In this workshop we will make a brief introduction to the basics of networking: IP addresses, MAC addresses, DNS, DHCP. Concepts as a router, gateway and firewall are explained. Then we will see in practice how to share files on a local network (NFS, Samba), establish a FTP connection, or log on to another (Linux) machine remotely (SSH, VNC, RDP). Finally, we review some useful networking tools like ping, netstat, lookup, port scan, traceroute, whois.
Computers are connected in a network to exchange information or resources with each other. Two or more computer are connected through network media called computer media.
There are a number of network devices or media that are involved to form computer network.
Computer loaded with Linux Operation System can also be a part of network whether it is a small or large network by multitasking and multi user natures.
Maintaining of system and network up and running is a task of System / Network Administrator’s job. In this article we are going to review frequently used network configuration and troubleshoot commands in Linux.
Computers are connected in a network to exchange information or resources with each other. Two or more computer are connected through network media called computer media.
There are a number of network devices or media that are involved to form computer network.
Computer loaded with Linux Operation System can also be a part of network whether it is a small or large network by multitasking and multi user natures.
Maintaining of system and network up and running is a task of System / Network Administrator’s job. In this article we are going to review frequently used network configuration and troubleshoot commands in Linux.
This presentation contains information about how to manage the network and connectivity in linux flavors based on debian. You will understand how to monitor network resources, viewing ethernet and wireless adapter information, checking name resolution , downloading files with wget, etc
This presentation contains information about how to manage the network and connectivity in linux flavors based on debian. You will understand how to monitor network resources, viewing ethernet and wireless adapter information, checking name resolution , downloading files with wget, etc
BITS: Introduction to linux, distributions and installationBITS
This slide is part of the BITS training session: "Introduction to linux for life sciences."
See http://www.bits.vib.be/index.php?option=com_content&view=article&id=17203890%3Abioperl-additional-material&catid=84&Itemid=284
deep understanding of howto packet would reach to destination and basic understanding of network protocols.
learn howto manipulate with linux network and know howto manipulate with linux iptables.
Banog meetup August 30th, network device property as codeDamien Garros
Managing Network Device Properties as Code:
Device configuration templates have simplified a lot of things for the network industry but most people are still managing their device properties (aka variables) manually which is very tedious and error prone. This talk will present a new approach to generate and manage network device properties easily using infrastructure as code principles.
You can create and test your OFC with Trema.
You can create tests effectively with test frameworks.
You can run common tests for both environment of a testing network and a real network.
Liefst 90% van de Vlamingen beschikt vandaag over een smartphone (Android/iOS), en vervangt zijn toestel gemiddeld om de 2 à 3 jaar - volgens sommige onderzoeken zelfs al om de 18 maanden. Helaas leidt deze snelle consumptie tot aanzienlijke milieubelasting. Maar ook vanuit financieel oogpunt doe je er als consument natuurlijk goed aan om ook oog te hebben voor 'duurzaamheidsaspecten' van een smartphone zoals de batterijcapaciteit/levensduur, werkgeheugen, opslagruimte/uitbreidbaarheid, valbestendigheid, waterdichtheid, dienst-na-verkoop (software-upgrades), reparatiekosten, …
We beginnen de avond met enkele sprekende feiten en cijfers over de enorme ecologische impact van elektrische toestellen.
Gelukkig is er ook een positieve keerzijde. Deze feiten en cijfers laten immers ook zien hoe we onze afval en CO2-uitstoot kunnen beperken, en tegelijkertijd bijdragen aan een veerkrachtige economie.
Hoe Close the Gap met ICT-materiaal digitale kloof helpt te dichten (Peter Ma...Avansa Mid- en Zuidwest
Peter Manderick van Close the Gap vzw licht de activiteiten, aanpak en impact van Close the Gap in ontwikkelingslanden en lokaal toe.
Toegang tot informatietechnologie (IT) is in het Westen geen luxe maar vormt integendeel een primordiaal onderdeel voor de verbetering van educatieve en economische vooruitzichten van de mens. Maar door gebrek aan IT-kennis, samen met een ondermaatse infrastructuur en de hoge prijzen van het nieuwste IT-materiaal, zijn er over de hele wereld nog steeds mensen die geen toegang hebben tot informatietechnologieën.Close the Gap werkt samen met een netwerk van lokale partners die de computers uitdelen en onderhouden en IT-les bieden. Close the Gap zorgt voor empowerment van deze lokale entrepreneurs en helpt hen om hun sociale projecten op te zetten.
Dichten van de digitale kloof: Close the Gap wil zij die geen toegang hebben tot ICT materiaal helpen om toch mee te draaien in onze huidige digitale maatschappij, door hen zelf te laten werken met goed IT materiaal dat door derden gedoneerd en intern gereviseerd werd.
Onze spullen gaan sneller kapot en zijn moeilijker te repareren dan pakweg 20 jaar geleden. Hoe komt dat? Wat probeert de Recht op Repareren beweging daaraan te doen? En hoe kun jij daarbij helpen?
Ontdek er alles over in deze workshop.
We beginnen de avond met enkele sprekende feiten en cijfers over de enorme ecologische impact van elektrische toestellen.
Gelukkig is er ook een positieve keerzijde. Deze feiten en cijfers laten immers ook zien hoe we onze afval en CO2-uitstoot kunnen beperken, en tegelijkertijd bijdragen aan een veerkrachtige economie.
Smartphone-reparaties: welke zijn zinvol en betaalbaar? (Dries Terryn)Avansa Mid- en Zuidwest
Smartphone-hersteller Dr. Dre (Dries Terrein) uit Heule neemt je mee op reis naar de binnenkant van je smartphone. Je krijgt de ‘ingewanden’ te zien van een aantal demo-toestellen. Hij doorprikt daarbij een aantal ‘urban legends’ of hardnekkige mythes, zoals het idee dat je vochtschade kan remediëren door je toestel in een bak rijst te leggen.
Je krijgt een beter zicht op welke reparaties de moeite lonen, welke je eventueel zelf kan uitvoeren, en de richtprijs voor de belangrijkste 2 vervangonderdelen (scherm en batterij).
Tot slot leer je voor- en nadelen van refurbished en tweedehands-toestellen beter af te wegen.
Je wil graag een app installeren maar krijgt steeds de melding "Er is onvoldoende opslagruimte"? Dan sta je alvast niet alleen met dit probleem.
We overlopen een aantal snelle maatregelen (ofte 'quick wins') om opslagruimte vrij te maken, in de eerste plaats het 'afhalen' of backuppen van je foto's en video's. Daarna bekijken we meer geavanceerde methodes om opslagruimte bij te winnen: apps deïnstalleren, (cache) geheugen opkuisen, een microSD-kaartje in gebruik nemen.
Liefst 90% van de Vlamingen beschikt vandaag over een smartphone (Android/iOS), en vervangt zijn toestel gemiddeld om de 2 à 3 jaar - volgens sommige onderzoeken zelfs al om de 18 maanden. Helaas leidt deze snelle consumptie tot aanzienlijke milieubelasting. Maar ook vanuit financieel oogpunt doe je er als consument natuurlijk goed aan om ook oog te hebben voor 'duurzaamheidsaspecten' van een smartphone zoals de batterijcapaciteit/levensduur, werkgeheugen, opslagruimte/uitbreidbaarheid, valbestendigheid, waterdichtheid, dienst-na-verkoop (software-upgrades), reparatiekosten, …
We overlopen deze aandachtspunten zodat je je volgende smartphone langer in gebruik kan houden (streefdoel 5 jaar of meer).
OsmAnd is een uiterst krachtige kaarten- en navigatie-app voor je smartphone (Android/iOS). Met de gratis versie kan je tot 7 kaarten (= regio's of landen) downloaden. De kaartgegevens zijn afkomstig van OpenStreetMap - 'het Wikipedia van de kaarten' - en kan je ook offline gebruiken, waardoor je dus geen dataverbinding nodig hebt onderweg.
OsmAnd is uitermate geschikt om je te gidsen bij wandel- en fietstochten. Alle bekende wandel- of fietsroutes (of knooppunten) kan je zichtbaar maken. En je kan ook kiezen om interessepunten (of 'POI') weer te geven, zoals cafeetjes, picknickbanken, toiletten, bushaltes, enzoverder.
Rechtstreeks in de app een traject uitstippelen is natuurlijk super handig, maar het is ook mogelijk om een GPX-bestand vanaf je laptop of van elders te importeren.
In deze demo maak je kennis met basistaken en functionaliteiten aan van OsmAnd.
Veilige wachtwoorden zijn lang, complex en variabel. Je moet over een olifantengeheugen beschikken om zulke wachtwoorden te onthouden. Gelukkig zijn er wachtwoordbeheerders die je het leven een stuk gemakkelijker kunnen maken.
We demonstreren het gebruik van zo’n wachtwoordbeheerder of wachtwoordkluis. Ook leggen we uit waarom het gebruik van ‘sociale logins’ (inloggen met Facebook, Google, OpenID e.a.) af te raden is.
Daarna overlopen we een aantal (relatief) nieuwe authenticatiemethodes, onder te verdelen in volgende categorieën:
Iets wat je weet (pincode, wachtwoord);
Iets wat je hebt (pasje, smartphone, usb-sleutel);
Iets wat je bent (iris-scan, vingerafdruk, gezichtsherkenning)
Niet zelden gaat het erom bijkomstige veiligheidsbarrières op te werpen, zoals bij ‘tweestapsverificatie’ ofte ‘twee-factor-authenticatie’. We demonstreren tot slot ook itsme, de Belgische identificatie-app om aan te melden bij overheidsdiensten en bij een groeiend aantal andere websites.
Bij elke nieuwe Windows-versie lijkt Microsoft erop gebrand om (nog) meer persoonlijke gegevens over zijn gebruikers te verzamelen. Zo ben je in Windows 11 (Home) zo goed als verplicht om aan te melden met een Microsoft-account.
In deze sessie bekijken we hoe je dit eventueel toch kan omzeilen, en hoe je de privacy-instellingen van Windows kan aanscherpen om data-vergaring enigszins te beperken.
Je browser is meer dan ooit een venster op de wereld. Maar net het feit dat we meer en meer tijd 'in een browservenster' vertoeven vergroot de uitdaging op vlak van privacy.
In deze sessie geven we een korte uitleg over browsers in het algemeen en daarna demonstreren we een aantal privacy-gerelateerde functionaliteiten die standaard zijn ingebouwd in Chrome of andere browsers.
Daarna gaan we nog een stap verder in het afschermen van persoonlijke gegevens. Daarbij maken we gebruik van 'extensies', kleine programma's die nieuwe functies aan je browser toevoegen.
Privacy-check van je smartphone (Android/Google) (Pieterjan Jonckheere)Avansa Mid- en Zuidwest
Google verzamelt grote hoeveelheden persoonlijke gegevens om nauwkeurige profielen van gebruikers te maken. Met de juiste instellingen kun je dit enigszins beperken.
We demonstreren het gebruik van myaccount.google.com, een gebruiksvriendelijk ‘dashboard’ van privacy-gerelateerde instellingen.
Daarna bekijken we hoe je je Android-telefoon veiliger en privacy-vriendelijker kunt inrichten.
We overlopen daarbij volgende aspecten:
'fysieke bescherming'
schermvergrendeling (PIN/patroon/wachtwoord)
versleuteling (encryptie)
meldingen op vergendelingsscherm
noodbericht op schermvergrendeling
Vind mijn apparaat
bescherming tegen Google, app-makers e.a.
uitschakelen van locatiegeschiedenis
uitschakelen van Advertentie-ID
(onderdelen) uitschakelen van Google backup
uitschakelen 'Apps van derden met accounttoegang'
app-machtigingen nakijken
Privacy-check van je smartphone (Android/Google) (Pieterjan Jonckheere)Avansa Mid- en Zuidwest
Google verzamelt grote hoeveelheden persoonlijke gegevens om nauwkeurige profielen van gebruikers te maken. Met de juiste instellingen kun je dit enigszins beperken.
We demonstreren het gebruik van myaccount.google.com, een gebruiksvriendelijk ‘dashboard’ van privacy-gerelateerde instellingen.
Daarna bekijken we hoe je je Android-telefoon veiliger en privacy-vriendelijker kunt inrichten.
We overlopen daarbij volgende aspecten:
'fysieke bescherming'
schermvergrendeling (PIN/patroon/wachtwoord)
versleuteling (encryptie)
meldingen op vergendelingsscherm
noodbericht op schermvergrendeling
Vind mijn apparaat
bescherming tegen Google, app-makers e.a.
uitschakelen van locatiegeschiedenis
uitschakelen van Advertentie-ID
(onderdelen) uitschakelen van Google backup
uitschakelen 'Apps van derden met accounttoegang'
app-machtigingen nakijken
In ruil voor het gebruik van deze gratis webdiensten verzamelen de meeste aanbieders (zoals Google) heel veel informatie over jouw gedrag, en ze exploiteren deze data voor intern en extern gewin (denk o.a. aan advertentienetwerken).
Reden genoeg dus om alternatieven te overwegen. Welnu, het goede nieuws is dat er vaak *uitstekende* alternatieven bestaan.
In deze sessie demonstreren we een aantal alternatieve webdiensten, zoals DuckDuckGo (zoekmachine), Proton Mail (e-mail) & Bitwaren (wachtwoordkluis). Daarnaast bekijken we ook enkele 'tools', software die je lokaal installeert.
Noot: voor sommige van deze diensten moet je wel een (kleine) abonnementskost rekenen, wat volkomen logisch is als je bedenkt dat deze diensten jouw data juist niet exploiteren.
In ruil voor het gebruik van deze gratis webdiensten verzamelen de meeste aanbieders (zoals Google) heel veel informatie over jouw gedrag, en ze exploiteren deze data voor intern en extern gewin (denk o.a. aan advertentienetwerken).
Reden genoeg dus om alternatieven te overwegen. Welnu, het goede nieuws is dat er vaak *uitstekende* alternatieven bestaan.
In deze sessie demonstreren we een aantal alternatieve webdiensten, zoals DuckDuckGo (zoekmachine), Proton Mail (e-mail) & Bitwaren (wachtwoordkluis). Daarnaast bekijken we ook enkele 'tools', software die je lokaal installeert.
Noot: voor sommige van deze diensten moet je wel een (kleine) abonnementskost rekenen, wat volkomen logisch is als je bedenkt dat deze diensten jouw data juist niet exploiteren.
"Leven in openbaarheid is de nieuwe standaard"
"Transparantie zal privacy vervangen als sociale norm en ideaal"
"Privacy is een voorbijgestreefd, kunstmatig product van het industriële tijdperk"
Dit zijn enkele opmerkelijke quotes van privacy experten toen aan hen werd gevraagd te reflecteren over de toekomst van privacy. Is er dan nog plaats voor privacy in de 21ste eeuw of is het eerder iets voor de happy few?
In deze keynote wordt dieper ingegaan op hoe privacy veelal als (luxe)goed wordt aanzien, eerder dan als een fundamenteel recht, en wat de consequenties hiervan zijn. Aan de hand van concrete voorbeelden en sociaal-wetenschappelijk onderzoek gaan we dieper in op verscheidene privacy dilemma’s en problemen met betrekking tot datacollectie en -gebruik.
Met de opkomst van Flatpak is er voor de eindgebruiker een ruimer aanbod aan Linux-gebaseerde desktopsoftware. Flatpak is een 'containerachtige' benadering van softwaredistributie, waarbij toepassingen in een 'sandbox' (virtuele afgesloten omgeving) draaien. Flatpak is evenwel *geen* oplossing om Windows-software op Linux te installeren.
In deze sessie bekijken we de 'ins and outs' van Flatpak, het aanbod en de instellingsmogelijkheden. We vergelijken Flatpak met de directe concurrentie (Appimage & Snap), en stippen ook nog het verschil aan met echte 'containerisatie' zoals Docker, dat erg populair is in server- en cloud-omgevingen.
Elektro Elixir: Software-updates & troubleshooting (Android/iOS/Windows)Avansa Mid- en Zuidwest
In 2017 gaf Apple een toe dat oudere iPhones na een upgrade met de nieuwste iOS-versie trager gaan werken, officieel om de stabiliteit van het besturingssysteem te garanderen. Intussen heb je als iPhone-gebruiker wel de mogelijkheid om die bewuste vertraging ('throttling') uit te schakelen (maar er lopen nog verschillende rechtszaken tegen Apple).
Meer algemeen is het ten zeerste aanbevolen om software-updates en -upgrades consequent en regelmatig toe te passen, in de eerste plaats om veiligheidsredenen.
We overlopen het updatebeheer bij Android, iOS en Windows, zowel op niveau van het besturingssysteem als van de toepassingen of apps. We staan ook stil bij mogelijke problemen en wat je kan doen om deze te verhelpen. Tot slot tonen we je ook de weg naar het laatste redmiddel, namelijk 'fabrieksinstellingen herstellen'.
Deze sessie kadert in 'Elektro Elixir', een webinar-reeks van 12 sessies om zuiniger te leren omspringen met elektronica & ICT.
Elektro Elixir: Zo hou je de batterij van je toestellen langer gezondAvansa Mid- en Zuidwest
Een zwakke batterij is een van de belangrijkste reden om een smartphone te dumpen. Door een te krap bemeten batterij bij veel modellen loopt de capaciteit al na 2 jaar merkbaar terug. De batterij laten vervangen is vrij kostelijk, terwijl producenten of telecombedrijven jou natuurlijk liever een nieuw toestel aansmeren.
Daarom is het van uiterst belang om de batterij zo lang mogelijk gezond te houden. Dit doen we onder andere door het tempo van 'laadcycli' te vertragen, op de juiste manier op te laden en hitte of (vries)kou te mijden. De tips zijn natuurlijk ook bij laptops of eender welk ander elektronica-toestel met lithium-ion-batterijen van nut.
Deze sessie kadert in 'Elektro Elixir', een webinar-reeks van 12 sessies om zuiniger te leren omspringen met elektronica & ICT.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Linux network tools (Maarten Blomme)
1. Linux network tools
● Theory
● Configuration
● Basic tools
● Network analysis
● Network services
2. 2
Theory: OSI model
Application space
● Layer 7: application protocol
● Layer 5/6: optional
Kernel IP stack
● Layer 4:
– UDP: connectionless
– TCP: stateful
● Layer 3 (IP layer):
– Top layer for routers
– Possibly multiple IP addresses per network interface
● Layer 2 (MAC layer):
– Top layer for switches
– One MAC address per physical interface
● Layer 1: electrical specifications
– Top layer for hubs and modems
– WiFi
– Ethernet port / cable
3. 3
Theory: Some terminology
Modem (layer 1)
● A modem is a device that translates between different technologies
Repeater (layer 1)
● A repeater is a device that repeats (amplifies) an existing network
connection
Hub (layer 2)
● A hub is a 'dumb' device that connects wired network devices, every
device connected to a hub sees all traffic passing on the network
Access point (layer 2)
● An access point can be seen as a wireless hub, it provides access to
the network for wireless clients
4. 4
Theory: Some terminology
Switch (layer 2)
● A switch is an 'intelligent' hub, it passes only traffic that is destined for a
specific device, based on it's MAC address
● There are also so called “level 3” or “level 4” switches, they add some
extra features that are based on functionality in the network or transport
layer
Bridge (layer 2)
● A bridge can be compared to a switch, but it is less advanced and less
powerfull
Router (layer 3)
● A router does not connect network devices, it connects different networks
(eg. your internal home network and the internet)
● It does this based on the IP addresses
5. 5
Theory: Some terminology
● In many cases, this functionality is combined. Most people
have at home a device that's modem, router, access point
and switch, all in one.
6. 6
Theory: Level 2: MAC Addresses
● MAC: Media Access Control
● 00:14:c1:43:9d:fb
– First three numbers: vendor id
– Last three numbers: serial number
● Broadcast: ff:ff:ff:ff:ff:ff
● Used to regulate network traffic on level 2
7. 7
Theory: Level 3: IP Addresses
● IP: Internet Protocol
– Most used: IPv4
– New: IPv6
● 192.168.0.5
– Netmask is used to determine to which network the IP
address belongs: 255.255.255.0 (or /24)
● Broadcast depends on netmask: 192.255.255.255
● Used to regulate network traffic on level 3
8. 8
Configuration: IP settings
● Most modern linux distributions use NetworkManager
service as a backend to configure the network
● On Debian based distros, the network can be configured in
/etc/network/interfaces as a simple fallback
● On Red Hat based distros, this can be done in
/etc/sysconfig/network
●
ifconfig or ip can be used to configure the network
manually, but these settings are gone once you reboot
9. 9
Configuration: DNS
● Domain Name Service is used to convert server names in
IP addresses
● DNS servers are configured in the file /etc/resolv.conf
$ cat /etc/resolv.conf
nameserver 8.8.8.8
● Normally you would just use the DNS server received by
your router, but you can improve your internet access by
changing this to a public server like 8.8.8.8 or 8.8.4.4.
These servers, maintained by Google, normally respond
faster and do not filter any results (eg. thepiratebay.org).
● You edit the file /etc/hosts to override or add
server names
10. 10
Configuration: ifconfig
● With ifconfig you can configure a network interface
● On linux it is possible to create virtual network interfaces
for different networks
● Configure a virtual network on your wired network interface
with a static IP (make sure you all use a different IP!) and
check the results
$ ifconfig eth0:1 192.168.0.10
$ ifconfig
● You should see your real wired network interface has a
dynamic address received via DHCP and the virtual
interface has the static address you configured
11. 11
Basic tools: arp
● To know what MAC address corresponds with a certain IP
address, the Address Resolution Protocol is used
● ARP requests are automatically send by linux whenever
you try to connect with a certain IP
● Linux keeps a ARP cache table that can be viewed and
modified with the arp command:
$ arp
Address HWtype HWaddress Flags Mask Iface
192.168.5.1 ether 00:23:48:c7:64:81 C eth0
● You can clear the table, delete or add entries manually.
The ARP cache table is cleared after a certain time.
12. 12
Basic tools: ping
●
ping is a tool that used ICMP echo requests to detect if a host
is alive
● ICMP traffic can be blocked, so this is not 100% reliable
●
ping has a lot of options to modify it's behavior, you can
change the interval, number of pings, network interface, …
● Example: first look at the ARP table, then ping a host, then
check the ARP table again
$ arp
Address HWtype HWaddress Flags Mask Iface
$ ping 192.168.0.1
PING 192.168.0.10 (192.168.0.10) 56(84) bytes of data.
64 bytes from 192.168.0.10: icmp_seq=1 ttl=64 time=0.774 ms
$ arp
Address HWtype HWaddress Flags Mask Iface
192.168.0.1 ether b4:b5:2f:cc:a1:08 C eth0
13. 13
Basic tools: route
● To connecting to different networks (eg. from the local network to the
internet), linux uses a routing table to know where to send what
packets
● You can view and change this routing table with the route command
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
default 10.25.32.1 0.0.0.0 UG 0 0 0 eth0
10.25.0.0 * 255.255.0.0 U 0 0 0 eth0
192.168.0.0 * 255.255.255.0 U 0 0 0 eth0
● There is a default gateway (10.25.32.1) defined for all traffic that is
for an unknown network
● Data for 10.25.x.x and 192.168.0.x (see masks)
goes to eth0
● By configuring eth0:1 with 192.168.0.10, linux added
an entry to the routing table
14. 14
Basic tools: traceroute
● Use the traceroute command to see what path a packet
takes to a certain destination:
$ traceroute 172.21.1.6
traceroute to 172.21.1.6 (172.21.1.6), 30 hops max, 60 byte packets
1 10.25.32.1 (10.25.32.1) 0.880 ms 1.288 ms 1.291 ms
2 10.65.255.1 (10.65.255.1) 1.281 ms 1.960 ms 2.255 ms
3 172.21.1.33 (172.21.1.33) 5.357 ms 5.366 ms 5.347 ms
4 172.21.1.5 (172.21.1.5) 34.239 ms 34.268 ms 34.261 ms
5 172.21.1.6 (172.21.1.6) 27.104 ms * *
● This works because every IP packet has a TTL (Time To
Live) value that is decreased with every hop. This is used to
make sure that packets that can't be delivered are not send
around in circles.
● Some types of packets can be blocked by your provider.
To circument this, try to use a different packet type
for traceroute (eg. traceroute -I)
15. 15
Basic tools: DNS tools
● There are several tools that can be used to lookup
information about domain names or IP addresses: host,
nslookup, dig and whois.
● Example: lookup a domain name or IP address
$ host www.google.be
www.google.be has address 74.125.136.94
www.google.be has IPv6 address 2a00:1450:4013:c01::5e
$ host 74.125.136.94
94.136.125.74.in-addr.arpa domain name pointer ea-in-
f94.1e100.net.
● With whois, you can get information about the
domain name registrar
16. 16
Basic tools: Wi-Fi
● There are three basic cli tools for wireless networks:
iwlist, iwconfig and wpa_supplicant
●
iwlist is used to scan for networks
$ iwlist wlan0 scan
●
iwconfig is used to configure a wireless network interface
$ iwconfig wlan0 essid MyNetwork
●
wpa_supplicant is used to configure encryption for wireless
networks
● There are several tools for hacking WEP-encrypted
networks, but WPA(2) is still secure
17. 17
Basic tools: Wi-Fi access point
● Setting up a Wi-Fi access point (hotspot) can easily be
done with the NetworkManager
● Doing it manually requires two tools: hostapd and dnsmasq.
hostapd changes your wireless network interface in an
access point, while dnsmasq is a basic DHCP and DNS
server.
18. 18
Network analysis: netstat
●
netstat is used to see what connections are open on your
linux system. The options -n (no name resolving) and -t
(only TCP connections) are quite useful
$ netstat -nt
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 127.0.0.1:54395 127.0.0.1:5939 ESTABLISHED
tcp 38 0 10.25.46.157:44261 23.21.220.152:443 CLOSE_WAIT
tcp 0 0 10.25.46.157:51457 188.172.204.18:443 ESTABLISHED
tcp 38 0 10.25.46.157:38185 54.192.95.120:443 CLOSE_WAIT
tcp 0 0 10.25.46.157:48293 10.64.150.31:443 ESTABLISHED
tcp 0 0 127.0.0.1:44554 127.0.0.1:48750 ESTABLISHED
tcp 0 0 10.25.46.157:43487 74.125.136.189:443 ESTABLISHED
tcp 38 0 10.25.46.157:37828 54.192.95.120:443 CLOSE_WAIT
tcp 0 0 10.25.46.157:57952 10.64.150.31:443 ESTABLISHED
tcp 38 0 10.25.46.157:48434 54.192.95.164:443 CLOSE_WAIT
tcp 0 0 10.25.46.157:49543 10.64.150.31:443 ESTABLISHED
tcp 0 0 127.0.0.1:53553 127.0.0.1:34226 ESTABLISHED
tcp 0 0 10.25.46.157:42063 108.160.165.33:443 ESTABLISHED
tcp 0 0 10.25.46.157:51878 198.252.206.25:443 ESTABLISHED
tcp 0 0 10.25.46.157:57250 173.194.65.102:443 ESTABLISHED
tcp 38 0 10.25.46.157:38281 23.21.219.56:443 CLOSE_WAIT
tcp 38 0 10.25.46.157:37985 54.192.95.120:443 CLOSE_WAIT
19. 19
Network analysis: iptraf
● With iptraf (sometimes called iptraf-ng) you can see in
great detail what and how much traffic passes through
your system, right from the command line!
20. 20
Network analysis: Nmap
●
Nmap (“Network Mapper”) is an extremely powerful utility for
network discovery and security auditing
● Nmap can be used for: discovering devices on a network
and what services they provide, detect what OS a host is
running, ...
● Examples:
– scan all hosts on a subnet and see what services they
provide: nmap 192.168.0.*
– the same thing, but 'in secret': nmap -sS 192.168.0.*
– check what OS a host is running:
nmap -O 192.168.0.1
21. 21
Network analysis: iperf
●
iperf is used to measure the effective network bandwidth for
TCP or UDP traffic between two hosts
● Example:
– Host 1 (192.168.0.1):
$ iperf -s
------------------------------------------------------------
Server listening on TCP port 5001
TCP window size: 85.3 KByte (default)
------------------------------------------------------------
[ 4] local 192.168.0.1 port 5001 connected with 192.168.0.10 port 47693
[ ID] Interval Transfer Bandwidth
[ 4] 0.0-10.1 sec 113 MBytes 93.8 Mbits/sec
– Host 2 (192.168.0.10):
$ iperf -c 192.168.0.1
------------------------------------------------------------
Client connecting to 192.168.0.1, TCP port 5001
TCP window size: 85.0 KByte (default)
------------------------------------------------------------
[ 3] local 192.168.0.10 port 47693 connected with 192.168.0.1 port 5001
[ ID] Interval Transfer Bandwidth
[ 3] 0.0-10.0 sec 113 MBytes 94.7 Mbits/sec
22. 22
Network analysis: wireshark
● Wireshark is a network packet sniffer. It is used to capture
packets on a network and do an advanced analysis. It is
one of the most powerful open-source tools available for
network debugging.
23. 23
Network analysis: tcpdump
●
tcpdump is a command line program with the same
functionality as wireshark
$ tcpdump -i eth0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
05:01:39.393785 ARP, Request who-has 10.25.41.51 tell 10.25.46.74, length 46
05:01:39.393842 ARP, Request who-has 10.25.40.100 tell 10.25.46.74, length 46
05:01:39.402624 ARP, Request who-has 10.25.31.8 tell 10.25.46.24, length 46
05:01:39.613080 ARP, Request who-has 10.25.31.11 tell 10.25.32.1, length 46
05:01:39.761154 IP 10.65.120.11.2052 > 10.65.120.255.1005: UDP, length 74
05:01:39.846803 ARP, Request who-has 10.25.31.8 tell 10.25.46.39, length 46
25. 25
Network services: remote cli with telnet and SSH
● There are two major ways to connect remotely to a host
via the command line: telnet and SSH (Secure SHell)
● Telnet provides an insecure connection, while SSH is
fully encrypted. SSH also offers other major features like
port forwarding, login with keys and secure file
transfer. Always use SSH if possible, all data send
through telnet can easily be seen by someone else on the
network!
● Example: try to login with telnet and SSH on a server. If
you view the telnet traffic in wireshark you will see that
everything (even the password) is send in the clear!
26. 26
Network services: file transfer with SSH
● SSH can be used to transfer files securely over any
network (including the internet)
● Command line tool: scp
$ scp localfile pinguin@192.168.0.1:/home/pinguin/file
● Nautilus file manager can connect with the ssh:// or sftp://
prefixes:
● It is also possible to mount a directory locally with sshfs:
$ sshfs pinguin@192.168.0.1:/home/pinguin localdir
27. 27
Network services: file transfer with FTP
● FTP can be used in much the same way as SSH, but as with telnet,
FTP is not encrypted and thus highly insecure!
● Command line tool: ftp
$ ftp 192.168.0.1
Connected to 192.168.0.1 (192.168.0.1).
220 (vsFTPd 3.0.2)
Name (192.168.0.1:maarten): pinguin
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> put localfile
● Nautilus file manager can connect with the ftp:// prefix
● It is also possible to mount a directory locally with curlftpfs:
$ curlftpfs ftp://pinguin:pinguin@example.com localdir
28. 28
Network services: file transfer with NFS
● The Network File System is a filesystem designed to be shared over the
network
● NFS is historically the oldest network filesystem available and is described
in several official RFC's
● NFS supports the same user permission functionality like other linux
filesystems
● NFS is not encrypted, and should only be used on trusted networks!
● NFS mounts can not be accessed in Nautilus, they need to be mounted by
root
● Check the export list with showmount:
$ showmount -e 192.168.0.1
Export list for 192.168.0.1:
/home/pinguin (everyone)
● You can mount an NFS share like this:
$ mount -t nfs 192.168.0.1:/home/pinguin localdir
29. 29
Network services: file transfer with Samba
● Samba is the open source implementation for the
Microsoft Windows network share protocol (SMB-
protocol)
● Samba is used more then NFS, it supports Windows hosts
and has more features, but it is also not encrypted!
● Command line: use smbget to transfer a file
● Nautilus: use the smb:// prefix
● You can mount an SMB share locally like this:
$ mount -t smbfs -o
username=pinguin,password=pinguin //192.168.0.1/pinguin
localdir
30. 30
Network services: file transfer with wget & curl
●
wget and curl are both cli utilities that are used to get files
via several protocols (they also support authentication):
– wget: FTP, HTTP & HTTPS
– curl: DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS,
POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET and
TFTP
$ wget http://192.168.0.1/index.html
--2015-06-02 17:04:43-- http://192.168.0.1/index.html
Connecting to 192.168.0.1:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 11510 (11K) [text/html]
Saving to: ‘index.html’
index.html 100%[==========================>]
11.24K --.-KB/s in 0.001s
2015-06-02 17:04:43 (16.5 MB/s) - ‘index.html’ saved [11510/11510]
$ curl http://192.168.0.1/index.html -o index.html
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 11510 100 11510 0 0 2126k 0 --:--:-- --:--:-- --:--:-- 2248k
31. 31
Network services: remote desktop
● The two most used types of remote desktop on linux are VNC
(Virtual Network Computing) and RDP (Remote Desktop
Protocol). VNC is an open-source standard, while RDP is a
Microsoft protocol.
● Both VNC and RDP are not suitable for use over the internet
because they are not encrypted
● There are several clients for linux: vinagre, krdc, rdesktop, …
Use the one that you like most.
● Most distro's offer an easy way to setup VNC
● There are several commercial (but free) services that can be
used on linux, like TeamViewer and
Google Chrome remote desktop
32. 32
Network services: secure access
● Be very careful when using insecure services over a public
network. Eavesdropping is easy!
● Use a secure alternative if possible (eg. ssh/telnet, sftp/ftp)
● If you must use an insecure service like VNC, there are
two main solutions:
– Tunneling/port forwarding through SSH
$ ssh -L 3323:localhost:23 pinguin@192.168.0.1
$ telnet localhost 3323
– VPN (Virtual Private Network): this is an encrypted,
virtual network over an existing, unsafe network