Java is most widely used enterprise application development language. most of new developers get stuck on enterprise application development and maintenance due to lack of fundamentals. this slide walk you through from most fundamentals to advance concepts.
Ansible is an open-source software provisioning, configuration management, and application-deployment tool. It runs on many Unix-like systems.
This presentation to introduce ansiblle to beginners and step by step practical example for basic use cases
Docker is the best way to deploy services to production as those has independency. with dockers we can manage, secure, deploy each service separately without effecting to others. this slide explains how to create docker container and basis of docker.
Jenkins is an open source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery. It is a server-based system that runs in servlet containers such as Apache Tomcat.
Find Site Performance from the server to WordPress. A look at how some good performance gains can be made in tuning MySQL and APC and getting the most of out W3 Total Cache.
Professional WordPress Development with Vagrant - Andrea Cardinali - WordCam...Andrea Cardinali
Ti è mai capitato di sviluppare un sito in locale per poi ritrovarti con un sito non funzionante in produzione?
I tuoi colleghi utilizzano un’altra versione di php/MySql e ogni volta che unite il progetto emergono problemi? Ti trovi a dover ripetere le stesse operazioni ogni volta che crei un nuovo sito?
In questo talk risolverò tutti i tuoi problemi grazie all’utilizzo di Vagrant e VVV, è finita l’era del “Sulla mio computer funziona.”
Speech tenuto durante il WordCamp tenutosi a Milano il 22 Ottobre 2016
Gestione avanzata di WordPress con WP-CLI - WordCamp Torino 2017 - Andrea Car...Andrea Cardinali
WP-CLI è un ottimo strumento per abbattere i tempi di sviluppo e per automatizzare i task ripetitivi ed è un vero e proprio coltellino svizzero a disposizione dello sviluppatore. In questo talk parlerò di alcuni utilizzi avanzati e di come è possibile comandare i plugin realizzati attraverso WP-CLI
Talk tenuto durante il WordCamp Torino 2017- 8 Aprile 2017
WP-CLI is a great tool to cut down deployment time and to automate repetitive tasks. During the speech I'll talk about WP CLI and some of advanced tasks you can perform thanks to WP-CLI and its functionalities.
Talk @WordCamp Turin 2017
Java is most widely used enterprise application development language. most of new developers get stuck on enterprise application development and maintenance due to lack of fundamentals. this slide walk you through from most fundamentals to advance concepts.
Ansible is an open-source software provisioning, configuration management, and application-deployment tool. It runs on many Unix-like systems.
This presentation to introduce ansiblle to beginners and step by step practical example for basic use cases
Docker is the best way to deploy services to production as those has independency. with dockers we can manage, secure, deploy each service separately without effecting to others. this slide explains how to create docker container and basis of docker.
Jenkins is an open source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery. It is a server-based system that runs in servlet containers such as Apache Tomcat.
Find Site Performance from the server to WordPress. A look at how some good performance gains can be made in tuning MySQL and APC and getting the most of out W3 Total Cache.
Professional WordPress Development with Vagrant - Andrea Cardinali - WordCam...Andrea Cardinali
Ti è mai capitato di sviluppare un sito in locale per poi ritrovarti con un sito non funzionante in produzione?
I tuoi colleghi utilizzano un’altra versione di php/MySql e ogni volta che unite il progetto emergono problemi? Ti trovi a dover ripetere le stesse operazioni ogni volta che crei un nuovo sito?
In questo talk risolverò tutti i tuoi problemi grazie all’utilizzo di Vagrant e VVV, è finita l’era del “Sulla mio computer funziona.”
Speech tenuto durante il WordCamp tenutosi a Milano il 22 Ottobre 2016
Gestione avanzata di WordPress con WP-CLI - WordCamp Torino 2017 - Andrea Car...Andrea Cardinali
WP-CLI è un ottimo strumento per abbattere i tempi di sviluppo e per automatizzare i task ripetitivi ed è un vero e proprio coltellino svizzero a disposizione dello sviluppatore. In questo talk parlerò di alcuni utilizzi avanzati e di come è possibile comandare i plugin realizzati attraverso WP-CLI
Talk tenuto durante il WordCamp Torino 2017- 8 Aprile 2017
WP-CLI is a great tool to cut down deployment time and to automate repetitive tasks. During the speech I'll talk about WP CLI and some of advanced tasks you can perform thanks to WP-CLI and its functionalities.
Talk @WordCamp Turin 2017
Slides from my speech about web apps performance. Images, CSS, JS optimization. PHP and HTTP server effects + caching. Performance profiling with Blackfire.io, debugging with Xdebug.
My talk from WordCamp Raleigh 2014 on managing a large WordPress multisite network.
Supporting lots of standalone instances of WordPress can be a nightmare. Thankfully there is WordPress Multisite. But is it right for you? And what happens when your WordPress network explodes to include thousands of users and sites? At UNC-Chapel Hill our two WordPress multisite networks (self-serve/enterprise) power over 8,000 sites across a wide range of use cases. During this presentation I primarily explore the technical aspects of running a WordPress multisite network, such as scalability, security, user experience, and administrative challenges. I share tips, lessons learned, and ongoing challenges.
Why it's dangerous to turn off automatic updates and here's how to do itOnni Hakala
This was my presentation for WordCamp Helsinki 2017. It's about the default automatic updater in WordPress and how that can be enhanced using CI instead.
Managing a WordPress Site as a Composer Project by Rahul Bansal @ WordCamp Na...rtCamp
This presentation explains the advantages of using Composer dependency manager to manage complete WordPress projects, including themes, plugins and WordPress core itself.
This method makes developing, maintaining & scaling WordPress sites in a long run easy.
Varying WordPress Development Environment WordCamp Columbus 2016David Brattoli
These are the slides of David Brattoli's WordCamp Columbus 2016 presentation Varying WordPress Development Environment. This presentation covers setting a local web development for WordPress using Varying-Vagrant-Vagrants.
Best Practices for WordPress in EnterpriseTaylor Lovett
10up open sourced their WordPress Best Practices (PHP, JavaScript, tools, and workflows) in late 2014. As the Director of Web Engineering at 10up, I drove this project and am the lead contributor to the docs. These Best Practices allow developers to build sites that scale, perform, and are secure one sites receiving millions of page views per day. They also standardize development practices in such a way that facilitates team collaboration. This talk will highlight some important parts of the Best Practices and reveal some valuable tips about how we (10up) engineer some of the most complex and most viewed WordPress sites in the world.
How to investigate and recover from a security breach in WordPressOtto Kekäläinen
Talk given at the first ever WordCamp Nordic on March 8th, 2019.
How to investigate and recover from a security breach – real-life experiences with WordPress
Sometimes the bad guys get in, despite all the protections and precautions. If that happens, there are many techniques that can be used to stop further damage, track down what the intruder did and how they got in. Finally the site needs to be cleaned up and re-opened for visitors. In this talk the most important techniques are presented along with real-life examples when they were used.
With the 'rise of containers' comes also the rise of container platforms. And while Docker is the way to do things for now, Podman has also been gaining traction as the new kid on the block especially after being somewhat embraced by RedHat and Fedora. Being new also comes with lack of heavy scrutiny and audit on the security side of things. Once you start integrating other protocols and pieces that compliment each other, such as Varlink, boundaries become fuzzy. Rather than focus on container breakouts, which are also very important, we'll focus on how Podman and Varlink interoperate and the authentication and security implications as such. We'll look at the remote API capabilities, secure configurations and how certain setups and projects out there by default can be vulnerable to compromise. By the end of the talk, we will have discussed various bugs, issues and hardening techniques around deploying Podman and Varlink together and if you don't know a lot about containers, you'll learn a bit along the way.
The 5 most common reasons for a slow WordPress site and how to fix them – ext...Otto Kekäläinen
Presentation given in WP Meetup in October 2019.
Includes fresh new tips from summer/fall 2019!
A Must read for all WordPress site owners and developers.
web services are there to expose computer system to outside and make inter connect between those. this presentation explains what is web service, architecture and also types of web services.
this is mainly focus on RESTful services. this explains RESTful services architecture, guide line and also best practices to follow when design RESTful services.
Slides from my speech about web apps performance. Images, CSS, JS optimization. PHP and HTTP server effects + caching. Performance profiling with Blackfire.io, debugging with Xdebug.
My talk from WordCamp Raleigh 2014 on managing a large WordPress multisite network.
Supporting lots of standalone instances of WordPress can be a nightmare. Thankfully there is WordPress Multisite. But is it right for you? And what happens when your WordPress network explodes to include thousands of users and sites? At UNC-Chapel Hill our two WordPress multisite networks (self-serve/enterprise) power over 8,000 sites across a wide range of use cases. During this presentation I primarily explore the technical aspects of running a WordPress multisite network, such as scalability, security, user experience, and administrative challenges. I share tips, lessons learned, and ongoing challenges.
Why it's dangerous to turn off automatic updates and here's how to do itOnni Hakala
This was my presentation for WordCamp Helsinki 2017. It's about the default automatic updater in WordPress and how that can be enhanced using CI instead.
Managing a WordPress Site as a Composer Project by Rahul Bansal @ WordCamp Na...rtCamp
This presentation explains the advantages of using Composer dependency manager to manage complete WordPress projects, including themes, plugins and WordPress core itself.
This method makes developing, maintaining & scaling WordPress sites in a long run easy.
Varying WordPress Development Environment WordCamp Columbus 2016David Brattoli
These are the slides of David Brattoli's WordCamp Columbus 2016 presentation Varying WordPress Development Environment. This presentation covers setting a local web development for WordPress using Varying-Vagrant-Vagrants.
Best Practices for WordPress in EnterpriseTaylor Lovett
10up open sourced their WordPress Best Practices (PHP, JavaScript, tools, and workflows) in late 2014. As the Director of Web Engineering at 10up, I drove this project and am the lead contributor to the docs. These Best Practices allow developers to build sites that scale, perform, and are secure one sites receiving millions of page views per day. They also standardize development practices in such a way that facilitates team collaboration. This talk will highlight some important parts of the Best Practices and reveal some valuable tips about how we (10up) engineer some of the most complex and most viewed WordPress sites in the world.
How to investigate and recover from a security breach in WordPressOtto Kekäläinen
Talk given at the first ever WordCamp Nordic on March 8th, 2019.
How to investigate and recover from a security breach – real-life experiences with WordPress
Sometimes the bad guys get in, despite all the protections and precautions. If that happens, there are many techniques that can be used to stop further damage, track down what the intruder did and how they got in. Finally the site needs to be cleaned up and re-opened for visitors. In this talk the most important techniques are presented along with real-life examples when they were used.
With the 'rise of containers' comes also the rise of container platforms. And while Docker is the way to do things for now, Podman has also been gaining traction as the new kid on the block especially after being somewhat embraced by RedHat and Fedora. Being new also comes with lack of heavy scrutiny and audit on the security side of things. Once you start integrating other protocols and pieces that compliment each other, such as Varlink, boundaries become fuzzy. Rather than focus on container breakouts, which are also very important, we'll focus on how Podman and Varlink interoperate and the authentication and security implications as such. We'll look at the remote API capabilities, secure configurations and how certain setups and projects out there by default can be vulnerable to compromise. By the end of the talk, we will have discussed various bugs, issues and hardening techniques around deploying Podman and Varlink together and if you don't know a lot about containers, you'll learn a bit along the way.
The 5 most common reasons for a slow WordPress site and how to fix them – ext...Otto Kekäläinen
Presentation given in WP Meetup in October 2019.
Includes fresh new tips from summer/fall 2019!
A Must read for all WordPress site owners and developers.
web services are there to expose computer system to outside and make inter connect between those. this presentation explains what is web service, architecture and also types of web services.
this is mainly focus on RESTful services. this explains RESTful services architecture, guide line and also best practices to follow when design RESTful services.
From redirects to insecure content to duplicate content, everyone screws up https. Even top-tier developers get this wrong, and the results can be devastating.
Learn how to secure your website without losing your rankings and become more trustworthy in the eyes of your visitors.
HTMX: Web 1.0 with the benefits of Web 2.0 without the grift of Web 3.0Martijn Dashorst
HTMX is an upcoming client side library to make rich applications development palatable to backend developers: it puts the HTML back into the development of the web!
HTMX uses attributes to enable HTML elements to send requests and respond to server side rendered HTML content, updating your page dynamically.
It is a refreshing way of building web applications and I'd like to show you why this should be added to your toolbox.
The talk was given at the 20th anniversary edition of JFall, November 9th 2023 in the Netherlands.
The Case for HTTP/2 - GreeceJS - June 2016Andy Davies
HTTP/2 is here but why do we need it, how is it different to HTTP/1.1 and what does the mean for developers?
Slides from my talk at GreeceJS in Athens, June 2016
Andy Davies (Web Performance Expert @NCC Group, Author of Using WebPageTest - O'reilly) presents The case for HTTP/2 at GreeceJS meetup #14 (Athens, June 15, 2016)
Solving HTTP Problems with Code and ProtocolsC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/2G8Jngj.
Natasha Rooney goes through the issues in HTTP, how HTTP2 was developed using Google’s SPDY experiment, and the impact of QUIC. Filmed at qconsf.com.
Natasha Rooney is a member of the W3C Advisory Board and the Stack Evolution Group at IETF. She works as a Engineering Director at GSMA.
Neil Walker from made Notable will discuss secure search, its past, impact and future. It was big news when Google first announced HTTPS as a ranking signal in August 2014, so what impact has this had for businesses, should brands and webmaster update to https and what tools and advise is needed to ensure a website meet Google’s guidelines.
This webinar will cover:
1. History of Https
2. The impact – Winners & Losers
3. Tools and advice to help you switch
4. The future of https as a ranking signal
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
1.Wireless Communication System_Wireless communication is a broad term that i...
Introduction to-ict
1. Introduction to ICT
Krishantha Dinesh
http://www.krishantha.com
https://www.linkedin.com/in/krish-/
https://youtube.com/krish
lets talk about web - www.krishantha.com
2. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Objectives
• Not to teach everything
• Not to teach nothing
• Help to open your mind
• Give the basic understanding about technologies
lets talk about web - www.krishantha.com
3. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
What you should do
• Question your self.
• Don’t understand the way you want
• But understand the “how It is”
• You always see what you want to see ??
lets talk about web - www.krishantha.com
4. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
What we discuss
• Email
• ARP
• How web work
• DNS concept
• SSL
• Social media
• How stay safe on web
lets talk about web - www.krishantha.com
6. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How postal mail worked
lets talk about web - www.krishantha.com
7. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How email work
lets talk about web - www.krishantha.com
• User log in to his mail account
• Type mail and send
• Its goes to receiver mail server and store
• Receiver receive and read it
8. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Reality
lets talk about web - www.krishantha.com
9. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• A ) Sender creates and sends an email
• The originating sender creates an email in their Mail User Agent (MUA) and clicks 'Send'. The MUA is the
application the originating sender uses to compose and read email, such as Outlook, etc.
• B) Sender's MDA/MTA routes the email
• The sender's MUA transfers the email to a Mail Delivery Agent (MDA). Frequently, the sender's MTA also
handles the responsibilities of an MDA. Several of the most common MTAs do this, including sendmail and
qmail
• The MDA/MTA accepts the email, then routes it to local mailboxes or forwards it if it isn't locally addressed.
• In our diagram, an MDA forwards the email to an MTA and it enters the first of a series of "network clouds,"
labeled as a "Company Network" cloud.
lets talk about web - www.krishantha.com
10. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• C) cloud
• An email can encounter a network cloud within a large company or ISP, or the largest network cloud in
existence: the Internet.
• Email service providers and other companies that process a large volume of email often have their own, private
network clouds. These organizations commonly have multiple mail servers, and route all email through a
central gateway server (i.e., mail hub) that redistributes mail to whichever MTA is available.
• D) Queue
• The email in the diagram is addressed to someone at another company, so it enters an email queue with other
outgoing email messages. If there is a high volume of mail in the queue—either because there are many
messages or the messages are unusually large, or both—the message will be delayed in the queue until the
MTA processes the messages ahead of it.
lets talk about web - www.krishantha.com
11. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• E) MTA to MTA Transfer
• When transferring an email, the sending MTA handles all aspects of mail delivery until the message has
been either accepted or rejected by the receiving MTA.
• Each MTA in the Internet network cloud needs to "stop and ask directions" from the Domain Name
System (DNS) in order to identify the next MTA in the delivery chain. The exact route depends partly on
server availability and mostly on which MTA can be found to accept email for the domain specified in
the address.
• To find the recipient's IP address and mailbox, the MTA must drill down through the Domain Name
System (DNS)
lets talk about web - www.krishantha.com
12. How you browse internet
lets talk about web - www.krishantha.com
13. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
ARP
lets talk about web - www.krishantha.com
14. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Broadcasting all over
lets talk about web - www.krishantha.com
15. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
One decide he has requested address
lets talk about web - www.krishantha.com
16. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Building reply
lets talk about web - www.krishantha.com
17. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Update own cache
lets talk about web - www.krishantha.com
18. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Unicast reply to requester
lets talk about web - www.krishantha.com
19. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Update ARP cache
lets talk about web - www.krishantha.com
20. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Find DNS to reach internet servers
lets talk about web - www.krishantha.com
21. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
What is ARP?
• The ARP protocol was designed out of necessity to facilitate the translation of addresses between the
second and third layers of the OSI model.
• Each layer has its own addressing scheme, and they must work together in order to make network
communication happen
• For above requirement ARP was created with RFC 826, “An Ethernet Address Resolution Protocol”.
lets talk about web - www.krishantha.com
22. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How ARP works
lets talk about web - www.krishantha.com
23. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How ARP works cont.…
• ARP operation is centered around two packets, an ARP request and an ARP reply
• Purpose of the request and reply are to locate the hardware MAC address associated with a given IP
address
• When 10.0.81.85 needs to contact 10.0.81.82 it send broadcast message as “who has 10.0.81.82
tell 10.0.81.85”
• 10.0.81.82 will respond as “10.0.81.82 is at 1C-3E-84-8D-9C-53”
lets talk about web - www.krishantha.com
24. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
ARP Demo
lets talk about web - www.krishantha.com
25. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How this compromised?
• ARP cache poisoning takes advantage of the insecure nature of the ARP protocol
• devices using ARP will accept updates at any time
• This means that any device can send an ARP reply packet to another host and force that host to update
its ARP cache with the new value
• Sending an ARP reply when no request has been generated is called sending a gratuitous ARP
• When malicious intent is present the result of a few well placed gratuitous ARP packets used in this
manner can result in hosts who think they are communicating with one host, but in reality are
communicating with a listening attacker
lets talk about web - www.krishantha.com
26. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Poisoned network
lets talk about web - www.krishantha.com
27. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How to defend
• arp –a will give you arp cache. Check for duplication entry
• #avoid - Use static arp when possible [arp –s <IP> <MAC>
• #detect - IDS
lets talk about web - www.krishantha.com
29. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
overview
lets talk about web - www.krishantha.com
30. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How its work
• A person types in the URL of the internet website that he/she wants to visit. Let’s use
http://www.krishantha.com/index.php as an example.
• The client browser then splits the URL to three separate parts: the protocol (in this example it’s “http”),
the server address/server name (in this case it’s www.krishantha.com) and the part of the URL (i.e.the
file name) which you requested for (in this case it’s “index.php”).
• The browser then contacts the DNS (Domain Name Server) to translate the entered domain name into its
personal IP address. The DNS servers are basically very simple databases that work to connect domain
names to IP addresses.
• Once the address of the server is established, the browser then determines which protocol should be
used for communication. In order to load a basic website, the HTTP protocol is used.
lets talk about web - www.krishantha.com
31. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• The next step for the browser is to send a special “GET” request to the web server in order to retrieve
the address and the page it has been provided. Simply speaking, the browser requests the server to
display the information contained at “index.php”. Unless there are any special security protocols
implemented, the server now responds to the request from the browser. It will verify the integrity of the
address, lookup the necessary files, run the appropriate scripts and finally returns the results to the
browser.
• The browser will translate all the data into the HTML format and render the result to the user on his/her
screen. If there are several types of files needed to show a web page (for example images or media files)
then the web browser needs to make additional requests in order to obtain each of these.
lets talk about web - www.krishantha.com
33. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
What it is
lets talk about web - www.krishantha.com
34. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Overview
lets talk about web - www.krishantha.com
35. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How can make sure we secured
lets talk about web - www.krishantha.com
• Do not accept warnings. ( can be victim of MTM)
37. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
What is social media
• websites and applications that enable users to create and share content or to participate in social
networking.
lets talk about web - www.krishantha.com
38. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Is it good?
Or
bad ?
lets talk about web - www.krishantha.com
39. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Is this good ?
lets talk about web - www.krishantha.com
40. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
When get like this ?
lets talk about web - www.krishantha.com
41. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
If you do this?
lets talk about web - www.krishantha.com
42. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
When he has knife ?
lets talk about web - www.krishantha.com
43. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
Now problem with knife ?
lets talk about web - www.krishantha.com
Or
person how
use the knife ?
44. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
lets talk about web - www.krishantha.com
45. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
How can stay safe in social media
• Follow these step-by-step instructions to manage your Facebook security and privacy settings
• Change who can see stuff
• Change who can contact
lets talk about web - www.krishantha.com
46. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• Block unwanted contacts
• Do not upload high quality photos directly from mobile.
• See how others see your profile
lets talk about web - www.krishantha.com
47. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• Enable secondary verification
• Do not share contact details
• Do not share confidential or personal information via chat
• Be careful that what you have shared on public
• Do not click link which come via chat
• Do not copy and paste code given via chat or blog
lets talk about web - www.krishantha.com
48. What we should do
lets talk about web - www.krishantha.com
49. * http://www.krishantha.com * https://www.youtube.com/krish * https://www.linkedin.com/in/krish-/
• Learn and make sure what you learnt is correct
• Question your self and then discuss
• Try to depends on updated resources as much as possible
• Try on practical work as much as possible
• Do not understand the way you want to understand
lets talk about web - www.krishantha.com
50. Q and A
lets talk about web - www.krishantha.com