SlideShare uma empresa Scribd logo
1 de 166
Baixar para ler offline
URL to HTML
a minute in the life of a webpage
François Marier @fmarier mozilla
mozilla newmarket
8 engineers
8 engineers
1 designer
8 engineers
1 designer
1 manager
video & media
marketplace
cloud services
crash investigation
video & media
firefox ux
cloud services
crash investigation
video & media
firefox ux
security & privacy
crash investigation
video & media
firefox ux
security & privacy
layout
> 1,000 employees world-wide
</ >
1. Learn HTML
2. ?
3. Profit !
abstractions
asbtraction
construct used to understand a
complicated topic at a high level
asbtraction
extra layer added to avoid writing
the same code over and over
drawSquare()
drawLine()
drawLine()
drawLine()
drawLine()
drawSquare()
if you don't understand the
layers below, you won't know what
to do when the abstraction breaks
mastery
requires a high-level understanding
of the rest of the stack
web performance
web performance
how bytes make it to the user
web performance
how bytes make it to the user
how the browser renders the page
URL
DNS
IP
TCP
HTTP / TLS
HTML
URL
DNS
IP
TCP
HTTP / TLS
HTML
URL
uniform ressource locator
http://www.example.com
http://www.example.com
http://www.example.com
/articles/
http://www.example.com
/articles/tutorial.cgi
http://www.example.com
/articles/tutorial.cgi
?showsolutions=0&topic=web
http://www.example.com
/articles/tutorial.cgi
?showsolutions=0&topic=web
#part5
http://www.example.com:80
/articles/tutorial.cgi
?showsolutions=0&topic=web
#part5
http://username:password@
www.example.com:80
/articles/tutorial.cgi
?showsolutions=0&topic=web
#part5
DNS
domain name system
$ cat /etc/resolv.conf
nameserver 208.67.222.222
nameserver 208.67.220.220
www.cs.auckland.ac.nz
www.cs.auckland.ac.nz
130.216.158.22
$ dig nz NS @199.7.83.42
$ dig nz NS @199.7.83.42
; <<>> DiG 9.8.1-P1 <<>> nz NS @199.7.83.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 412
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADD
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;nz. IN NS
;; AUTHORITY SECTION:
nz. 172800 IN NS ns1.dns.net.nz.
nz. 172800 IN NS ns2.dns.net.nz.
nz. 172800 IN NS ns3.dns.net.nz.
nz. 172800 IN NS ns4.dns.net.nz.
nz. 172800 IN NS ns5.dns.net.nz.
nz. 172800 IN NS ns6.dns.net.nz.
nz. 172800 IN NS ns7.dns.net.nz.
$ dig ac.nz NS @ns1.dns.net.nz
$ dig ac.nz NS @ns1.dns.net.nz
; <<>> DiG 9.8.1-P1 <<>> ac.nz NS @ns1.dns.net.nz
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 391
;; flags: qr aa rd; QUERY: 1, ANSWER: 7, AUTHORITY: 0,
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;ac.nz. IN NS
;; ANSWER SECTION:
ac.nz. 86400IN NS ns7.dns.net.nz.
ac.nz. 86400IN NS ns4.dns.net.nz.
ac.nz. 86400IN NS ns2.dns.net.nz.
ac.nz. 86400IN NS ns1.dns.net.nz.
ac.nz. 86400IN NS ns6.dns.net.nz.
ac.nz. 86400IN NS ns3.dns.net.nz.
ac.nz. 86400IN NS ns5.dns.net.nz.
$ dig auckland.ac.nz NS @ns1.dns.net.nz
$ dig auckland.ac.nz NS @ns1.dns.net.nz
; <<>> DiG 9.8.1-P1 <<>> auckland.ac.nz NS @ns1.dns.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 598
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADD
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;auckland.ac.nz. IN NS
;; AUTHORITY SECTION:
auckland.ac.nz. 86400IN NS pubsec.domainz.net.nz.
auckland.ac.nz. 86400IN NS dns1.auckland.ac.nz.
auckland.ac.nz. 86400IN NS dns2.auckland.ac.nz.
;; ADDITIONAL SECTION:
dns1.auckland.ac.nz.86400IN A 130.216.1.2
dns2.auckland.ac.nz.86400IN A 130.216.1.1
$ dig cs.auckland.ac.nz NS @dns1.auckland.ac.nz
$ dig cs.auckland.ac.nz NS @dns1.auckland.ac.nz
; <<>> DiG 9.8.1-P1 <<>> cs.auckland.ac.nz NS @dns1.auc
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 485
;; flags: qr aa rd; QUERY: 1, ANSWER: 4, AUTHORITY: 0,
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;cs.auckland.ac.nz. IN NS
;; ANSWER SECTION:
cs.auckland.ac.nz. 10800 IN NS dns2.auckland.ac.nz.
cs.auckland.ac.nz. 10800 IN NS kronos2.cs.auckland.ac.n
cs.auckland.ac.nz. 10800 IN NS dns1.auckland.ac.nz.
cs.auckland.ac.nz. 10800 IN NS kronos1.cs.auckland.ac.n
;; ADDITIONAL SECTION:
dns1.auckland.ac.nz.1800 IN A 130.216.1.2
$ dig www.cs.auckland.ac.nz @kronos1.cs.auckland.ac.nz
$ dig www.cs.auckland.ac.nz @kronos1.cs.auckland.ac.nz
; <<>> DiG 9.8.1-P1 <<>> www.cs.auckland.ac.nz A @krono
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 175
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4,
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;www.cs.auckland.ac.nz. IN A
;; ANSWER SECTION:
www.cs.auckland.ac.nz. 10800 IN A 130.216.158.22
;; AUTHORITY SECTION:
cs.auckland.ac.nz. 10800IN NS kronos2.cs.auckland.ac.nz
cs.auckland.ac.nz. 10800IN NS dns2.auckland.ac.nz.
cs.auckland.ac.nz. 10800IN NS dns1.auckland.ac.nz.
cs.auckland.ac.nz. 10800IN NS kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
IP
internet protocol
www.bbc.co.uk
212.58.246.94
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
130.216.158.22
212.58.246.94
130.216.158.22
212.58.246.94
router drops packets
packets arrive in wrong order
130.216.158.22
212.58.246.94
router drops packets
cable is cut
packets arrive in wrong order
130.216.158.22
212.58.246.94
router drops packets
cable is cut
packets arrive in wrong order
ideal network actual network
TCP
transmission control protocol
guarantees in-order
delivery of packets
abstraction of a reliable point-to-point
connection with built-in re-try logic
applications have a lot
less errors to deal with
UDP
user datagram protocol
TCP UDP
reminder: abstractions are leaky
3-way handshake
establishing a new connection
client server
client
SYN
x=42
server
client
SYN
x=42
SYN+ACK
y=10,x=43
server
client
SYN
x=42
SYN+ACK
y=10,x=43
ACK
y=11
server
HTTP
hypertext transfer protocol
http://www.example.com
http://www.example.com
clear text protocol
client
request
server
client
request
response
server
Host: www.example.com
User-Agent: Mozilla/5.0 (rv:29.0) Firefox/29.0
DNT: 1
Host: www.example.com
User-Agent: Mozilla/5.0 (rv:29.0) Firefox/29.0
DNT: 1
<request body goes in here>
Content-Type: text/html
Date: Thu, 22 May 2014 05:34:47 GMT
Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT
Content-Length: 1270
<!doctype html>
<html>
<head>
<title>Example Domain</title>
</head>
<body>
<div>
<h1>Example Domain</h1>
<p>This domain is established to be used for
domain in examples without prior coordination
</div>
</body>
</html>
200 OK
404 Not Found
$ curl http://www.example.com
<!doctype html>
<html>
<head>
<title>Example Domain</title>
</head>
<body>
<div>
<h1>Example Domain</h1>
<p>This domain is established to be used for
domain in examples without prior coordinatio
</div>
</body>
</html>
$ curl --head http://www.example.com
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=604800
Content-Type: text/html
Date: Thu, 22 May 2014 05:42:26 GMT
Etag: "359670651"
Expires: Thu, 29 May 2014 05:42:26 GMT
Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT
Server: ECS (cpm/F858)
X-Cache: HIT
x-ec-custom-error: 1
Content-Length: 1270
verbs
(fancy word for commands)
GET
POST
GET /article/43228
GET /article/43228
GET /article/43228
GET /article/43228
POST /article/delete/last
GET /article/43228
POST /article/delete/last
POST /article/delete/last
GET /article/43228
POST /item/20/buy
POST /item/20/buy
$$$
$$$
TLS
transport layer security
SSL
secure sockets layer
HTTPS
hypertext transfer protocol secure
secure
(sometimes)
client server
(pk, sk)
client
hello!
server
(pk, sk)
client
hello!
hello!
pubkey
server
(pk, sk)
client
hello!
hello!
pubkey
server
(pk, sk)
session key
client
hello!
hello!
pubkey
i'm done!encryptpk
(session key)
server
(pk, sk)
session key
client
hello!
hello!
pubkey
i'm done!encryptpk
(session key)
server
(pk, sk)
session key
session key
man-in-the-middle
client server
(pk, sk)
client server
(pk, sk)
NSA
(pk, sk)
client
hello!
server
(pk, sk)
NSA
(pk, sk)
client
hello!
server
(pk, sk)
NSA
(pk, sk)
hello!
client
hello!
hello!
pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
client
hello!
hello!
pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
hello!
pubkey
client
hello!
hello!
pubkey
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
key
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
i'm done!encrypt(key)key
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
i'm done!encrypt(key)key
key
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
i'm done!encrypt(key)key
key
authentication
(of the server)
client
hello!
hello!
pubkey
server
(pk, sk)
session key
client
hello!
hello!
signed pubkey
server
(pk, sk)
session key
verify
signature
client
hello!
hello!
signed pubkey
server
(pk, sk)
session key
verify
signature
i'm done!encryptpk
(session key)
session key
client
hello!
hello!
signed pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
hello!
signed pubkeykey
client
hello!
hello!
signed pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
hello!
signed pubkeykey
abort!
how can you tell you're
talking to the right person?
(and not to the NSA)
trusted third-party
certificate authority
trusted third-party
certificate authority
EFF has found
more than
650
certificate
authorities
in the wild
*.google.com
*.google.com
*.google.com
*.google.com 7 different domains
*.google.com 7 different domains
$100
$1,000
$100
$1,000$1,000
$100
HTML
hypertext markup language
parsing
.png
.jpg .js .css
resolve all hostnames
establish TCP connections
negotiate TLS session
URL
DNS
IP
TCP
HTTP / TLS
HTML
@fmarier francois@mozilla.com
questions?
wanna know more?
https://github.com/alex/what-happens-when/blob/master/README.rst
USB protocol
ARP resolution
browser networking stack
rendering engine
HTML parsing
CSS interpretation
Copyright © 2015 Francois Marier <francois@mozilla.com>
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
leaky pipe: https://www.flickr.com/photos/ifl/3920636654
leaky pipe with elephant: https://www.flickr.com/photos/rcrhee/10785374875
sky tower: https://www.flickr.com/photos/elisfanclub/6120863439
golden gate: https://www.flickr.com/photos/jeffgunn/6663212147
san jose: https://www.flickr.com/photos/the_tahoe_guy/3183673224
statue of liberty: https://www.flickr.com/photos/suewaters/7574642942
big ben: https://www.flickr.com/photos/timmorris/3103896345
bbc house: https://www.flickr.com/photos/redvers/532073098
fingers crossed: https://www.flickr.com/photos/bearpark/6861722073
prince charles : http://en.wikipedia.org/wiki/File:Prince_Charles_2012.jpg
southern cross cable: https://en.wikipedia.org/wiki/File:Southern_Cross_Cable_route.svg
image credits

Mais conteúdo relacionado

Mais procurados

End to end web security
End to end web securityEnd to end web security
End to end web securityGeorge Boobyer
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Rob Fuller
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity George Boobyer
 
Killing Passwords with JavaScript
Killing Passwords with JavaScriptKilling Passwords with JavaScript
Killing Passwords with JavaScriptFrancois Marier
 
Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'Jen Andre
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingDenis Gundarev
 
Office doc (2)
Office doc (2)Office doc (2)
Office doc (2)ly2wf
 
Attacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkAttacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkChris Gates
 
Windows Attacks AT is the new black
Windows Attacks   AT is the new blackWindows Attacks   AT is the new black
Windows Attacks AT is the new blackRob Fuller
 
Attacking Big Data Land
Attacking Big Data LandAttacking Big Data Land
Attacking Big Data LandJeremy Brown
 
Mocks, Stubs and Fakes. ¿What Else?
Mocks, Stubs and Fakes. ¿What Else?Mocks, Stubs and Fakes. ¿What Else?
Mocks, Stubs and Fakes. ¿What Else?Alex Soto
 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & moreMattias Geniar
 
HTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC EditionHTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC EditionXavier Mertens
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassThe Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassRob Fuller
 

Mais procurados (20)

End to end web security
End to end web securityEnd to end web security
End to end web security
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
mimikatz @ rmll
mimikatz @ rmllmimikatz @ rmll
mimikatz @ rmll
 
Killing Passwords with JavaScript
Killing Passwords with JavaScriptKilling Passwords with JavaScript
Killing Passwords with JavaScript
 
Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & Troubleshooting
 
WebSockets 101
WebSockets 101WebSockets 101
WebSockets 101
 
Office doc (2)
Office doc (2)Office doc (2)
Office doc (2)
 
Attacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkAttacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit Framework
 
Windows Attacks AT is the new black
Windows Attacks   AT is the new blackWindows Attacks   AT is the new black
Windows Attacks AT is the new black
 
Attacking Big Data Land
Attacking Big Data LandAttacking Big Data Land
Attacking Big Data Land
 
Mocks, Stubs and Fakes. ¿What Else?
Mocks, Stubs and Fakes. ¿What Else?Mocks, Stubs and Fakes. ¿What Else?
Mocks, Stubs and Fakes. ¿What Else?
 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & more
 
Cqcon
CqconCqcon
Cqcon
 
HTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC EditionHTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC Edition
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting ClassThe Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
Top X OAuth 2 Hacks
Top X OAuth 2 HacksTop X OAuth 2 Hacks
Top X OAuth 2 Hacks
 
Unsecuring SSH
Unsecuring SSHUnsecuring SSH
Unsecuring SSH
 
URL to HTML
URL to HTMLURL to HTML
URL to HTML
 

Destaque

Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptFrancois Marier
 
Supporting Debian machines for friends and family
Supporting Debian machines for friends and familySupporting Debian machines for friends and family
Supporting Debian machines for friends and familyFrancois Marier
 
Privacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxPrivacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxFrancois Marier
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptFrancois Marier
 
Hardening Firefox for Security and Privacy
Hardening Firefox for Security and PrivacyHardening Firefox for Security and Privacy
Hardening Firefox for Security and PrivacyFrancois Marier
 
Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015Francois Marier
 
Security and Privacy on the Web in 2016
Security and Privacy on the Web in 2016Security and Privacy on the Web in 2016
Security and Privacy on the Web in 2016Francois Marier
 
Don't be rich, Live rich - One year on the road - The good and the bad
Don't be rich, Live rich - One year on the road - The good and the badDon't be rich, Live rich - One year on the road - The good and the bad
Don't be rich, Live rich - One year on the road - The good and the badnomadznu
 

Destaque (9)

Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
 
Supporting Debian machines for friends and family
Supporting Debian machines for friends and familySupporting Debian machines for friends and family
Supporting Debian machines for friends and family
 
Privacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxPrivacy and Tracking Protection in Firefox
Privacy and Tracking Protection in Firefox
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
 
Hardening Firefox for Security and Privacy
Hardening Firefox for Security and PrivacyHardening Firefox for Security and Privacy
Hardening Firefox for Security and Privacy
 
Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015Security and Privacy on the Web in 2015
Security and Privacy on the Web in 2015
 
Security and Privacy on the Web in 2016
Security and Privacy on the Web in 2016Security and Privacy on the Web in 2016
Security and Privacy on the Web in 2016
 
Don't be rich, Live rich - One year on the road - The good and the bad
Don't be rich, Live rich - One year on the road - The good and the badDon't be rich, Live rich - One year on the road - The good and the bad
Don't be rich, Live rich - One year on the road - The good and the bad
 
Foot Notes
Foot NotesFoot Notes
Foot Notes
 

Semelhante a URL to HTML

Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the InternetRIPE NCC
 
Drupalcon2007 Sun
Drupalcon2007 SunDrupalcon2007 Sun
Drupalcon2007 Sunsmattoon
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...Jisc
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNIJisc
 
Kubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe BarcelonaKubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe BarcelonaHenning Jacobs
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slideskj teoh
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivAleksey Asiutin
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey GordeychikCODE BLUE
 
Issuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultIssuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultOlinData
 
Data Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10gData Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10gIbrahim Malek
 
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...Nagios
 
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程Jimmy Chang
 
Practical Operation Automation with StackStorm
Practical Operation Automation with StackStormPractical Operation Automation with StackStorm
Practical Operation Automation with StackStormShu Sugimoto
 
TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所Kyohei Moriyama
 
REST Web Sebvice
REST Web SebviceREST Web Sebvice
REST Web Sebvicekhmerforge
 
Keep it simple web development stack
Keep it simple web development stackKeep it simple web development stack
Keep it simple web development stackEric Ahn
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...arnaudsoullie
 

Semelhante a URL to HTML (20)

Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the Internet
 
Drupalcon2007 Sun
Drupalcon2007 SunDrupalcon2007 Sun
Drupalcon2007 Sun
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
 
Kubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe BarcelonaKubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe Barcelona
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slides
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
 
Issuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultIssuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vault
 
DNSSEC at Penn
DNSSEC at PennDNSSEC at Penn
DNSSEC at Penn
 
Data Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10gData Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10g
 
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
 
(Re)discover your AEM
(Re)discover your AEM(Re)discover your AEM
(Re)discover your AEM
 
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
 
Practical Operation Automation with StackStorm
Practical Operation Automation with StackStormPractical Operation Automation with StackStorm
Practical Operation Automation with StackStorm
 
TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所
 
REST Web Sebvice
REST Web SebviceREST Web Sebvice
REST Web Sebvice
 
Keep it simple web development stack
Keep it simple web development stackKeep it simple web development stack
Keep it simple web development stack
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 

Mais de Francois Marier

Security and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power UsersSecurity and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power UsersFrancois Marier
 
Getting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your WebappGetting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your WebappFrancois Marier
 
Outsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to DebianOutsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to DebianFrancois Marier
 
Easy logins for JavaScript web applications
Easy logins for JavaScript web applicationsEasy logins for JavaScript web applications
Easy logins for JavaScript web applicationsFrancois Marier
 
You're still using passwords on your site?
You're still using passwords on your site?You're still using passwords on your site?
You're still using passwords on your site?Francois Marier
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwordsFrancois Marier
 
Easy logins for PHP web applications
Easy logins for PHP web applicationsEasy logins for PHP web applications
Easy logins for PHP web applicationsFrancois Marier
 
Mozilla Persona for your domain
Mozilla Persona for your domainMozilla Persona for your domain
Mozilla Persona for your domainFrancois Marier
 
Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?Francois Marier
 
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...Francois Marier
 
The problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about itThe problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about itFrancois Marier
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwordsFrancois Marier
 
Persona: un système d'identité pour le Web
Persona: un système d'identité pour le WebPersona: un système d'identité pour le Web
Persona: un système d'identité pour le WebFrancois Marier
 
Passwords suck, but centralized proprietary services are not the answer
Passwords suck, but centralized proprietary services are not the answerPasswords suck, but centralized proprietary services are not the answer
Passwords suck, but centralized proprietary services are not the answerFrancois Marier
 
Building Persona: federated and privacy-sensitive identity for the Web (Open ...
Building Persona: federated and privacy-sensitive identity for the Web (Open ...Building Persona: federated and privacy-sensitive identity for the Web (Open ...
Building Persona: federated and privacy-sensitive identity for the Web (Open ...Francois Marier
 
Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...
Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...
Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...Francois Marier
 
The Web beyond "usernames & passwords" (OSDC12)
The Web beyond "usernames & passwords" (OSDC12)The Web beyond "usernames & passwords" (OSDC12)
The Web beyond "usernames & passwords" (OSDC12)Francois Marier
 
Persona: in your browsers, killing your passwords
Persona: in your browsers, killing your passwordsPersona: in your browsers, killing your passwords
Persona: in your browsers, killing your passwordsFrancois Marier
 

Mais de Francois Marier (18)

Security and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power UsersSecurity and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power Users
 
Getting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your WebappGetting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your Webapp
 
Outsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to DebianOutsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to Debian
 
Easy logins for JavaScript web applications
Easy logins for JavaScript web applicationsEasy logins for JavaScript web applications
Easy logins for JavaScript web applications
 
You're still using passwords on your site?
You're still using passwords on your site?You're still using passwords on your site?
You're still using passwords on your site?
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwords
 
Easy logins for PHP web applications
Easy logins for PHP web applicationsEasy logins for PHP web applications
Easy logins for PHP web applications
 
Mozilla Persona for your domain
Mozilla Persona for your domainMozilla Persona for your domain
Mozilla Persona for your domain
 
Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?
 
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
 
The problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about itThe problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about it
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwords
 
Persona: un système d'identité pour le Web
Persona: un système d'identité pour le WebPersona: un système d'identité pour le Web
Persona: un système d'identité pour le Web
 
Passwords suck, but centralized proprietary services are not the answer
Passwords suck, but centralized proprietary services are not the answerPasswords suck, but centralized proprietary services are not the answer
Passwords suck, but centralized proprietary services are not the answer
 
Building Persona: federated and privacy-sensitive identity for the Web (Open ...
Building Persona: federated and privacy-sensitive identity for the Web (Open ...Building Persona: federated and privacy-sensitive identity for the Web (Open ...
Building Persona: federated and privacy-sensitive identity for the Web (Open ...
 
Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...
Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...
Building Persona: federated and privacy-sensitive identity for the Web (LCA 2...
 
The Web beyond "usernames & passwords" (OSDC12)
The Web beyond "usernames & passwords" (OSDC12)The Web beyond "usernames & passwords" (OSDC12)
The Web beyond "usernames & passwords" (OSDC12)
 
Persona: in your browsers, killing your passwords
Persona: in your browsers, killing your passwordsPersona: in your browsers, killing your passwords
Persona: in your browsers, killing your passwords
 

Último

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

URL to HTML