You
can download the missing module by typing its name
prefixed by apt-cache search in the terminal. Then install it
using sudo apt-get install <package_name>
Remember that you have to append the path of this folder
if you want to check dependencies outside this folder in
the terminal using procedure given on
https://www.nsnam.org/docs/bake/tutorial/html/bake-
tutorial.html
Figure 4
11. Using bake (cont.)
Add module that you want to download using bake by typing bake.py configure –
e ns-3.17 or bake.py configure ns-3-dev
The deploy the module by typing bake.py deploy
If commands does not work with just there names start bake.py with a dot and a
forward slash like ./bake.py deploy
The deploy is the convenience two commands bake.py download and bake.py
build as these two are combined in one
Hurrah! You have configured ns3 in your resource folder
12. Compiling first script with ns3
Configuration of ns3 with waf tool for script compilation
Waf is by default copied into your ns-3-dev folder so you don’t need to get it
again from ns3 site.
Waf acknowledges g++ for its use for source coding
Type these two strings one by one in your terminal after you cd into ns-3-dev
folder CXXFLAGS=“03” ./waf configure and then CXXX=g++3.4 ./waf configure
Type ./waf –d optimized configure; ./waf while your are in ns-3-dev folder
You have successfully built 2200 .cc files and you can find them all in your build
folder from desktop file explorer as well.
13. Compiling first script with ns3 (cont.)
The test scripts are present in ~/resource/ns-3-dev/examples/tutorial/
Copy first.cc in to the ~/resource/ns-3-dev/scratch/ and rename it to myfirst.cc or
whatever you prefer
Run the following command in terminal while you cd in ns-3-dev ./waf –run
scratch/myfirst (“—” is a double minus and file name is without .cc) or just ./waf --
run myfirst
Hurrah! Your script is ready and waiting for you in build directory
14. Converting example script to NetAnim
ready .xml animation
Before you run ./waf command. Open the myfirst.cc in text editor and add this line
before simulation.run();
AnimationInterface anim (“animation.xml”);
anim SetConstantPosition (nodes.Get(0), 1.0, 2.0); //or any other coordinate
anim SetConstantPosition (nodes.Get(1), 2.0, 3.0);
This will generate a .xml file ready to be used in network animator and the file will
be in the place where you are now in the terminal
15. Running .xml animation via NetAnim
Cd into ~/resource/netanim/
Type:
1- make clean
2- qmake NetAnim.pro
3- make
-4 ./NetAnim (case sensetive)
(First 3 are one time only commands)
Open animation.xml as shown in Fig. 5 and
run it.
It is a good practice that you copy the shortcut of
animator and place it on desktop
Figure 5