The document discusses a hybrid solution for blocking child pornography websites using a combination of IP and URL filtering. The solution uses a filtering proxy and BGP routing to accurately block access to blacklisted websites while avoiding overblocking. It provides statistics showing the solution blocked thousands of access attempts per day for several ISPs, while only about 1% of users actively attempted to access blacklisted content. Pricing details are given for hosted and on-site deployment options starting at CHF 0.30 per user annually.
This is my latest studio project where we designed an office space based upon a company. I chose to design for a small photography company in North Carolina called WhiteBox.
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...Communardo GmbH
Vortrag von Dirk Röhrborn auf dem Forum eLearning & Knowledge Management auf der Cebit 2009 über Microsharing und wie dieser Ansatz die Kommunikation im Unternehmen verändert.
This is my latest studio project where we designed an office space based upon a company. I chose to design for a small photography company in North Carolina called WhiteBox.
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...Communardo GmbH
Vortrag von Dirk Röhrborn auf dem Forum eLearning & Knowledge Management auf der Cebit 2009 über Microsharing und wie dieser Ansatz die Kommunikation im Unternehmen verändert.
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...Frederik Smit
‘Building bridges between home and school'
In this book you will find case studies, programmes, overviews and reviews of various kinds of involvement in a number of countries over the world. The main body is made up of the business of "building bridges" between home and school. The forms of involvement run from orientation to partnerships in specific subjects to systems, models and strategies for partnerships.
Contributors:
Ana Isabel Alvarez, Emma Beresford, Elzbieta Bielecka, Sue Botcherby, Victoria Casielles, Norberto Corral, Begoña Dona ire, Stelios Georgiou, Raquel-Amaya M artínez González, Jennifer Hartman, Gary Heywood-Everett, Pauline Huizenga, Ingebjörg Johanessen, Lesley Jones, Ann Kinkor, Leonidas Kyriakides, Cees Klaassen , Sue Lasky, Han Leeferink, Ronald Lippens, Donald Lueder, Olwen McNamara, Maria Mendel, Hans Moerel, Oliver Moles, Ton Mooij, Shawn Moore, Pirjo Nuutinen, Rhonda Payne, Marisa Pereira, Helen Phtiaka, Daniel Safran, Peter Sleegers, Ed Smeets, Frederik Smit, Martha Allexsaht-Snider, Annemiek Veen, Adelina Villas-Boas, Babara Wilson, Kees van der Wolf.
Editors: Frederik Smit, Hans Moerel, Kees van der Wolf en Peter Sleegers.
Download: Book
Catálogo de nuestros servicios en marketing digital y diseño gráfico.
Contacta con nosotros (+34 954 922 772) sin ningún tipo de compromiso. Le haremos un presupuesto hecho a medida, con precios justos y equilibrados.
NIBE is among top mba colleges in bangalore , india . College offers different courses like mba , bca, bbm and bcom . Its vision is to give efficient professionals to the management sector
Incentivos Fiscales a la innovación. Tipos y novedadesMadrid Emprende
Presentación utilizada por José María Peláez (Subdirección General de Fomento de la Innovación del Ministerio de Economía y Competitividad) en la jornada “Incentivos fiscales para I+D+i. Novedades de la Ley de emprendedores”, que tuvo lugar el 07/04/14 en el Vivero de Empresas de Carabanchel. Más información sobre la jornada aquí: http://ow.ly/vOgZD
Nowadays, the increasing complexity in government-related processes presents considerable challenges to achieve satisfactory services. In this study we will discuss the first results obtained in an ongoing project named “e-Government Innovation Center”. We first identify typical semantic problems in e-Government, then introduce an e-Government semantic business process management framework and illustrate the building permit application as an example to strengthen how semantic web technologies could be used to design a new approach for exchanging and performing the processes and information in e-Government.
When and why to stray from Chrome, Edge, or Firefox, some programs and extensions to support your Internet experience, and the increasing complexity of the dangers of going online.
When and why to stray from Chrome, Edge, or Firefox, some programs and extensions to support your Internet experience, and the increasing complexity of the dangers of going online.
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...Frederik Smit
‘Building bridges between home and school'
In this book you will find case studies, programmes, overviews and reviews of various kinds of involvement in a number of countries over the world. The main body is made up of the business of "building bridges" between home and school. The forms of involvement run from orientation to partnerships in specific subjects to systems, models and strategies for partnerships.
Contributors:
Ana Isabel Alvarez, Emma Beresford, Elzbieta Bielecka, Sue Botcherby, Victoria Casielles, Norberto Corral, Begoña Dona ire, Stelios Georgiou, Raquel-Amaya M artínez González, Jennifer Hartman, Gary Heywood-Everett, Pauline Huizenga, Ingebjörg Johanessen, Lesley Jones, Ann Kinkor, Leonidas Kyriakides, Cees Klaassen , Sue Lasky, Han Leeferink, Ronald Lippens, Donald Lueder, Olwen McNamara, Maria Mendel, Hans Moerel, Oliver Moles, Ton Mooij, Shawn Moore, Pirjo Nuutinen, Rhonda Payne, Marisa Pereira, Helen Phtiaka, Daniel Safran, Peter Sleegers, Ed Smeets, Frederik Smit, Martha Allexsaht-Snider, Annemiek Veen, Adelina Villas-Boas, Babara Wilson, Kees van der Wolf.
Editors: Frederik Smit, Hans Moerel, Kees van der Wolf en Peter Sleegers.
Download: Book
Catálogo de nuestros servicios en marketing digital y diseño gráfico.
Contacta con nosotros (+34 954 922 772) sin ningún tipo de compromiso. Le haremos un presupuesto hecho a medida, con precios justos y equilibrados.
NIBE is among top mba colleges in bangalore , india . College offers different courses like mba , bca, bbm and bcom . Its vision is to give efficient professionals to the management sector
Incentivos Fiscales a la innovación. Tipos y novedadesMadrid Emprende
Presentación utilizada por José María Peláez (Subdirección General de Fomento de la Innovación del Ministerio de Economía y Competitividad) en la jornada “Incentivos fiscales para I+D+i. Novedades de la Ley de emprendedores”, que tuvo lugar el 07/04/14 en el Vivero de Empresas de Carabanchel. Más información sobre la jornada aquí: http://ow.ly/vOgZD
Nowadays, the increasing complexity in government-related processes presents considerable challenges to achieve satisfactory services. In this study we will discuss the first results obtained in an ongoing project named “e-Government Innovation Center”. We first identify typical semantic problems in e-Government, then introduce an e-Government semantic business process management framework and illustrate the building permit application as an example to strengthen how semantic web technologies could be used to design a new approach for exchanging and performing the processes and information in e-Government.
When and why to stray from Chrome, Edge, or Firefox, some programs and extensions to support your Internet experience, and the increasing complexity of the dangers of going online.
When and why to stray from Chrome, Edge, or Firefox, some programs and extensions to support your Internet experience, and the increasing complexity of the dangers of going online.
Covers building a malware analysis environment for enterprises that don't currently have a dedicated team for such purposes. Presented at Blackhat DC 2010.
Stanford Drupal Camp 2015 - Repelling Bots, DDOS, and other FiendsSuzanne Aldrich
Long ago, in the misty annals of the early Internet, by simply placing a well-formed robots.txt file at the root of a website directory, you could ban unwanted indexing bots from crawling through a few dozen hand-stitched pages and consuming an entire month’s outgoing bandwidth allowance. The only DDOS was getting “Slashdotted”, and having that happen to your website was a big honor. Nowadays, however, our concerns are much more diverse in scope, and far riskier by nature. From email harvesting operations and spam generation factories, to denial-of-service and malware breeding farms, these zombie-staffed distributed botnets are spewing enormous rivers of malicious garbage upon our once pristine, networked shores. Meanwhile, the stakes are only getting higher, as all the top brands and levels of government alike begin to heavily rely on the wholesome appearance and reliable service of their websites to be intimately connected with consumers online.
How might besieged web operators repel the gross onslaught of spam traffic, DDOS attacks, and other malicious behavior promulgated through our nets? In this session, Suzanne Aldrich of Pantheon and Martijn Gonlag of CloudFlare will reconnoiter the Internet robot armies, and disseminate effective strategies for website fortification:
* Diagnosing bot traffic spikes with logs and analytics
* Best practices for obscuring emails and using nofollow links
* Standard spam evasion methods and why they’re mostly flawed
* Strengths and pitfalls of using external spam filtering services
* CDNs, caching, and other performance optimization techniques for withstanding high traffic volume
* Anti-DDOS and WAF protection
After this session you’ll be armed with all the knowledge needed to defend any Drupal site from a bot assault, and live to tell the tale.
Cloud Connect Santa Clara 2013: Web Acceleration and Front-End Optimization (...Strangeloop
One approach to performance is to accelerate the network; another is to optimize the application by reducing how much the network is needed and pushing content out towards the user. In this session, Hooman Beheshti reveals how technologies like Front-End Optimization and Content Delivery Networks work alongside the rest of the cloud computing stack to improve performance and increase user productivity.
Cloud Performance: Guide to Tackling Cloud Latency [Cloud Connect - Chicago 2...Strangeloop
Performance matters. And in the cloud, performance matters more than ever—layers of complexity and third-party, shared environments separate users from applications. Services are elastic, which means you can have any SLA you want, as long as you're willing to design it yourself. And you can have a fast application, too—if you're willing to deal with the bill at the end of the month.
So how should you think about cloud performance? In this in-depth workshop on the performance of cloud computing, three cloud computing and Internet performance experts—Steve Riley (Riverbed, Amazon), Hooman Beheshti (Strangeloop, Radware) and Alistair Croll (Coradiant, CloudOps)—take you on a tour of the challenges on-demand computing poses to reliable, fast user experiences.
What you'll learn:
- The new models of delay, capacity, and uptime that on-demand computing requires
- What and how to measure when it comes to performance, and how to think about metrics
- Where delay happens across the cloud environment
- How shared computing and back-end contention affect user experience
- What the WAN and the Application Delivery Network mean in a cloudy compute model
- How to spread load and optimize application front-ends to speed up applications
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxlior mazor
Stay safe, grab a drink and join us virtually for our upcoming "The Hacking Game - A Road to Post Exploitation" meetup
to learn how hackers can compromise the software supply chain, advanced data protection methods on WebLogic Server and
how to use AI in order to protect your software.
Agenda:
17:00 - 17:10 - 'Opening words' - by Gidi Farkash (CISO at Pipl Security)
17:10 - 17:40 - 'Tracking Attackers in Open Source Supply Chain - Lessons Learned' - by Jossef Harush Kadouri (Head of Software Supply Chain Security at Checkmarx)
17:40 - 18:20 - 'WebLogic - The Road to Post Exploitation' - by Amit German (Cyber Security Researcher at Pentera)
18:20 - 19:00 - 'AI In The Hands of Application Security' - by Brit Glazer (Head of Information Security at Unit)
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...Eric Vanderburg
Eric Vanderburg, Director of Information Systems and Security at JurInnov, presents "The Bot Stops Here: Removing the BotNet Threat" at the Public and Higher Ed Security Summit.
GDPR and EA Commissioning a web site Part 6 of 8Allen Woods
Sixth of eight decks written to provide overview guidance of the way the web works for small to medium sized enterprises who are considering commissioning a web site for the first time. This deck introduces the idea that a web site is "not just for Christmas" and once set live, arguably, the work begins. Search engine optimisation (SEO) and cookie management and some of their associated legal issues are introduced
Outlining a business model for Webhosting in Africa. Presentation by Fredy Kuenzler, Init7 at AIS 13 (Africa Internet Summit) / AFRINIC 18 in Lusaka, Zambia. June 19, 2013.
FTTX conferece Berlin December 2010 - Slides by Emanuel Kleindienst (5th Inte...flyingpotato
Service provider view: Swiss FTTx landscape, planning and schedules, disastrous situation
* Who is who in the Swiss FTTx-Market, planning, schedules and many different business plans / cases
* Building fibre in cities and towns, no coordination, no standardised planning, to many services from to many providers for just one customer = CHAOS!
* Possible solutions, ways of coordination, open discussion with the forum
Emanuel Kleindienst
CEO
Init Seven AG, Switzerland
RSS Feeds und Blogs aus Sicht des Suchmaschinenmarketingsflyingpotato
Ein Blog kann einen signifikanten Einfluss auf ihre Rankings haben. Ziel dieses Vortrags:
- Einrichtung eines Blogs, do's and dont's
- „suchmaschinen-gerechtes“ Schreiben
- RSS Integration in Websites
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. IN A GLANCE
• a hybrid solution using BGP • based on several
• using IP tunnels blacklists
• doing packet inspection • robust & flexible
• using a clever redirection • easily deployed
mechanism and managed
3. BACKGROUND AND PURPOSE
• Social responsibility.
A stand against child pornography is proof that your
organization adopts and lives up to commonly recognized
values.
• Common initiative
Reduce the occasions when innocent internet users might be
exposed to traumatic and unlawful images.
Diminish the re-victimisation of children by restricting
opportunities to view their sexual abuse.
Disrupt the accessibility and supply of such content to those
who may seek out such images.
4. LEGAL BACKGROUND
• Possession of child pornography is against the law
(art. 197 CPS), exception for Internet temporary files (cache)
• In 2010, a law to punish surf on child porn websites should be
edicted by the government (based on motion PRD Schweiger)
• Although it is illegal for an operator to track and store
information about who makes the accesses, it is possible to
block the traffic accessing illegal content.
• Long run before potential closing of child porn websites
5. ONGOING TREND IN EUROPE
2004 ¦ Norway
active filtering ¦ UK
Gov will
2005 ¦ Sweden
¦ Denmark
2007 ¦ Finland
¦ Netherlands
¦ Switzerland
2008 ¦ France
¦ Italy
http://libertus.net/censor/ispfiltering-gl.html
7. PARTNER BLACKLISTS
• Provided by the Hotline
• Updated every month
• Visual check of each URLs by 2 people
• Full URLs up to the actual picture
• Updated twice a day
FAQs : www.iwf.org.uk/public/page.148.437.htm
Since 2004
• Visual check of each URLs
• Domain name
• under discussions
8. DNS BLOCKING (DNS POISONING)
Abuse-site
www.lolita.com
77.222.40.40
Web Server
Standard DNS
Query: www.lolita.com
Answer: 77.222.40.40
Webserver
HTTP with blocking page
Advantages: 192.168.1.80
- Easy to deploy
- Standard services Client Computers
DNS-Query DNS-blocking system
Problems:
nameserver
- Extremely easy to bypass
- Overblocking DNS
Query: www.lolita.com
Answer: 192.168.1.80
9. IP FILTER
Abuse-site
www.lolita.com
77.222.40.40
Web Server ........
hostroute 12.219.53.233 null0
hostroute 142.68.240.18 null0
hostroute 159.25.16.103 null0
hostroute 159.25.16.107 null0
.......
Advantages: in core-routers
- Extremely easy to deploy
Problems:
- Extremely crude
- Massive overblocking
Client Computers
10. URL FILTERS
Web Server
........
www.google.com
www.aftonbladet.se
......
www.lolita.com
Advantages: ......
- Very accurate ......
Content Filter
Problems:
- Almost impossible to deploy in reality
- Requires deep packet inspection
Client Computers
11. HYBRID BLOCKING - OVERVIEW
http://abozar.tripod.com/adm/ad/toolbar.css
http://abutril.no.sapo.pt/adm/redirect/photo/photo/img/print_icon.gif
......
......
www.lolita.com/pics/x.jpg
......
Web Server
Advantages:
- Combines the advantages
of IP and URL-filter Clean traffic
- Very acurate, can match
Filtering proxy
whole URL's
- Easy to deploy
- No overblocking at all
- No proxying Suspect traffic
........
hostroute 12.219.53.233 filtering_proxy
hostroute 142.68.240.18 filtering_proxy
hostroute 159.25.16.103 filtering_proxy
hostroute 159.25.16.107 filtering_proxy
.......
in core-routers
Client Computers
12. WHITEBOX - ONSITE
http://abozar.tripod.com/adm/ad/toolbar.css
http://abutril.no.sapo.pt/adm/redirect/photo/photo/img/print_icon.gif
......
......
www.lolita.com/pics/x.jpg
......
Web Server
Advantages:
- Combines the advantages
of IP and URL-filter Clean traffic
- Very acurate, can match
NetClean WhiteBox
whole URL's
- Easy to deploy
- No overblocking at all
- No proxying Suspect traffic
BGP routes.
in ONE core-router
Client Computers
13. WHITEBOX – HOSTED
Clean Suspect Blocked
Web Server Web Server www.somedomain.com
Web Server www.lolita.com
SYN www.somedomain2.com
NetClean Whitebox
m
.co
ACK
s it e
ect
sp
.su
ww
://w
BGP Session in GRE Tunnel
ttp
Th
GE
Tunnel with a BGP Session
Announce suspect ip’s (445 x /32)
S
T
O
P
Client Computers
14. HYBRID BLOCKING
- IN COLLABORATION WITH TODAY'S SOLUTION
Abuse-site
www.lolita.com
Web Server
NetClean Whitebox
DNS-Blocking System
Nameserver
ISP Router
DNS-Blocking System
Webserver
Client Computers
15. HYBRID BLOCKING
THRU NETCLEAN WHITEBOX
• Combines the advantages of IP and URL-filter
• Very accurate, can match whole URL's
• Easy to deploy
• No overblocking at all
• No proxying
• Hosted or Onsite Solution
16. PROOF OF CONCEPT
Time frame
SUNET (filtering between 12/2005 to 12/2007)
PORT80 (filtering between 08/2006 to 12/2007)
DGC (filtering between 08/2006 to 12/2007)
CH_ISP (filtering between 08/2008 to 10/2008)
Conclusions
SUNET approximately 2200 blocks per day occured,
PORT80 approximately 3300 blocks per day occurred
DGC had 300 per day
CH_ISP had 2000 detections per day.
17. PROOF OF CONCEPT
A deeper study of SUNET was made, where the filter was installed but
not blocking anything for a month, and with the same setup the blocking was
activated for a month, 800 out of 60.000 users accessed child
pornography URLs,
This means that around 1% of the users were actively seeking for child
pornography.
The number of people trying to access black-listed URLs did not decrease
even after the filter was installed. The same number of users were seeking
child pornography, but with less frequency due to active filtering.
22. 2008 PRICING – HOSTED
Estimated number of users Yearly cost per user
0 to 50’000 CHF 0.30
50'001 to 100’000 CHF 0.28
101'000 to 200’000 CHF 0.26
201'000 to 400’000 CHF 0.23
401'000 to 800’000 CHF 0.19
801'000 to 1'000’000 CHF 0.15
more Call us
Support is included in the price.
23. 2008 PRICING – ONSITE
Estimated number of users Installation cost Update fee (year 2)
0 to 50’000 CHF 12’000 CHF 4’500
50'001 to 100’000 CHF 22’500 CHF 7’500
101'000 to 200’000 CHF 37’500 CHF 12’000
201'000 to 400’000 CHF 66’000 CHF 22’500
401'000 to 800’000 CHF 114’000 CHF 37’500
801'000 to 1'000’000 CHF 144’000 CHF 45’000
more Call us Call us
Hardware cost and support is not included in the price.
24. LAST WORDS
• Implementation of NetClean doesn’t just mean your networks are
protected from illegal material. It means your company is
contributing to protect innocent children.
• Free trial for two months using the hosted solution given to
SWINOG members
25. Q&A
Ethical debate…
Packet Transporter vs Social Responsability
26. CONTACT US
Pascal Seeger Grégoire Galland
Project Manager Network Engineer
pascal.seeger@practeo.ch gregoire.galland@practeo.ch
PRACTEO SA
Rue de la Gare 2 - 1030 Bussigny
T +41 21 706.13.35
M +41 78 850.58.06
www.practeo.ch