It's all about Security! Let’s get you started with Azure BastionWim Matthyssen
Slide deck used during the MC2MC Kick-Off Evening - In this modern hybrid cloud world, security is key. In this session you will learn all about using Azure Bastion, a fully managed PaaS service, to connect securely to your Azure VMs.
This is a short and simple presentation explaining ssl. After watching this SlideShare you’ll have an understanding of how ssl functions, knowledge of its benefits, and know why you should enable ssl on your websites.
It's all about Security! Let’s get you started with Azure BastionWim Matthyssen
Slide deck used during the MC2MC Kick-Off Evening - In this modern hybrid cloud world, security is key. In this session you will learn all about using Azure Bastion, a fully managed PaaS service, to connect securely to your Azure VMs.
This is a short and simple presentation explaining ssl. After watching this SlideShare you’ll have an understanding of how ssl functions, knowledge of its benefits, and know why you should enable ssl on your websites.
An overview of infrastructure security, including access control, firewalls, IDS, IPS, deep packet inspection, advance threat protection, honeypots, and threat intel.
RabbitMQ is a great infrastructure software, but there is a not very well known feature that allow us to create WebSockets applications its great STOMP integration.
In this talk I’ll show how we can very easily create a very robust WebSocket application using RabbitMQ, Spring Integration and, of course, Groovy.
Our Windows web hosting plans are ideal for home users and businesses alike, offering secure, stable and fast hosting solutions. Our Windows hosting platform has been built for ASP.NET developers and customers wanting to install ASP.NET applications, and use MS SQL database driven application, all supported with:
This is an a-typical WordPress Security talk to say the least. It touches on many things, such as penetration testing, the advantages of content delivery networks (CDN) and much more, but it does not touch on WordPress or its backend.
Best Forex VPS is very important issue for Professional Forex Trader. To trade using EA, traders need best quality Forex VPS. Here at BestFXVPS you will get low latency Forex VPS and optimized speed.
Check all Details from: www.bestfxvps.com
The international business is so common nowadays.
Using VPN service is increasingly necessary when doing business. Lots of useful webs are blocked due to the Internet censorship or Geo-restriction. VPN can change your IP and bypass all these restrictions, allowing you surf these sites as local residents do.
The free VPN we use: http://www.flyvpn.com/, http://www.flyvpn.com/freetrial
OVHcloud Startup Program : Découvrir l'écosystème au service des startups OVHcloud
L’équipe de l’OVHcloud Startup Program France Benelux a organisé, le 05 janvier dernier, son premier meetup online de l’année.
Le premier d’une longue série !
Cette première session, animée par Fanny Bouton, Startup Program Leader France Benelux, était l’occasion de découvrir toute l’ampleur de l’écosystème OVHcloud au service des startups au travers de l’OVHcloud Marketplace, l’Open Trusted Cloud Program ou encore avec l’OVHcloud Partner Program.
Ce rendez-vous a permis d’échanger directement avec l’ensemble des Program Leaders d’OVHcloud ainsi que nos partenaires tels que La BigAddress, Freelance Stack ou encore SmartGlobal.
Minimum HTTPS / TLS connection and certificate security requirements for IBM Verse for iOS, IBM Verse for Android, IBM Traveler Companion and IBM Traveler To Do mobile apps.
Installing OpenSim (Diva Distro) to Create Your Own Private Sim SandboxFleep Tuque
Slides from the Ohio Learning Network Second Life Monthly Meetup - November 2010: Installing OpenSim (Diva Distro) to Create Your Own Private Sim Sandbox
An overview of infrastructure security, including access control, firewalls, IDS, IPS, deep packet inspection, advance threat protection, honeypots, and threat intel.
RabbitMQ is a great infrastructure software, but there is a not very well known feature that allow us to create WebSockets applications its great STOMP integration.
In this talk I’ll show how we can very easily create a very robust WebSocket application using RabbitMQ, Spring Integration and, of course, Groovy.
Our Windows web hosting plans are ideal for home users and businesses alike, offering secure, stable and fast hosting solutions. Our Windows hosting platform has been built for ASP.NET developers and customers wanting to install ASP.NET applications, and use MS SQL database driven application, all supported with:
This is an a-typical WordPress Security talk to say the least. It touches on many things, such as penetration testing, the advantages of content delivery networks (CDN) and much more, but it does not touch on WordPress or its backend.
Best Forex VPS is very important issue for Professional Forex Trader. To trade using EA, traders need best quality Forex VPS. Here at BestFXVPS you will get low latency Forex VPS and optimized speed.
Check all Details from: www.bestfxvps.com
The international business is so common nowadays.
Using VPN service is increasingly necessary when doing business. Lots of useful webs are blocked due to the Internet censorship or Geo-restriction. VPN can change your IP and bypass all these restrictions, allowing you surf these sites as local residents do.
The free VPN we use: http://www.flyvpn.com/, http://www.flyvpn.com/freetrial
OVHcloud Startup Program : Découvrir l'écosystème au service des startups OVHcloud
L’équipe de l’OVHcloud Startup Program France Benelux a organisé, le 05 janvier dernier, son premier meetup online de l’année.
Le premier d’une longue série !
Cette première session, animée par Fanny Bouton, Startup Program Leader France Benelux, était l’occasion de découvrir toute l’ampleur de l’écosystème OVHcloud au service des startups au travers de l’OVHcloud Marketplace, l’Open Trusted Cloud Program ou encore avec l’OVHcloud Partner Program.
Ce rendez-vous a permis d’échanger directement avec l’ensemble des Program Leaders d’OVHcloud ainsi que nos partenaires tels que La BigAddress, Freelance Stack ou encore SmartGlobal.
Minimum HTTPS / TLS connection and certificate security requirements for IBM Verse for iOS, IBM Verse for Android, IBM Traveler Companion and IBM Traveler To Do mobile apps.
Installing OpenSim (Diva Distro) to Create Your Own Private Sim SandboxFleep Tuque
Slides from the Ohio Learning Network Second Life Monthly Meetup - November 2010: Installing OpenSim (Diva Distro) to Create Your Own Private Sim Sandbox
A review of corporate/industrial espionage tactics from the perspective of The Girl With The Dragon Tattoo character, Lisbeth Salander, and James Bond.
Quick presentation about using Sikuli for image based automation and how to mess with people's facebook profiles. Interlock Rochester Lightning Talks 1/2011
IPv6 configuration at CSCS
● Dual Stack approach
● Static addressing for networking equipment and servers
● Dynamic addressing for PC and guest networks
– Auto configuration with SLAAC
● But we still rely on DHCPv4 to distribute DNS
– Tests ongoing for:
● Distributing DNS via RA (RDNSS, RFC6106)
● DHCPv6
IPv6 deployment
5
● Configure the network part and FW/ACLs
– Test
● Configure IPv6 on the systems
– Test
– At this point the system uses IPv6 and IPv4 for outgoing
connections
● Publish the AAAA resource record into the DNS with short TTL
– If test is succesful: set normal TTL for the RR AAAA
– Now the system is fully IPv6 enabled
IPv6 lessons learned
7
● Some network devices send out RA even if they shouldn't
– Impact: machines get IPv6 global address
● Disable SLAAC autoconfiguration on all the servers
● Rogue RA:
– Impact: default gateway changed! No IPv6 connectivity anymore..
● Filter RA messages at the network level
● IPv6 ACL: be careful not to filter NS/ND messages
– Impact: you may break IPv6 connectivity
● On IPv6 ARP is replaced by ICMPv6 NS and ICMPv6 ND messages
● Firewall IPv6 limitations (CLI config needed, WebGUI not ready)
● Services not listening on IPv6. Remember to configure ssh, httpd, etc to
listen also on IPv6
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Securing your MySQL / MariaDB Server dataColin Charles
Co-presented alongside Ronald Bradford, this covers MySQL, Percona Server, and MariaDB Server (since the latter occasionally can be different enough). Go thru insecure practices, focus on communication security, connection security, data security, user accounts and server access security.
Security is always a top-of-mind issue for WLAN deployments, no matter what business you're in. But it’s an issue that's loaded with acronyms, confusing terminology, and some degree of black-art mystique. This session starts with basic principles of cryptography and gives you a thorough understanding of how Wi-Fi authentication and encryption work to keep your network safe. You’ll also learn about 802.1X authentication, tradeoffs of different EAP methods, why proper client configuration is so important, and why Aruba believes that role-based access control is critical in a modern mobile network.
Securing Network Access with Open Source solutionsNick Owen
My presentation from Atlanta Linux Fest on how to allow users secure access to your network using open source technologies. Examples include how to add two-factor authentication to Apache, OpenVPN, Astaro, NX etc.
At the moment MySQL 8 and MariaDB 10.4 are the latest versions of the corresponding database management systems. Each of these DBMSs has a unique set of features, unavailable in its analogue (MariaDB features might be unavailable in MySQL, and vice versa). In this presentation, we’ll cover these new features and provide recommendations re: which application will work best on which DBMS.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
5. 8/6/16
WPA and Rainbows
●
Can you make WPA rainbow tables?
– Yes but you’d be an idiot
●
Why?
– Glad you asked!
– WPA[1,2] takes a string as the password and salts it with the SSID
– “password” + “Linksys” == “passwordLinksys”
– Actually this is how you make the pair-wise master key
pwmk = PBKDF2(HMAC-SHA1, “password”, “Linksys”, 4096 rounds, 256
bit)
– Therefore, only pre-compute words for common SSIDs
7. 8/6/16
Demo?
●
Play along at home:
http://www.lovemytool.com/files/test.pcap
●
Precompute WPA key
– https://www.wireshark.org/tools/wpa-psk.html
●
Open wireshark preferences
●
Got to IEEE 802.11 and add key
●
…
●
Magic
8. 8/6/16
Old Rage
●
“Well I use HTTPS and that’s just passive
interception”
– Mostly true
●
We still have ARP and DHCP and DNS servers
that are skiddy hackable
●
Can’t trust any shared networks
10. 8/6/16
Enterprise Environments
●
WPA2 Personal: Everyone gets the same key
●
WPA2 Enterprise: Everyone makes their own
key based on their authentication (credentials,
certificate, etc)
●
No more wireshark decrypt
11. 8/6/16
Attacking WPA2 Enterprise
●
Setup Rogue AP
●
Have the client connect to it
●
Receive the EAP protected credentials
●
Use `asleap` to crack protected credentials
13. 8/6/16
Defending Home/Hackerspace
●
No one wants to maintain a RADIUS server just
to do authentication over wifi
– Ok except for Pee
●
A RADIUS service is a target
●
What if you don’t care about authentication but
just care about making a single session key?
14. 8/6/16
Setup
●
Setup FreeRADIUS server to authenticate your
wireless network
●
Add the following lines
– DEFAULT Auth-Type := Accept
– log_auth = yes
– log_auth_badpass = yes
– log_auth_goodpass = yes
●
Bonus: This will collect all usernames and
passwords that people enter.
– “Please log in with your Gmail or Yahoo passwords”
15. 8/6/16
Conclusion
●
This is super hacky but effective
●
WPA crypto primitives are getting old:
– SHA1
– PBKDF2 with only 4096 bit
– No PFS
●
WPA is old: 2004
●
There are no plans AFAIK to change them
●
WPA3: SHA256, PSK, DH temporal key exchange
16. 8/6/16
The Bill Slide
●
No, your WiFi isn’t secure enough
●
WPA2 Enterprise + EAP + Any username is
more secure
●
Google “radius docker wpa” done.
●
Tell management that wifi sucks because it
doesn’t have Diffie-Hellman. Seriously.