Information Technology is an integral part of our daily life. Have you ever wondered what happens under the hood when you visit a webpage? Or what OOP actually means?
In this presentation for Joomladay Germany 2014 in Cologne, Peter Martin explains common concepts like Operating System, Internet, Server, Website, Object Oriented Programming, Joomla in plain English.
Contents:
1. Computer
2. Operating System
3. Network
4. Internet
5. Server
6. Email
7. WWW
8. Website
9. OOP
10. Joomla
Information Technology is an integral part of our daily life. Have you ever wondered what happens under the hood when you visit a webpage? Or what OOP actually means?
In this presentation, Peter explains common concepts like Operating System, Internet, Server, Website, Object Oriented Programming, Joomla in plain English.
In this keynote for Joomladay UK 2014 Peter explains the following subjects:
Computer
Operating System
Local Area Network (LAN)
Internet (Wide Area Network (WAN))
Server
Email
WWW
Website & PHP/MySQL
Object Oriented Programming (OOP)
Joomla
"How to use fiddler" This presentation will be help you, if you first user about fiddler. Some presentation's page has gammer error then, Please, Email me with feedback, i will fix it quickly. Thanks for your watching
writter's email : dydwls121200@gmail.com
I'm a student in korea.
Exactly There are lots of grammer error. .
Presentation MobileTechCon 2010, Mainz, Germany: Stay Connected - Mobile Pushing Apps with jWebSocket:
Whether on-line games, or online collaboration, streaming, chat, remote control or monitoring applications - real-time communication has long ago moved into cross-platform and cross-browser web solutions. HTML5 WebSockets are the ideal basis for bidirectional high-speed data exchange in real time.
Information Technology is an integral part of our daily life. Have you ever wondered what happens under the hood when you visit a webpage? Or what OOP actually means?
In this presentation, Peter explains common concepts like Operating System, Internet, Server, Website, Object Oriented Programming, Joomla in plain English.
In this keynote for Joomladay UK 2014 Peter explains the following subjects:
Computer
Operating System
Local Area Network (LAN)
Internet (Wide Area Network (WAN))
Server
Email
WWW
Website & PHP/MySQL
Object Oriented Programming (OOP)
Joomla
"How to use fiddler" This presentation will be help you, if you first user about fiddler. Some presentation's page has gammer error then, Please, Email me with feedback, i will fix it quickly. Thanks for your watching
writter's email : dydwls121200@gmail.com
I'm a student in korea.
Exactly There are lots of grammer error. .
Presentation MobileTechCon 2010, Mainz, Germany: Stay Connected - Mobile Pushing Apps with jWebSocket:
Whether on-line games, or online collaboration, streaming, chat, remote control or monitoring applications - real-time communication has long ago moved into cross-platform and cross-browser web solutions. HTML5 WebSockets are the ideal basis for bidirectional high-speed data exchange in real time.
Website & Internet + Performance testingRoman Ananev
The presentation about how the site works on the Internet and what happens when you open it in your browser. What happens under the hood of the server and browser.
How to measure the performance of the CS-Cart project simply and without technical knowledge :) And of course, why all the online-performance-testing services lie, or dont provides a clear view ;)
https://www.simtechdev.com/cloud-hosting
---
Cloud hosting for CS-Cart, Multi-Vendor, WordPress, and Magento
by Simtech Development - AWS and CS-Cart certified hosting provider
free installation & migration | free 24/7 server monitoring | free daily backups | free SSL | and more...
Dans cette session, Chris Wilson parlera d’Internet Explorer 8 et de ses avancées en termes de conformité aux standards et de prise en charge d’AJAX. Il illustrera aussi les nouvelles possibilités qui s’offrent aux responsables de sites Web.
Troubleshooting Joomla! problems - Joomladay Germany 2014Peter Martin
Blank screens, deprecated errors, missing Class errors, can't login, can't install, my website is slow, my website got hacked... We all have run into one or two of those. If not, other people have... If you don't believe me, just visit http://forum.joomla.org/ :-)
On the basis of the 10 most common problems seen in Joomla Forum, Peter will learn you to:
* identify a problem
* identify the real problem behind it
* solve that problem
* or get help quickly by asking the right questions
In the process you might learn something more about Joomla's Debug mode, .htaccess, phpMyAdmin, permissions, XAMPP, Akeeba Backup, Admin Tools, Google Chrome Inspect Element, FireFox Firebug, diff...
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)Ericom Software
WebSockets couples the performance and flexibility of TCP with the reach of HTTP Prediction: WebSockets will replace simple TCP as preferred underlying protocol.
To see how Websockets are used in a popular HTML5-based remote access solution, by visiting the following URL: http://j.mp/1luquBQ
The time of static or dynamically generated sites is long gone. Non-stop interaction with users is the new normal. However, polling with Ajax requests is processor intensive and cumbersome. Websockets allow you to interact with users in real-time without increasing system load. We'll go through the basics and see all the different options, illustrated with live examples of how and when to use it.
This presentation was given to the Dublin Node (JS) Community on May 29th 2014.
Presented by: Chris Lawless, Kevin Yu Wei Xia, Fergal Carroll @phergalkarl, Ciarán Ó hUallacháin, and Aman Kohli @akohli
Webinar slides: How to Secure MongoDB with ClusterControlSeveralnines
Watch the slides of our webinar on “How to secure MongoDB with ClusterControl” and find out about the essential steps necessary to secure MongoDB and how to verify if your MongoDB instance is safe.
The recent MongoDB ransom hack caused a lot of damage and outages, while it could have been prevented with maybe two or three simple configuration changes. MongoDB offers a lot of security features out of the box, however it disables them by default.
In this webinar, we explain which configuration changes are necessary to enable MongoDB’s security features, and how to test if your setup is secure after enablement. We also demonstrate how ClusterControl enables security on default installations. And we cover how to leverage the ClusterControl advisors and the MongoDB Audit Log to constantly scan your environment, and harden your security even more.
AGENDA
What is the MongoDB ransom hack?
What other security threats are valid for MongoDB?
How to enable authentication / authorisation
How to secure MongoDB from ransomware
How to scan your system
ClusterControl MongoDB security advisors
Live Demo
SPEAKER
Art van Scheppingen is a Senior Support Engineer at Severalnines. He’s a pragmatic MySQL and Database expert with over 15 years experience in web development. He previously worked at Spil Games as Head of Database Engineering, where he kept a broad vision upon the whole database environment: from MySQL to Couchbase, Vertica to Hadoop and from Sphinx Search to SOLR. He regularly presents his work and projects at various conferences (Percona Live, FOSDEM) and related meetups.
Internet of Things - Linux Usergroup NijmegenPeter Martin
A network is formed by connecting some computers. Connecting networks of connected computers to other networks, in combination with an (Internet) protocol, forms the Internet.
What happens if you have other devices to link this network of networks? Peter tells something about the Internet of Things (IoT), Web services, and how a sandwich (cheese, pesto and salad) inspired him to develop a "presence indicator" for his co-work.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.hacktivity
linkcabin aims to discuss the journey of reverse engineering a pub quiz machine, to a point of emulation. By reverse engineering the software, lessons have been learnt in implementation of security, limits in 'security by obscurity' software solutions and how complex actual machines which involve betting are. After reverse engineering parts of the machine, and coming from a threat intelligence background, it becomes clear how similar software and malware developers minds really are for functionality.
While still developing software for an archaic operating system, much like critical infrastructure around the world, it becomes hard to balance both security and functionality.
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxlior mazor
Stay safe, grab a drink and join us virtually for our upcoming "The Hacking Game - A Road to Post Exploitation" meetup
to learn how hackers can compromise the software supply chain, advanced data protection methods on WebLogic Server and
how to use AI in order to protect your software.
Agenda:
17:00 - 17:10 - 'Opening words' - by Gidi Farkash (CISO at Pipl Security)
17:10 - 17:40 - 'Tracking Attackers in Open Source Supply Chain - Lessons Learned' - by Jossef Harush Kadouri (Head of Software Supply Chain Security at Checkmarx)
17:40 - 18:20 - 'WebLogic - The Road to Post Exploitation' - by Amit German (Cyber Security Researcher at Pentera)
18:20 - 19:00 - 'AI In The Hands of Application Security' - by Brit Glazer (Head of Information Security at Unit)
Unite2014 Bunny Necropsy - Servers, Syncing Game State, Security and Optimiza...David Geurts
A 30 minute extension on the presentation Syncing Success. Talks about all the lessons learned and how we improved upon them. Very good tips on Unity and how to manage MonoBehaviours to make unity games run super smooth. Unity Asset Bundle build tool plan and setup
Developing new feature in Joomla - Joomladay UK 2016Peter Martin
Presentation "The Category Item Counter - developing a new feature" at Joomladay UK 2016 on February 13th in London, UK.
How does a new feature end up in Joomla? Peter talked about the new Category Item Counter feature that will be available in Joomla 3.5:
* the purpose of the feature
* where & how the idea for the "Nice" feature originated
* how the community helped to develop this feature
* how Joomla's development cycle works, including patch testing procedure, and who's Travis?
* the problems with differences in core components
* the hidden secret of com_categories
* how to add a Category Item Counter to your own component
Presentation video: http://www.youtube.com/watch?v=CK_tYC-Yy_c?t=45s
JCE editor optimaliseren (Joomla Den Bosch 2016)Peter Martin
Presentatie + demonstratie over het optimaliseren van JCE editor voor Joomla zodat het gemakkelijker werken is. Gegeven op 4 januari 2016 in de Joomla Gebruikersgroep 's-Hertogenbosch
Website & Internet + Performance testingRoman Ananev
The presentation about how the site works on the Internet and what happens when you open it in your browser. What happens under the hood of the server and browser.
How to measure the performance of the CS-Cart project simply and without technical knowledge :) And of course, why all the online-performance-testing services lie, or dont provides a clear view ;)
https://www.simtechdev.com/cloud-hosting
---
Cloud hosting for CS-Cart, Multi-Vendor, WordPress, and Magento
by Simtech Development - AWS and CS-Cart certified hosting provider
free installation & migration | free 24/7 server monitoring | free daily backups | free SSL | and more...
Dans cette session, Chris Wilson parlera d’Internet Explorer 8 et de ses avancées en termes de conformité aux standards et de prise en charge d’AJAX. Il illustrera aussi les nouvelles possibilités qui s’offrent aux responsables de sites Web.
Troubleshooting Joomla! problems - Joomladay Germany 2014Peter Martin
Blank screens, deprecated errors, missing Class errors, can't login, can't install, my website is slow, my website got hacked... We all have run into one or two of those. If not, other people have... If you don't believe me, just visit http://forum.joomla.org/ :-)
On the basis of the 10 most common problems seen in Joomla Forum, Peter will learn you to:
* identify a problem
* identify the real problem behind it
* solve that problem
* or get help quickly by asking the right questions
In the process you might learn something more about Joomla's Debug mode, .htaccess, phpMyAdmin, permissions, XAMPP, Akeeba Backup, Admin Tools, Google Chrome Inspect Element, FireFox Firebug, diff...
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)Ericom Software
WebSockets couples the performance and flexibility of TCP with the reach of HTTP Prediction: WebSockets will replace simple TCP as preferred underlying protocol.
To see how Websockets are used in a popular HTML5-based remote access solution, by visiting the following URL: http://j.mp/1luquBQ
The time of static or dynamically generated sites is long gone. Non-stop interaction with users is the new normal. However, polling with Ajax requests is processor intensive and cumbersome. Websockets allow you to interact with users in real-time without increasing system load. We'll go through the basics and see all the different options, illustrated with live examples of how and when to use it.
This presentation was given to the Dublin Node (JS) Community on May 29th 2014.
Presented by: Chris Lawless, Kevin Yu Wei Xia, Fergal Carroll @phergalkarl, Ciarán Ó hUallacháin, and Aman Kohli @akohli
Webinar slides: How to Secure MongoDB with ClusterControlSeveralnines
Watch the slides of our webinar on “How to secure MongoDB with ClusterControl” and find out about the essential steps necessary to secure MongoDB and how to verify if your MongoDB instance is safe.
The recent MongoDB ransom hack caused a lot of damage and outages, while it could have been prevented with maybe two or three simple configuration changes. MongoDB offers a lot of security features out of the box, however it disables them by default.
In this webinar, we explain which configuration changes are necessary to enable MongoDB’s security features, and how to test if your setup is secure after enablement. We also demonstrate how ClusterControl enables security on default installations. And we cover how to leverage the ClusterControl advisors and the MongoDB Audit Log to constantly scan your environment, and harden your security even more.
AGENDA
What is the MongoDB ransom hack?
What other security threats are valid for MongoDB?
How to enable authentication / authorisation
How to secure MongoDB from ransomware
How to scan your system
ClusterControl MongoDB security advisors
Live Demo
SPEAKER
Art van Scheppingen is a Senior Support Engineer at Severalnines. He’s a pragmatic MySQL and Database expert with over 15 years experience in web development. He previously worked at Spil Games as Head of Database Engineering, where he kept a broad vision upon the whole database environment: from MySQL to Couchbase, Vertica to Hadoop and from Sphinx Search to SOLR. He regularly presents his work and projects at various conferences (Percona Live, FOSDEM) and related meetups.
Internet of Things - Linux Usergroup NijmegenPeter Martin
A network is formed by connecting some computers. Connecting networks of connected computers to other networks, in combination with an (Internet) protocol, forms the Internet.
What happens if you have other devices to link this network of networks? Peter tells something about the Internet of Things (IoT), Web services, and how a sandwich (cheese, pesto and salad) inspired him to develop a "presence indicator" for his co-work.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.hacktivity
linkcabin aims to discuss the journey of reverse engineering a pub quiz machine, to a point of emulation. By reverse engineering the software, lessons have been learnt in implementation of security, limits in 'security by obscurity' software solutions and how complex actual machines which involve betting are. After reverse engineering parts of the machine, and coming from a threat intelligence background, it becomes clear how similar software and malware developers minds really are for functionality.
While still developing software for an archaic operating system, much like critical infrastructure around the world, it becomes hard to balance both security and functionality.
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxlior mazor
Stay safe, grab a drink and join us virtually for our upcoming "The Hacking Game - A Road to Post Exploitation" meetup
to learn how hackers can compromise the software supply chain, advanced data protection methods on WebLogic Server and
how to use AI in order to protect your software.
Agenda:
17:00 - 17:10 - 'Opening words' - by Gidi Farkash (CISO at Pipl Security)
17:10 - 17:40 - 'Tracking Attackers in Open Source Supply Chain - Lessons Learned' - by Jossef Harush Kadouri (Head of Software Supply Chain Security at Checkmarx)
17:40 - 18:20 - 'WebLogic - The Road to Post Exploitation' - by Amit German (Cyber Security Researcher at Pentera)
18:20 - 19:00 - 'AI In The Hands of Application Security' - by Brit Glazer (Head of Information Security at Unit)
Unite2014 Bunny Necropsy - Servers, Syncing Game State, Security and Optimiza...David Geurts
A 30 minute extension on the presentation Syncing Success. Talks about all the lessons learned and how we improved upon them. Very good tips on Unity and how to manage MonoBehaviours to make unity games run super smooth. Unity Asset Bundle build tool plan and setup
Developing new feature in Joomla - Joomladay UK 2016Peter Martin
Presentation "The Category Item Counter - developing a new feature" at Joomladay UK 2016 on February 13th in London, UK.
How does a new feature end up in Joomla? Peter talked about the new Category Item Counter feature that will be available in Joomla 3.5:
* the purpose of the feature
* where & how the idea for the "Nice" feature originated
* how the community helped to develop this feature
* how Joomla's development cycle works, including patch testing procedure, and who's Travis?
* the problems with differences in core components
* the hidden secret of com_categories
* how to add a Category Item Counter to your own component
Presentation video: http://www.youtube.com/watch?v=CK_tYC-Yy_c?t=45s
JCE editor optimaliseren (Joomla Den Bosch 2016)Peter Martin
Presentatie + demonstratie over het optimaliseren van JCE editor voor Joomla zodat het gemakkelijker werken is. Gegeven op 4 januari 2016 in de Joomla Gebruikersgroep 's-Hertogenbosch
Over the past 10 years Joomla! CMS has improved considerably. This presentation shows the history and progress of Joomla CMS.
This year, 2015, Joomla is 10 years old. Over the past 10 years Joomla CMS has improved considerably. At Joomladay France 2015 in Nice, Peter Martin spoke about the history of Joomla and progress of the CMS on the basis of different versions: Mambo, Joomla 1.0, Joomla 1.5, Joomla 2.5 to Joomla 3.x.
Joomla bestaat dit jaar (2015) 10 jaar en is in de loop der jaren enorm verbeterd.
Deze presentatie toont de geschiedenis & vooruitgang van Joomla aan de hand van Mambo, Joomla 1.0, Joomla 1.5, Joomla 1.6/1.7/2.5 en Joomla 3.x.
De Linux command line is een zeer krachtig stuk gereedschap. De meerderheid van de webservers draait op Linux/Unix. Sommige hosting bedrijven bieden SSH toegang aan tot hun hosting omgeving. Via SSH kun je dan inloggen en de Linux Command Line gebruiken.
In deze presentatie toont Peter enkele tijdsbesparende Command Line commando's die je kunt gebruiken bij jouw Joomla websites:
Enkele SSH command line commando's;
Analyseren en ongedaan maken van een gehackte website;
Een backup maken van een website;
Ongebruikte bestanden vinden;
Het opzetten van een test omgeving.
GNU Radio & digitaal vliegtuig spottenPeter Martin
De ether hangt vol met radiogolven: radio & tv uitzendingen, mobiele telefonie, wifi. En communicatie vanuit vliegtuigen. Peter vertelt iets over Software-Defined-Radio (SDR). En hij laat zien hoe je met een goedkope Windows USB TV dongle op een Linux computer het vliegverkeer in kaart kunt brengen.
Help mijn website is gehackt - Joomla User Group Den Bosch 2014Peter Martin
Bij een routine controle ontdekte Peter dat de website van een klant enkele vreemde nieuwe bestanden bevatte. Na enkele grondige scans ontdekte hij dat de website was "gehacked".
Wat te doen als je website is gehackt? In deze presentatie (gegeven bij Joomla User Group Den Bosch) bespreekt Peter waarom websites worden gehackt, toont hij enkele website hacks, en laat zien hoe je een website kunt herstellen.
Music Trackers - Linux Usergroup Nijmegen 2014Peter Martin
Muziek is tegenwoordig vooral beschikbaar in MP3 formaat. In de jaren '80 & '90 was dat anders: MP3 was nog niet beschikbaar en computers hadden onvoldoende geheugen, opslag en netwerk capiciteit.
In deze presentatie vertelt over oude muziek formaten en laat zien hoe hij recentelijk "oude" muziek bestanden (Commodore Amiga tracker files: MOD, IT & XM) op Linux afgespeeld kreeg.
linux-commandline-magic-Joomla-World-Conference-2014Peter Martin
The Linux command line is a powerful tool. The majority of webservers run on Linux/Unix. Some hosting companies offer SSH access to their hosting environment. Via SSH you can login and use the Linux command line.
In this presentation, Peter will show you some time-saving command line commands that you can use for certain tasks on your Joomla websites:
some basic SSH command line commands
Analyzing & recovering a hacked website
Backup a website or move it to another server
Finding unused files
Setting up a test environment
Developing a Joomla 3.x Component using RAD/FOF - Joomladay UK 2014Peter Martin
One of the new feature since Joomla 3.2 is Rapid Application Development (RAD) framework.
A Joomla component is a PHP/MySQL web application that uses Joomla's framework. You can build your components on Joomla's framework and Joomla will take care of the database connection, the design (using templates), access levels, forms (JForms), etc. Using Joomla's framework saves you a lot of work and development time. However, it can be even faster!
Most Joomla components include the same functionality: In the front-end a list of records from the database hyperlinked to pages with details of each record individually. In the back-end the component list records from the database, with a link to a form where you can change the data and save.
Using the Rapid Application Development Framework (also known as FOF (Framework On Framework)) allows you to develop a component with common functionality with far fewer lines of code.
In this presentation, Peter shows how you can use Joomla's RAD to build a simple Joomla component to manage locations and categories and present those on the front-end to visitors on a Google Map.
Developing a Joomla 3.x Component using RAD FOF- Part 2: Front-end + demo - J...Peter Martin
One of the new feature since Joomla 3.2 is Rapid Application Development (RAD) framework.
A Joomla component is a PHP/MySQL web application that uses Joomla's framework. You can build your components on Joomla's framework and Joomla will take care of the database connection, the design (using templates), access levels, forms (JForms), etc. Using Joomla's framework saves you a lot of work and development time. However, it can be even faster!
Most Joomla components include the same functionality: In the front-end a list of records from the database hyperlinked to pages with details of each record individually. In the back-end the component list records from the database, with a link to a form where you can change the data and save.
Using the Rapid Application Development Framework (also known as FOF (Framework On Framework)) allows you to develop a component with common functionality with far fewer lines of code.
In this presentation, Peter shows how you can use Joomla's RAD to build a simple Joomla component to manage locations and categories and present those on the front-end to visitors on a Google Map.
Contents:
* Programming a simple front-end component using FOF
* Demo with programming, github & local web environment
Developing a Joomla 3.x Component using RAD FOF- Part 1: Back-end - Joomladay...Peter Martin
One of the new feature since Joomla 3.2 is Rapid Application Development (RAD) framework.
A Joomla component is a PHP/MySQL web application that uses Joomla's framework. You can build your components on Joomla's framework and Joomla will take care of the database connection, the design (using templates), access levels, forms (JForms), etc. Using Joomla's framework saves you a lot of work and development time. However, it can be even faster!
Most Joomla components include the same functionality: In the front-end a list of records from the database hyperlinked to pages with details of each record individually. In the back-end the component list records from the database, with a link to a form where you can change the data and save.
Using the Rapid Application Development Framework (also known as FOF (Framework On Framework)) allows you to develop a component with common functionality with far fewer lines of code.
In this presentation, Peter shows how you can use Joomla's RAD to build a simple Joomla component to manage locations and categories and present those on the front-end to visitors on a Google Map.
Contents:
* The Basics of FOF
* Programming a back-end component using FOF
Note: It *is* possible to attend this session without attending Part 2: Front-end After this session you should have an idea what FOF is and how to create your own back-end component using FOF.
Linux Nijmegen - Webserver (LAMP stack) opzetten met VirtualbBox & VagrantPeter Martin
Veel webservers draaien op basis van LAMP (Linux, Apache, MySQL en PHP). Een LAMP stack is eenvoudig op te zetten. In deze presentatie wordt een LAMP stack opgezet in een virtuele omgeving mbv VirtualBox, Vagrant en een Vagrant Box.
Problemen oplossen in Joomla - Joomladagen 2014Peter Martin
Witte schermen, deprecated errors, missing Class errors, kan niet inloggen, kan niet installeren, mijn website is langzaam, mijn website is gehacked..." We hebben allemaal wel eens dergelijke problemen. En als je me niet gelooft, kijk gerust op http://forum.joomla.org/ In deze presentatie leert Peter je:
identificeren van een probleem
identificeren van het achterliggende probleem
het probleem op te lossen
of hulp te krijgen door de juiste vragen te stellen
En tijdens het probleem oplossen, leer je tevens iets over Joomla's debug modus, .htaccess, phpMyAdmin, XAMPP, Akeeba Backup, Admin Tools, Google Chrome Inspect Element, FireFox Firebug, diff...
Joomla 3 Component programmeren met RAD - Joomladagen 2014Peter Martin
Het Rapid Application Development (RAD) framework is een nieuw feature in Joomla 3.2.
Een Joomla component is een PHP/MySQL webapplicatie die gebruik maakt van Joomla's framework. In plaats van zelf een database connectie op te hoeven bouwen, kun je Joomla's database object aanspreken. Ook de vormgeving via templates, toegangsniveaus, opbouw van formulieren (JForms) kun je via Joomla's framework laten afhandelen. Dit scheelt veel werk en ontwikkeltijd. Toch kan het nog sneller!
De meeste Joomla componenten bevatten dezelfde functionaliteit:
In de front-end worden lijsten met gegevens uit de database getoond, met een hyperlink naar een pagina met detailweergave.
In de back-end worden vaak lijsten met gegevens uit de database getoond, met een hyperlink naar een formulier waarmee je de gegevens kunt wijzigen en opslaan.
Door gebruik van het Rapid Application Development framework (dat is gebaseerd op FOF (Framework On Framework) kun je die veelvoorkomende functionaliteit met veel minder regels code programmeren.
In deze presentatie laat Peter zien hoe je met RAD een eenvoudig Joomla component kunt bouwen om locaties & categorien te beheren en aan bezoekers (in combinatie met Google Maps) te tonen.
Component beschikbaar op: https://github.com/pe7er/db8locate
Joomla Bugs, Patches & Fun - Joomladagen 2014Peter Martin
Alle software bevat kleine fouten ("bugs"). Joomla ook. Om die fouten te verhelpen worden verbeteringen ("patches") gemaakt en uitgebracht. Voordat die verbeteringen in de Joomla broncode terecht komen, dienen ze getest te worden. Het in teamverband testen van bugs en patches kan erg leuk ("fun") zijn. Je hebt daarvoor geen programmeerkennis nodig!
Iedereen met een beetje Joomla ervaring kan helpen met het testen van bugs en patches!
In deze sessie verteld Peter Martin hoe hij enthousiast werd over Bugs, Patches & Fun, hoe het proces van software fouten in Joomla oplossen werkt. En hoe jij zonder programmeerkennis kunt helpen om de Joomla broncode te verbeteren.
Bijna iedereen die wel eens op de command line dingen uitvoert, kent wel een paar Linux commando's. Deze presentatie behandelt de Linux basiskennis aan de hand van de LPIC-1 examenstof (volgens opbouw van "LPI Certification in a Nutshell"):
Topic 101: System Architecture &
Topic 102: Linux Installation and Package Management
LPIC-1 is een certificaat dat wordt uitgegeven door Linux Professional Institute (LPI) en waarmee je jouw Linux kennis in de arbeidsmarkt kunt aantonen.
http://www.linuxnijmegen.nl/bijeenkomsten/31-lugn18-dinsdag-11-februari-2014
JUG Utrecht 2013 - Optimaliseren van Joomla Content Editor (JCE) voor adminsPeter Martin
JCE Editor is een WYSIWYG editor om gemakkelijker artikelen met foto's in Joomla te plaatsen.
Uit oogpunt van gebruikersvriendelijkheid is er veel voor beheerders te configureren in deze editor.
Deze presentatie toont je enkele zaken die je kunt optimaliseren (met name door opties weg te laten).
NB: de sheets zijn wat ouder dan de presentatie. Van de live demonstratie die ik op de avond deed, met daarin de laatste nieuwigheden, heb ik helaas geen sheets...
JUG Utrecht 2013 - Have you tried turning it off and on again? Problemen oplo...Peter Martin
Witte schermen, deprecated errors, missing Class errors, kan niet inloggen, kan niet installeren, mijn website is langzaam, mijn website is gehacked...
We hebben allemaal wel eens dergelijke problemen.
Deze presentatie werd op ma 9 december 2013 gegeven bij Joomla User Group Utrecht en leert je:
* identificeren van een probleem
* identificeren van het achterliggende probleem
* het probleem op te lossen
* of hulp te krijgen door de juiste vragen te stellen
En tijdens het probleem oplossen, leer je tevens iets over Joomla's Debug modus, .htaccess, phpMyAdmin, XAMPP, Akeeba Backup, Admin Tools, Google Chrome Inspect Element, FireFox Firebug, diff...
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. How IT works
JJoooommllaaddaayy JJoooommllaaddaayy DDeeuuttsscchhllaanndd GGeerrmmaannyy 22001144
by Peter Martin
www.db8.nl / @pe7er
2. How IT works
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
1.Computer
2.Operating System
3.Network
4.Internet
5.Server
6.Email
7.WWW
8.Website
9.OOP
10.Joomla
7. Definition
A computer is a general purpose machine
that can be instructed
to do a specific task
You want a typewriter?
“Load” a typewriter programme;
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
14. Operating System
Programme Programme Programme
Command line interface Graphical User Interface
Hardware
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
Programme
Operating System
19. ● +- 1984 – System 1
● for Macintosh 128K
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● GUI
Apple
● 1999 – OSX
● Unix-based Operating
System + Graphical
User Interface
● Terminal (=
programme to use
Command Line)
25. Hello everyone! Connecting...
I am new!
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
Hello new one!
I am 192.168.0.1
and your “gateway”
to the outside world
From now on you
are 192.168.0.42
You can look up
“IP addresses”
of domain names
at “DNS”
with IP 8.8.8.8
Let's use
Dynamic Host
Configuration Protocol
(DHCP)
Oops...
Internet Protocol
is next item...
29. Definition 2
Internet = Packet Switching on TCP/IP
Transmission
Control
Protocol
Internet
Protocol
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
30. Packet Switching
● All transmitted data is divided into blocks,
“packets”
● Those “packets” can travel using different
routes
● The destination merges the packets
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
32. ● Host addressing and identification
“who is who”
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● Packet routing
“shortest route?”
Internet Protocol
33. ● Packets travel from router to router to router to
router to router to router to router to destination
● Quality Control?
Transmission Control Protocol (TCP)!
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
TCP
Here's a
packet Thanks,
I got it!
Here's the
next packet
35. ● Domain Name System Server ≈ Phone Book
– Browser: www.google.com
– Browser asks DNS for IP address
– DNS: www.google.com = 173.194.65.139
– Browser asks 173.194.65.139 to send the Google
Search page
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
DNS
38. JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● Multi-user
● Multi-tasking:
– Front-door (visitors)
– Electricity line
– Water pipe
– Sewer pipe
– Telephone line
– Cable television line
– Internet connection line
– Mailbox
– Garbage can
Logical ports
41. JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● E-mail = text file
● E-mail Header: sender, IP address sender, receiver,
return address, message ID, all mail servers on route,
spam flags, etc.
● Peter @ db8.nl
– POP3 server (or IMAP) @db8.nl handles e-mail
– Stores it in text file for Peter
– Or replies with bounce message
E-mail
42. Send E-mail
From: peter@db8.nl
To: bill.gates@microsoft.com
Message:
Dear Bill,
Almost 10 years I discovered Linux and now I am not fond
of Windows anymore. If I buy a PC for Linux, I still have to
pay license fees for Windows.
Could you please refund my money?
Kind regards,
Peter
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
43. Receive E-mail
From: bill.gates@microsoft.com
To: peter@db8.nl
Message:
Dear Peter,
How are you doing?
Sorry to hear that you don’t like our Operating System any more.
Please keep in mind that our next Windows version will be much better!
Sorry, but we don’t have a refund policy.
Yours sincerely,
William
PS: I noticed that your website runs on Joomla. That’s awesome!
Did you know that Joomla also works on our products Windows + IIS + MSSQL?
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
44. Undelivered Mail Returned to Sender
Bounce Message
This is the mail system at host mail-out.microsoft.com. I'm sorry to have to inform you that your message
could not be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can delete your own text from the attached returned
message.
The mail system
<bill.gates@microsoft.com>: host microsoft.com[134.170.188.221] said: 550 "Unknown User" (in reply to
RCPT TO command)
Reporting-MTA: dns; mail-out.s1.byte.nl
X-Postfix-Sender: rfc822;
Arrival-Date: Tue, 9 Sep 2014 11:09:20 +0200 (CEST)
Final-Recipient: rfc822; bill.gates@microsoft.com
Original-Recipient: rfc822; bill.gates@microsoft.com
Action: failed
Status: 5.0.0
Remote-MTA: dns; microsoft.com
Diagnostic-Code: smtp; 550 "Unknown User"
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
47. ● World Wide Web
= HyperText Transfer Protocol
≠ Internet !
– A collection of HTML documents
● HyperText Markup Language
– Text files with information linked to other text files
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
WWW
48. ● Browsing on the WWW:
YOU ARE NOT VISITING A WEBSITE
● HTTP (port 80) – All traffic = plain text
HTTP(S)
● HTTPS (port 443) – All traffic via encrypted connection
– HTTPS does protect your data,
from and to a server
– Even HTTPS cannot protect your data
that is stored at unsafe server....
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
49. ● Text file with markup
● defines certain elements: pagetitle, paragraph,
heading etc..
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
HTML
50. Hyperlink
● Created by your browser
because it sees HTML hyperlink tag
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
51. ● Image is NOT embedded in HTML text file
● Reference to file on server
● Browser retrieves image and puts it in HTML on
screen
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
Image
52. ● Cascading Style Sheet
● Does the layout of the page
will layout HTML tags, and “defined name tags”
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
CSS
53. JavaScript
● Script that runs in visitor's browser
● Adds bit of interactivity
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
58. ● Virtual Private Server
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● “Virtual machine”
● Scalable
● Your own configuration
● Management
– by hosting company
– unmanaged = by
yourself
VPS
62. ● Object Oriented Programming
Objects
– Object = a variable, some sort of container
that can contain all kinds of
variables & functions inside
– Reusable → Blueprints (“Classes”) of other
developers
● Know how to use it (“how to call the object”)
● Don't know inner-workings
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
63. Baking a cake
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● Ingredients:
– 150 gr (caster / bastard / brown) sugar
– 150 gr (dairy) butter (room temperature!)
– 150 gr (patent) flower
– 3 eggs (room temperature)
– 1 sachet vanilla sugar ( = 8 gr)
– 2 gr salt
– 1/3 sachet baking powder ( = 5 gr)
– Juice from 1/2 lemon
64. Baking a cake
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● Procedure
– Pre-heat oven at 150 degrees Celsius
– Grease the (cup) cake tin with butter, and put some flour over it to
prevent the cake sticking to the tin
– Put butter + sugar + vanilla sugar + salt + lemon juice in a bowl and
mix into a smooth mass
– While mixing fast, add the eggs one by one
– While mixing slow, gently add the flour + backing powder and mix into
a smooth mass of dough
– Put the dough into the (cup) cake tin
– Put the tin in the oven for 55 minutes (do not open the 1st 30 minutes!)
66. Object!
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● The Mixer
– Know:
● What variables to input: ingredients, mixing time
● What output to expect: cake dough
– Don't know:
● Inner-workings of mixer
– Mixer can be replaced by other object
67. Re-use
● My recipe → turn into OOP Blue Print
● Daughter wants "Hansel and Gretel" candy
house
– Ask daddy to for cake = Object
– Create glue with icing sugar & water
– Decorate cake with candy
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
69. JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
● Create a PDF?
– I don't know how.... but know
● how to download a PDF “Class”, eg www.fpdf.org,
● load that blueprint
● use to create a PDF:
<?php
require('fpdf.php');
$pdf = new FPDF();
$pdf->AddPage();
$pdf->SetFont('Arial','B',16);
$pdf->Cell(40,10,'Hello Joomla!');
$pdf->Output();
?>
Coding
71. “Joomla is an award-winning content management
system (CMS), which enables you to build Web
sites and powerful online applications.
Many aspects, including its ease-of-use and
extensibility, have made Joomla the most popular
Web site software available.
Best of all, Joomla is an open source solution that
is freely available to everyone.” www.joomla.org
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
CMS
72. ● Joomla is a framework
Framework
– “A foundation on which to build web applications”
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
74. ● Joomla is “a sort of” Operating System
a layer between the webserver
and Joomla/3rd party components
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
OS
75. ● Joomla is a Graphical User Interface between
– the administrator of a website
– and the database that stores all information.
● The Graphical User Interface for admins =
admin template
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
– Joomla 3.x: “ISIS”
Admin GUI
76. Visitor's GUI
● Joomla is a Graphical User Interface between
– the visitor of your website
– and the database that stores all information.
● The Graphical User Interface for vistors =
front-end template
– have a user friendly GUI !!!
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
79. Presentation available at:
http://www.db8.nl
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
Peter Martin
e-mail: info at db8.nl
website: www.db8.nl
twitter: @pe7er
Questions?
80. Used Photos
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
Title sheet:
● Steampunk Workshop Flat-Panel LCD Monitor - Jake von Slatt
http://steampunkworkshop.com/lcd.shtml
● Map of Netherlands & Germany, Googlemaps
1. Computer
● IBM Electronic Data Processing Machine - GPN-2000-001881, NASA, 1957
http://upload.wikimedia.org/wikipedia/commons/2/20/IBM_Electronic_Data_Processing_Machi
ne_-_GPN-2000-001881.jpg
● Human computers - Dryden, NACA (NASA), 1949
http://en.wikipedia.org/wiki/File:Human_computers_-_Dryden.jpg
● ENIAC (Electronic Numerical Integrator And Computer) in Philadelphia, Pennsylvania, U.S.
Army Photo, 1947 to 1955
http://en.wikipedia.org/wiki/File:Eniac.jpg
● PDP-1, Matthew Hutchinson, 2006
http://en.wikipedia.org/wiki/File:PDP-1.jpg
● DM IBM S360, Ben Franske, 2006
http://en.wikipedia.org/wiki/File:DM_IBM_S360.jpg
● Apple II plus, Hellis, 2004
http://commons.wikimedia.org/wiki/File:Apple_II_plus.jpg
81. Used Photos
● Commodore-64-Computer, Evan-Amos, 2011
http://en.wikipedia.org/wiki/File:Commodore-64-Computer.png
● Tdkc60cassette, Stonda, 2005
http://en.wikipedia.org/wiki/File:Tdkc60cassette.jpg
● Commodore-Datassette, Toni Saarikko, 2006
http://de.wikipedia.org/wiki/Datei:Commodore-Datassette.jpg
● Ibm pc 5150, Ruben de Rijcke, 2010
http://en.wikipedia.org/wiki/File:Ibm_pc_5150.jpg
2. Operating System
● C64c system, Bill Bertram, 2005
http://commons.wikimedia.org/wiki/File:C64c_system.jpg
● Macintosh 128k transparency, Kevin chen, 2006
http://en.wikipedia.org/wiki/File:Macintosh_128k_transparency.png
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
82. Used Photos
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
3. Local Area Network (LAN)
● Wm2005-hackday-guerilla-networking, Andrew Lih, 2005
http://commons.wikimedia.org/wiki/File:Wm2005-hackday-guerilla-networking.JPG
● Floppy disk 2009 G1, George Chernilevsky, 2009
http://en.wikipedia.org/wiki/File:Floppy_disk_2009_G1.jpg
● SanDisk Cruzer Micro, Evan-Amos, 2011
http://en.wikipedia.org/wiki/File:SanDisk_Cruzer_Micro.png
● CD-R Front, Stefan Kühn, 2003
http://commons.wikimedia.org/wiki/File:CD-R_Front.jpg
● Harddisk in USB external box, Vojtěch Brzek, 2011
http://commons.wikimedia.org/wiki/File:Harddisk_in_USB_external_box.jpg
4. Internet (Wide Area Network (WAN))
● ARPANET as of Jun 30, 1982 - BBN map - DSC00123, BBN Technologies,
Cambridge, Massachusetts, 2013
http://commons.wikimedia.org/wiki/File:ARPANET_as_of_Jun_30,_1982_-_BBN_
map_-_DSC00123.JPG
83. Used Photos
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
5. Server
● Waiter pouring Zardetto sparkling Prosecco, Jeff Kubina, 2009
http://commons.wikimedia.org/wiki/File:Waiter_pouring_Zardetto_sparkling_Prosecco.jpg
● Wikimedia Servers-0051 16, Helpameout, 2012
http://commons.wikimedia.org/wiki/File:Wikimedia_Servers-0051_16.jpg
● Server Linux, Michael Jastremski, 2005
http://commons.wikimedia.org/wiki/File:Server_Linux.jpg
● Wenskaart Buurman & Buurman Zo...nieuw huis?
http://www.buurmanenbuurman.eu/zonieuw-huis.html
● Inside and Rear of Webserver, Rodzilla, 2005
http://en.wikipedia.org/wiki/File:Inside_and_Rear_of_Webserver.jpg
6. Email
● Pigeon Messengers (Harper's Engraving), Harper's New Monthly Magazine, No. 275, April, 1873.
http://commons.wikimedia.org/wiki/File:Pigeon_Messengers_(Harper's_Engraving).png
● IceStorm08, MamaGeek, 2007
http://en.wikipedia.org/wiki/File:IceStorm08.jpg
● US mail letterbox, Quadell, 2005
http://commons.wikimedia.org/wiki/File:US_mail_letterbox.jpg
84. Used Photos
JJoooommllaaddaayy DDeeuuttsscchhllaanndd 22001144
7. WWW & HTML/CSS/JavaScript
● HypertextEditingSystemConsoleBrownUniv1969, Greg Lloyd, 1969
http://commons.wikimedia.org/wiki/File:HypertextEditingSystemConsoleBrownUniv19
69.jpg
8. Website & PHP/MySQL
● Fachada del Nacimiento - Templo de la Sagrada Família, Barcelona 3, Sal34, 2011
http://commons.wikimedia.org/wiki/File:Fachada_del_Nacimiento_-_Templo_de_la_S
agrada_Fam%C3%ADlia,_Barcelona_3.jpg
9. Object Oriented Programming (OOP)
● Lego Color Bricks, Alan Chia, 2007
http://commons.wikimedia.org/wiki/File:Lego_Color_Bricks.jpg
10. Joomla
● tricorderunbox4, Bobbie Johnson, 2009
https://www.flickr.com/photos/bojo/4078685614/in/photostream/
Conclusion
● The End Book, EWikist, 2010
http://commons.wikimedia.org/wiki/File:The_End_Book.png