SlideShare a Scribd company logo
Curriculum:
Authentication, Validation & Basic Testing
Summer, 2016
Authentication, Validation, & Testing PART 1
1.) Authentication (~ 60 minutes)
2.) Validation (~ 30 minutes)
3.) Pairing (~30 minutes)
Agenda
Introductions
Matthew Gerrior
Devpost, Head of Engineering
ABOUT ME
● Grew up outside Boston
● Went to school upstate
● Worked in consulting for ~ 3.5 years
● Got tired of building other people’s products
● Moved to NYC to join Devpost (known as
ChallengePost at the time)
devpost.com/MGerrior

Recommended for you

Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes

This document is an agenda for a talk about Web 2.0 security woes. The talk will discuss how Web 2.0 applications have changed some threats and vulnerabilities compared to previous generations of web applications. While some threats have changed form, many of the same types of vulnerabilities still exist. The talk will provide examples of cross-site scripting and hidden functionality vulnerabilities. It will also discuss steps that development teams and customers can take to help improve security, such as training, secure coding practices, and involvement of security personnel throughout the development life cycle.

authenticationcaptchasensepost
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net

The document provides 10 tips for securing ASP.NET applications. It discusses common web attacks like cross-site request forgery and session fixation, and defenses against them such as using secret tokens and regenerating session IDs. It also covers proper use of cryptography, input validation, authorization, cookies, password security, and restricting application trust levels.

Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong

JWTs provide a more secure and scalable alternative to cookie-based authentication. JWTs contain encrypted user information that is verified on the client-side and transmitted with each request, avoiding the need for database lookups on the server-side. In contrast, cookies require server-side sessions and database lookups to validate the user on each request. JWTs also enable cross-domain requests and work across mobile and web platforms, while cookies have limitations in these areas. Developers are advised to use a third-party service to handle JWT generation and verification rather than implementing it themselves.

jwtstatelesssaas
Devpost
Get an inside look at Dev teams who are hiring
ABOUT US
● Online Hackathons (Uber, Oculus, AT&T)
● In-Person Hackathons (PennApps, HackNY)
● Developer Portfolios to showcase skills,
technologies, projects
● Team Pages give an inside look at hot
startups in NYC (Blue Apron, Buzzfeed,
Genius)
devpost.com/teams
ScriptEd
Coding Skills for under-resourced schools
ScriptEd equips students in under-resourced schools with the fundamental
coding skills and professional experiences that together create access to
careers in technology.
● GitHub accounts from Day 1
● Two hackathons every year
● Field trips to Tech Companies
● Summer internship opportunities
Authentication
Cookies

Recommended for you

SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management

This presentation is a result of research and evaluation for SSO and IDM majorly focused to Drupal CMS. Enterprises, corporations and companies with multiple web properties are struggling to provide a better user experience and offer a single "corporate ID" and "Password" as the key for all. This single ID should be used across all the properties and corporations should still be able to manage the access level and permission of the respective user based on the grants assigned to this ID in each web property.

ssoidmdrupal cms
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications

Everyone building a web application that supports user login is concerned with security. How do you securely authenticate users and keep their identity secure? With the huge growth in Single Page Applications (SPAs), JavaScript and mobile applications, how do you keep users safe even though these are 'unsafe' client environments? This presentation will demystify HTTP Authentication and explain how the Next Big Thing - Token Authentication - can be used to secure web applications on the JVM, REST APIs, and 'unsafe' clients while supporting security best practices and even improving your application's performance and scale.

jwtcsrfspa
Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016

You can improve how well your website works and looks across different devices using responsive web design techniques. But did you know you can also improve access for all users, including those with disabilities, by applying responsive techniques? Learn how.

responsive webweb designmobile
Cookies
- Key-value data pairs
- Stored in the user’s browser
- Stored until they reach their specified expiration
data.
Cookies
Cookies
Good for:
- Storing temporary data
- Storing data that isn’t sensitive
Bad for:
- Storing permanent/persistent data
- Storing sensitive data like passwords or
shopping carts
Cookies

Recommended for you

Html5 Fit: Get Rid of Love Handles
Html5 Fit:  Get Rid of Love HandlesHtml5 Fit:  Get Rid of Love Handles
Html5 Fit: Get Rid of Love Handles

According to HTTPArchive.org the average web page is now larger than the original DOOM installation application. Today's obese web is leading to decreased user satisfaction, customer engagement and increased cost of ownership. Research repeatedly tells us customers want faster user experiences. Search engines reward faster sites with better rankings. Small, fast sites are cheaper to develop, maintain and operate. - Why has the web become obese? - What actions can developers and stakeholders do to combat their morbid obesity? - Are these actions expensive or hard to implement? This session reviews what customers want and how to identify your web site's love handles. More importantly you will learn simple techniques to eliminate the fat and create a healthy, maintainable, affordable web development lifestyle that produces the user experiences your customers want to engage with over and over.

csswebsitehtml5
Our application got popular and now it breaks
Our application got popular and now it breaksOur application got popular and now it breaks
Our application got popular and now it breaks

Our application got popular and now breaks under load. The document discusses common issues that cause applications to break as user load increases, such as overuse of shared scopes, inefficient database queries, and slow client-side performance. It provides examples of better approaches and techniques to optimize performance, such as using distributed caching, improving query efficiency through joins, compressing assets, and prioritizing critical CSS and JavaScript.

application performance
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365

Identity and Access (AD), Azure and Office 365: Building a Single Page Application (SPA) with ASP.NET Web API and Angular.js using Azure Active Directory to Log in Users

azure
Why is it bad to store sensitive data or persistent
data in a cookie?
- Very easy for users to delete cookies
- Doesn’t persist across browser sessions/devices
- Easy to steal/manipulate cookies
Cookies
Cookies
Cookie Jars
Rails also provides access to two
cookie jars:
- “Signed” cookies prevent
tampering by the end user by
signing the cookies with your
applications “Secret Base Key”
- “Encrypted” cookies are secured
even further by first encrypting
the values, and then signing them
with the “Secret Base Key”
Cookie Jar

Recommended for you

Difference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.netDifference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.net

Authentication verifies a user's identity by having them log in, while authorization determines which resources and pages the authenticated user has access to. For example, after authenticating normal and admin users on a website, authorization would prevent normal users from accessing admin pages. Authentication occurs before authorization and verifies the user, even if anonymously, while authorization checks the user's access rights after identity is confirmed.

authentication and authorization in asp.net
Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion

A number of years ago I presented a talk at cfObjective on building an advanced, custom CF error handler. This talk will go above and beyond that, covering not just CF but JS/Ajax and SQL Server error logging and strategies for debugging errors on live sites. Developers should come away from this talk with lots of ideas for both custom code they can add to their sites as well a variety of open source and 3rd party solutions for error logging and use site analytics to track and fix issues on their live sites. Blog articles expanding on the information presented in this talk will also be published concurrent with the presentation at coldfusionmuse.com.

error handlingcoldfusionbug tracking
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...

The document provides an overview of 10 best practices for AWS Identity and Access Management (IAM). It discusses creating individual users and managing permissions with groups. It also covers granting least privilege, configuring strong password policies, enabling multi-factor authentication for privileged users, using IAM roles for EC2 instances and sharing access. Additional best practices include rotating security credentials regularly, restricting access with conditions, and reducing reliance on root users. The document is copyrighted material from Amazon.

reinvent-security-trackreinventaws
Session
Session
How can we tell which user is making a request to
our site if HTTP requests are stateless?
Rails stores a cookie on the user’s browser
containing their session hash.
- Secure
- Tamper-Proof
- Expires when the browser is closed
Session
Session

Recommended for you

Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)

We already showed you how to build a Beautiful REST+JSON API(http://www.slideshare.net/stormpath/rest-jsonapis), but how do you secure your API? At Stormpath we spent 18 months researching best practices, implementing them in the Stormpath API, and figuring out what works. Here’s our playbook on how to secure a REST API.

rest designrest securityapi security
User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...

An overview of user authentication and authorization in the Galaxy project, and they can use it to authorize Galaxy to access their private resources on cloud, and how Galaxy implements the flow leveraging OpenID Connect protocol and Role-Based Access Control model to obtain temporary credentials.

galaxyauthenticationauthorization
Build A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON APIBuild A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON API

REST+JSON APIs are great - but you still need to communicate with them from your code. Wouldn't you prefer to interact with clean and intuitive Java objects instead of messing with HTTP requests, HTTP status codes and JSON parsing? Wouldn't you prefer to work with type-safe objects specific to your API? In this presentation, Les Hazlewood - Stormpath CTO and Apache Shiro PMC Chair - will share all of the golden nuggets learned while designing, implementing and supporting multiple clients purpose-built for a real-world REST+JSON API. Further reading: http://www.stormpath.com/blog Stormpath is a user management and authentication service for developers. By offloading user management and authentication to Stormpath, developers can bring applications to market faster, reduce development costs, and protect their users. Easy and secure, the flexible cloud service can manage millions of users with a scalable pricing model.

rest clientrest designrest
That looks like the cookies you just taught us about,
why do we need both?
The session is an entire hash that gets stored in a
secure cookie that expires when the browser is
closed. Each value in the cookies hash is stored as an
individual cookie, since they are key-value data pairs.
Session
- Not really a hash, that’s just how Rails presents it
to you to make it easier to work with. Cookies
are not hashes either.
- Size of an individual cookie is limited to roughly
4kb, which is sufficient for normal usage, but
prevents them from acting as a database of any
sort.
Session
Session
Which Session Store should I choose?
- Cookie store is the default, and recommended
store. It’s lightweight and requires zero setup in
a new application to use.
Session

Recommended for you

Web Development for UX Designers
Web Development for UX DesignersWeb Development for UX Designers
Web Development for UX Designers

An overview of web development essentials that will help you as a user experience designer to not only understand how to integrate designs with development components, but also to learn some tips on interacting effectively with developers.

user experience designhtml5web development
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016

A presentation from my speech about various technologies replacing password: multi-factor authentication, OATH, OTP, PKI, FIDO, U2F etc.

passwordshotpapp security
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen

This document proposes a picture password authentication system using a touchscreen for illiterate users. The system would allow users to create passwords by touching images on the touchscreen in a predefined combination. If the user touches the images in the correct sequence, the microcontroller will authenticate them and grant access to appliances connected to relays. This technique aims to make passwords easier for illiterate users to remember compared to text passwords. A block diagram shows the main components would include a microcontroller, touchscreen module, LCD display, power supply, and relays connected to devices.

Why would I use a different store then?
- You need more than 4kb of session data
- You probably don’t, but sometimes you do
- Cookies are sent along with every request you
make
- Bigger Cookies means bigger (and slower)
requests
Session
- If you accidentally expose your
“secret_base_key”, users can change their
session data
- Since the key is used to sign/encrypt the
cookie, exposing the key exposes the
session
- Storing the wrong kind of data is insecure
- Vulnerable to attacks like the replay attack if
sensitive data stored in cookie
Session
What is it useful for besides knowing which user is
currently logged in?
Session
Session

Recommended for you

Graphical password
Graphical passwordGraphical password
Graphical password

Graphical passwords are the alternative to textual password. It is more secure than textual password. http://www.trickyindia.net/delete-kik-account-permanently/ Thanks.

graphical password graphical password authenticati
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning

This document summarizes a seminar presentation on mobile phone cloning. It begins with an introduction that defines cloning as creating an exact genetic copy and explains that mobile phone cloning copies the identity of one phone to another, usually for fraudulent calls. It then covers topics like GSM and CDMA networks, how phones are cloned by capturing identifiers, methods to detect cloned phones, the impacts of cloning, and ways to prevent it. Statistics are provided on the costs of cloning to carriers and its use in criminal activities. The conclusion emphasizes the need for legislation against cloning fraud and for carriers and users to take security seriously.

Employability, The Labor Force and the Economy
Employability, The Labor Force and the EconomyEmployability, The Labor Force and the Economy
Employability, The Labor Force and the Economy

Employability refers to an individual's ability to obtain and maintain employment. It depends on characteristics like skills, education, experience, and adaptability. High employability benefits both individuals and the overall economy. For individuals, it provides career opportunities and financial stability. For the economy, it leads to lower unemployment and higher productivity and economic growth. Maintaining employability requires continuous skills development, as labor market needs change rapidly. Workers need both technical skills specific to their occupation as well as soft skills like communication, problem solving, and cultural competence that facilitate employment across different roles and industries. Educational institutions, employers, workers, and policies all play a role in developing and sustaining employability.

Flash
Flash
Special “hash” that persists only from one request to
the next. A self-destructing session hash.
Commonly used for sending messages from the
controllers to the view, because they persist across a
redirect from a “New Object” form to the details
page for that object.
Flash
Flash

Recommended for you

First grade teachers
First grade teachersFirst grade teachers
First grade teachers

This document discusses learning styles and how teachers can incorporate technology to engage students with different styles. It identifies several common learning styles such as auditory, visual, tactile, and kinesthetic. The document advocates that teachers understand students' individual styles and use technology like videos and blended learning to teach all students. By adapting to different learning styles with technology, teachers can motivate and prepare students to be successful leaders.

First grade teachers
First grade teachersFirst grade teachers
First grade teachers

This document discusses learning styles and how teachers can incorporate technology to engage students with different styles. It identifies several common learning styles such as auditory, visual, tactile, and kinesthetic. The document advocates that teachers understand students' individual styles and use technology like videos and blended learning to teach all students. By adapting to different learning styles with technology, teachers can motivate and prepare students to be successful leaders.

TGPE_ONCE
TGPE_ONCETGPE_ONCE
TGPE_ONCE

COL·LABORACIÓ INSTITUT QUATRE CANTONS AMB L'ONCE

tgpe
Flash
Flash
Why can’t I just use instance variables?
Instance variables only exist for the current request,
and are lost when a new request takes place such as
when the user is redirected.
Flash
What if I’m not redirecting the user and I’m just
rendering a page?
Make flash messages available to the current
request using flash.now just like you would with a
regular flash.
Flash

Recommended for you

Gasteiz martxoak 3
Gasteiz martxoak 3Gasteiz martxoak 3
Gasteiz martxoak 3
martxoak 3gasteiz
Program USPI
Program USPIProgram USPI
Program USPI

Program USPI menyalurkan nilai sosial produktif untuk membantu masalah masyarakat melalui belanja produktif dengan hadiah tunai dan kredit tanpa bunga untuk promosi penjualan yang dijamin mampu dikembalikan dari hasil penjualan.

 
by uspi
uspi program
20140218test
20140218test20140218test
20140218test
Devise
Devise
Flexible authentication solution for Rails with
Warden.
https://github.com/plataformatec/devise
Authenticating users is easy. I’ll just build a
SessionsController with some CRUD actions and
store the user id in the cookie. Problem solved.
Devise
No. Authenticating users is not easy. What about:
- Securely storing user passwords
- Confirming email addresses?
- Log in With Twitter/GitHub/Facebook?
- Forgot Password email?
- Remember me checkbox?
Devise

Recommended for you

05122015 114613
05122015 11461305122015 114613
05122015 114613

The document discusses parts of a grape cluster. It lists the main parts as the stem, roots, grapes and stalks.

Presentation2
Presentation2Presentation2
Presentation2
You’re not getting paid to build an authentication
system (unless you are), you’re getting paid to build
a new and exciting product that no one has ever
built before.
Devise
Hashes and stores a password in the database to
validate the authenticity of a user while signing in.
Devise
Database Authenticatable
Adds OmniAuth (sign in with
Twitter/Facebook/GitHub/whatever) support.
Devise
Omniauthable
Sends emails with confirmation instructions and
verifies whether an account is already confirmed
during sign in.
Devise
Confirmable

Recommended for you

Eğiticinin Eğitimi - Part 1
Eğiticinin Eğitimi - Part 1Eğiticinin Eğitimi - Part 1
Eğiticinin Eğitimi - Part 1

M.E.B Onaylı 45 Saatlik Eğiticinin Eğitimi Sertifika ve Kariyer Programı

eğiticinin eğitimibilişimkariyer
First grade teachers
First grade teachersFirst grade teachers
First grade teachers

This document discusses learning styles and how teachers can incorporate technology to engage students with different styles. It identifies several common learning styles such as auditory, visual, tactile, and kinesthetic. The document advocates that teachers understand students' individual styles and use technology like videos and blended learning to teach all students. By adapting to different learning styles with technology, teachers can motivate and prepare students to be successful leaders.

slide awal 1945p
slide awal 1945pslide awal 1945p
slide awal 1945p
 
by uspi
uspi 1945pindonesiamarketing
Resets the user password and sends reset
instructions.
Devise
Recoverable
Handles signing up users through a registration
process, also allowing them to edit and destroy their
account.
Devise
Registerable
Manages generating and clearing a token for
remembering the user from a saved cookie.
Devise
Rememberable
Tracks sign in count, timestamps and IP address.
Devise
Trackable

Recommended for you

The Mechanics of Social Media
The Mechanics of Social MediaThe Mechanics of Social Media
The Mechanics of Social Media

A presentation on integration social media into an existing site and using social media to market to end-users.

facebooktwittersocial media
First grade teachers: Powerpoint
First grade teachers: PowerpointFirst grade teachers: Powerpoint
First grade teachers: Powerpoint

This document discusses learning styles and how teachers can incorporate technology to engage students with different styles. It identifies several common learning styles such as auditory, visual, tactile, and kinesthetic. The document advocates that teachers understand students' individual styles and use technology like videos and blended learning to teach all students. By adapting to different learning styles with technology, teachers can motivate and prepare students to be successful leaders.

Expires sessions that have not been active in a
specified period of time.
Devise
Timeoutable
Provides validations of email and password. It's
optional and can be customized, so you're able to
define your own validations.
Devise
Validatable
Locks an account after a specified number of failed
sign-in attempts. Can unlock via email or after a
specified time period.
Devise
Lockable
Should I always use Devise?
No, not always. There are other alternatives such as
Sorcery that provide authentication.
More importantly, it is a very enlightening exercise to
try to build your own authentication system from
scratch (just not for a production application).
Devise

Recommended for you

CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat

Dale Olds, VMware A pinch of authentication theory and methods, a taste of the sweet and the bitter of the much maligned password, and then larger portions of federated authentication protocols from SAML to OpenID Connect, clearing up along the way some confusion between federated authentication and tokens used for delegated authorization.

AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed

My slide deck from my session, AD113: Speed Up Your Applications with Nginx + PageSpeed, at MWLUG 2015 in Atlanta, GA at the Ritz-Carlton. For more, see: - https://edm00se.io/self-promotion/mwlug-ad113-success - https://github.com/edm00se/AD113-Speed-Up-Your-Apps-with-Nginx-and-PageSpeed

reverse proxynginxpagespeed
Session and cookies,get and post methods
Session and cookies,get and post methodsSession and cookies,get and post methods
Session and cookies,get and post methods

- Cookies and sessions are used to maintain state in HTTP, a stateless protocol. Cookies are stored on the client side while sessions are stored on the server side. - Cookies can store string data and may persist even after closing the browser. Sessions can store any object but end when the browser closes. - GET requests can transmit data via URL parameters while POST transmits data within the HTTP request body and is more secure as data is not logged.

session and cookiesget and post methodssessions and cookies
Where can I learn more about rolling my own
authentication system?
● Michael Hartl's online book: https://www.railstutorial.
org/book/modeling_users
● Ryan Bates' Railscast: http://railscasts.com/episodes/250-authentication-
from-scratch
● Codecademy's Ruby on Rails: Authentication and Authorization: http:
//www.codecademy.com/en/learn/rails-auth
Devise
Validation
Validation
- Make testing/maintenance more difficult
- Beneficial when multiple applications access
database
- Can handle some constraints more efficiently
than application-level code
Database-level Validation
- Convenient way to provide immediate feedback
without submitting form/performing request
- Unreliable if used alone and implemented in
JavaScript, as they can easily be bypassed.
Validation
Client-side Validation

Recommended for you

1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin

Is your environment acting the way you intended it to be, as in do your users see what you wanted them to see?

playwrightazureclarity
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag

Jim Brown's article on BSD certification for August issue of BSD Magazine. Last article in a 3 part series.

bsd magcertification
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14

This document summarizes a job portal website that allows job seekers and employers to search, apply, and post jobs. The portal uses ASP.NET, C#, HTML, JavaScript, and SQL Server for development. It includes modules for users, searching, employee/job seeker login, forums, and chat. The system aims to be flexible, efficient, user-friendly, and focused on data security as it will operate online. Hardware and software requirements are also specified.

- Unwieldy to use and difficult to test/maintain
- Goes against the Skinny Controller/Fat Model
design paradigm of Rails
Validation
Controller-level Validation
- Best way to ensure that only valid data is stored
in the database
- Database agnostic
- Cannot be bypassed by end users
- Convenient to test and maintain
Validation
Model-level validations
- Important to ensure consistency in your
database
- Easier to render things like user profiles if you
know things like name are guaranteed to be
present
- Ensure proper functioning of application by
enforcing things like uniqueness of screen
names, or valid formats of email addresses.
Validations
Validations

Recommended for you

Developer Night - Opticon18
Developer Night - Opticon18Developer Night - Opticon18
Developer Night - Opticon18

Lightning talks on best practices for product and engineering teams to experiment everywhere in their applications. First presented at Optimizely's user conference, Opticon18 on September 12th, 2018.

experimentationproduct experimentationfull stack
Code your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard LearnCode your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard Learn

The document discusses authentication in Blackboard Learn and provides an example of extending authentication capabilities by creating a custom filter. It begins by explaining the different types of authentication providers in Blackboard Learn, including remote, delegated credential, and fully delegated providers. It then discusses changes in Service Pack 8, supported providers, and how the framework is built for extension. The document concludes by walking through a sample implementation of a custom filter that limits login attempts to prevent password guessing.

authenticationsample codeblackboard
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO

In the digital age, cybersecurity is a paramount concern, and Google is committed to ensuring user safety and privacy. As part of their efforts, they've made SSL certificates a significant factor in search engine optimization (SEO). SSL (Secure Sockets Layer) certificates, indicated by the "https" in website URLs and the padlock symbol in browsers, are not only essential for security but also offer several SEO benefits. In this comprehensive guide, we'll delve into the advantages of having an SSL certificate for SEO.

digital marketingseo training courseseo marketing
Validations
Validations
Validations
Acceptance
Validations
Associated

Recommended for you

Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?

Learn how to choose which #Azure​ services to use so that you can start "Jumping Clouds" with confidence :) Watch the recording at https://youtu.be/34U1hUJmCUc and for more forward-looking #Software #Developerment topics, join http://ServerlessToronto.org User Group LINKS FROM THE MEETUP & CHAT https://www.askyourdeveloper.com/ http://youtube.serverlesstoronto.org https://youtu.be/Ivcndg9pTpk?t=1390 https://www.meetup.com/Serverless-Toronto/events/276721419/ https://www.meetup.com/Serverless-Toronto/events/275256767/ https://www.meetup.com/Serverless-Toronto/events/276752609/ https://developerweeklypodcast.com/ https://channel9.msdn.com/Shows/Azure-Friday https://www.pluralsight.com/paths/microsoft-azure-compute-for-developers https://azureoverview.com/ https://build5nines.com/ https://azure.microsoft.com/en-us/updates/ https://azure.microsoft.com/en-us/blog/ https://docs.microsoft.com/en-us/azure/architecture/ https://www.mssqltips.com/sqlservertip/5144/sql-server-temporal-tables-vs-change-data-capture-vs-change-tracking--part-3/ https://azure.microsoft.com/en-us/pricing/details/synapse-analytics/ https://www.manning.com/books/azure-data-engineering https://www.manning.com/books/azure-storage-streaming-and-batch-analytics https://docs.microsoft.com/en-us/azure/azure-functions/durable/durable-functions-overview?tabs=csharp https://cloudevents.io/ https://docs.microsoft.com/en-us/azure/architecture/patterns/ https://www.linkedin.com/pulse/you-asking-your-team-design-perfect-solution-daniel-zivkovic/ https://youtu.be/GBTdnfD6s5Q https://www.linkedin.com/company/serverless-toronto/

A A A
A A AA A A
A A A

A presentation about Authentication I did at the local geekmeet meetup. Some examples of outsourced authenticaton using CAMS/Shibboleth/OpenID

shibbolethcams"authentication
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018

Vault is a tool for centrally managing secrets like passwords, API keys, and certificates. It addresses the problem of "secrets sprawl" where credentials are stored insecurely in multiple places like source code, emails, and configuration files. Vault centralizes secrets management, provides access control and auditing, and generates unique short-lived credentials to reduce risk if a secret is compromised. It also supports encrypting sensitive data for additional protection. Implementing Vault involves deciding where it will run, who will manage encryption keys, which secrets it will store, where audit logs will go, and who will operate and configure the system on an ongoing basis.

devopssecurity
Validations
Confirmation
Validations
Exclusion
Validations
Format
Validations
Inclusion

Recommended for you

Job portal
Job portalJob portal
Job portal

Easy Jobs is Job Searching website, can be used by thousands of Students/Employee/Companies. We can advertise company new recruitment like Fresher recruits, Experienced recruits by adding your add on our site.

session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt

The document discusses session tracking techniques in servlets. It describes four main techniques: cookies, hidden form fields, URL rewriting, and HTTP sessions. Cookies are the simplest technique and involve assigning a unique session ID to each client as a cookie. Hidden form fields maintain state by storing information in hidden form fields and transmitting it across requests. URL rewriting appends a session ID to the URL. HTTP sessions involve saving client-specific information on the server side in an HTTP session object.

Proxy Caches and Web Application Security
Proxy Caches and Web Application SecurityProxy Caches and Web Application Security
Proxy Caches and Web Application Security

The document summarizes a presentation about proxy caches posing a threat to web application security. It begins with a review of the OWASP top 10 security risk of broken authentication and session management. It then describes how a vulnerability in Google Docs allowed access to other users' accounts due to issues with proxy caches and session management. The presentation warns that developers must assume proxy caches exist and can potentially expose session information to unintended users if session management is not implemented securely. It emphasizes the need for developers to test their applications under aggressive proxy cache scenarios.

applicationwebowasp
Validations
Length
Validations
Numericality
Validations
Presence
Validations
Absence

Recommended for you

Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...

With a centralized data store, the entire spectrum of analytics is at your fingertips. Using Looker & Segment, you can collect, store and analyze everything from click-stream and event data to transactional and behavioral data in your data warehouse. Some of the topics this webinar will include: -The advantages of a centralized data warehouse with Segment Warehouses -Creating a data model to get your company on the same page with Looker Blocks -Putting it all together: Best practices for making your data accessible to your end users

data analyticsdata
The Testing Planet Issue 2
The Testing Planet Issue 2The Testing Planet Issue 2
The Testing Planet Issue 2

This document discusses the importance of good design principles for test automation code. It provides examples of applying basic design concepts like avoiding duplication and separating concerns when automating tests using the Robot Framework and Selenium. The examples start simply by extracting duplicated steps in a single test into keywords and variables. They progress to splitting functionality across multiple files as "resources" and parameterizing tests to run with different data values. The goal is to demonstrate how non-programmers can design maintainable automated tests by applying basic coding best practices.

software testingquality assurancetest automation
Cookies authentication
Cookies authenticationCookies authentication
Cookies authentication

This project was done for my fourth semester ( Computer Science) for the subject Cryptography and Network Security. For this project coding was done in PHP

Validations
Uniqueness
Validations
Validations
Validations

Recommended for you

Authentication in Svelte using cookies.pptx
Authentication in Svelte using cookies.pptxAuthentication in Svelte using cookies.pptx
Authentication in Svelte using cookies.pptx

Svelte streamlines authentication with cookies, offering a secure and seamless user experience. Effortlessly manage sessions by storing tokens in cookies, ensuring persistent logins. With Svelte's simplicity, implement robust authentication mechanisms, enhancing user security and interaction.

Website Security
Website SecurityWebsite Security
Website Security

The document provides an overview of basic web security issues and recommendations to address them. It discusses making regular backups and testing restores, using strong and unique passwords that are changed frequently, password protecting directories with .htaccess, keeping software updated, restricting access to sensitive files and data, preventing cross-site scripting attacks, filtering user-submitted data, and using prepared statements to prevent SQL injection. The goal is to increase awareness of common vulnerabilities and how to avoid or lessen exposure to exploits.

modxmodxposecurity
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...

Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.

insider securitycybersecurity threatsenterprise security
Validations
Validations
Validations
Validations

Recommended for you

How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx

How do we build an IoT product, and make it profitable? Talk from the IoT meetup in March 2024. https://www.meetup.com/iot-sweden/events/299487375/

iot
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy

Not so much to say

Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time

Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality. Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality. Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality. Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank? ** Episode Overview ** In this first episode of our quality series, Kristen Hansen and the panel discuss: ⦿ What do we mean when we say patent quality? ⦿ Why is patent quality important? ⦿ How to balance quality and budget ⦿ The importance of searching, continuations, and draftsperson domain expertise ⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications https://www.aurorapatents.com/patently-strategic-podcast.html

patentspatent applicationpatent prosecution
Validations
Validations
Testing
Testing
TDD - Test Driven Development

Recommended for you

Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...

Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge. You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter. The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.

dartflutteropenssf
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...

Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023 https://arxiv.org/abs/2307.12980

[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf

Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.

infrastructure as codeclouddevops
Testing
TDD
Testing
RSpec
Testing
RSpec
Testing
RSpec & TDD

Recommended for you

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation

Java Servlet programs

Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter

Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.

The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing

Invited Remote Lecture to SC21 The International Conference for High Performance Computing, Networking, Storage, and Analysis St. Louis, Missouri November 18, 2021

distributed supercomputerdistributed machine learning
Testing
RSpec & TDD
Testing
RSpec & TDD
Testing
- Earliest phase of testing
- Focuses on individual unit or component
- Best/Easiest phase to catch bugs in
- Can have 100% passing unit tests but still have
code that doesn’t work as intended
Unit Testing
- Ensure that model validations are present
- Ensure that relationships exist with correct
options
- Ensure helper methods perform as expected
Testing
Unit Testing

Recommended for you

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf

In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.

social media hackerfacebook hackerhire a instagram hacker
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf

These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.

air force fighter planebiggest submarinezambia port
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference

We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner! We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too! Check out our proposed agenda below 👇👇 08:30 ☕ Welcome coffee (30') 09:00 Opening note/ Intro to UiPath Community (10') Cristina Vidu, Global Manager, Marketing Community @UiPath Dawid Kot, Digital Transformation Lead @Proservartner 09:10 Cloud migration - Proservartner & DOVISTA case study (30') Marcin Drozdowski, Automation CoE Manager @DOVISTA Pawel Kamiński, RPA developer @DOVISTA Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner 09:40 From bottlenecks to breakthroughs: Citizen Development in action (25') Pawel Poplawski, Director, Improvement and Automation @McCormick & Company Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company 10:05 Next-level bots: API integration in UiPath Studio (30') Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner 10:35 ☕ Coffee Break (15') 10:50 Document Understanding with my RPA Companion (45') Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath 11:35 Power up your Robots: GenAI and GPT in REFramework (45') Krzysztof Karaszewski, Global RPA Product Manager 12:20 🍕 Lunch Break (1hr) 13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30') Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance 13:50 Communications Mining - focus on AI capabilities (30') Thomasz Wierzbicki, Business Analyst @Office Samurai 14:20 Polish MVP panel: Insights on MVP award achievements and career profiling

#uipathcommunity#automation#automationdeveloper
Testing
Unit Testing
Testing
Unit Testing
Testing combinations of separate
components/modules that have been independently
unit tested already.
Testing
Integration Testing
Testing
Integration

Recommended for you

20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf

Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 : - Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants. - REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.

genaicloudrgpd
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf

Profile portofolio

20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024

Everything that I found interesting about machines behaving intelligently during June 2024

quantumfaxmachine
Testing
Integration
Testing
http://i.imgur.com/qSN5SFR.gifv
Integration
Testing
Verifying that all of the product/business needs have
been met and that end users have the desired
experience.
Acceptance
Testing
Cucumber (with Gherkin)

Recommended for you

Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf

As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models. This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through: - Standard ways of running dbt (and when to utilize other methods) - How Cosmos can be used to run and visualize your dbt projects in Airflow - Common challenges and how to address them, including performance, dependency conflicts, and more - How running dbt projects in Airflow helps with cost optimization Webinar given on 9 July 2024

apache airflowdbtdbt-core
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides

If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights. During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to: - Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value - Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems - Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors - Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported - Look Ahead: Gain insights into where FME is headed with coordinate systems in the future Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!

Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx

MuleSoft Meetup on APM and IDP

mulesoftai
Testing
Cucumber (with Gherkin)
Testing
Cucumber (with Gherkin)
Testing
Capybara
Testing
Capybara

Recommended for you

Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant

Password Rotation in 2024 is still Relevant

passwordmanagementrotation
Testing
Resources
http://www.theodinproject.com/ruby-on-
rails/sessions-cookies-and-authentication
https://gorails.com/episodes/user-authentication-
with-devise
http://www.bitspedia.com/2012/05/how-session-
works-in-web-applications.html
http://www.justinweiss.com/articles/how-rails-
sessions-work/
http://www.w3schools.
com/bootstrap/bootstrap_alerts.asp
https://github.com/plataformatec/devise
http://guides.rubyonrails.
org/active_record_validations.html
http://blog.arkency.com/2014/04/mastering-rails-
validations-contexts/
https://octoberclub.files.wordpress.
com/2011/10/red-green-refactor.png
http://david.heinemeierhansson.com/2014/tdd-is-
dead-long-live-testing.html
Resources
http://www.rainforest-alliance.
org/sites/default/files/uploads/4/capybara-
family_15762686447_f9f8a0684a_o.jpg
http://www.can-technologies.
com/images/services/test2.png
http://stumbleapun.magicalfartwizard.org/wp-
content/uploads/2011/06/just-the-tips.jpg
http://stumbleapun.magicalfartwizard.org/wp-
content/uploads/2011/06/just-the-tips.jpg
Resources

Recommended for you

http://www.seguetech.com/blog/2013/07/31/four-
levels-software-testing
http://softwaretestingfundamentals.com/unit-
testing/
https://www.inflectra.com/Ideas/Topic/Testing-
Methodologies.aspx
http://www.can-technologies.
com/images/services/test2.png
Resources

More Related Content

What's hot

Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...
Mikkel Flindt Heisterberg
 
Ajax learning tutorial
Ajax learning tutorialAjax learning tutorial
Ajax learning tutorial
bharat_beladiya
 
QuickConnect
QuickConnectQuickConnect
QuickConnect
Annu G
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes
SensePost
 
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net
alsmola
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
Derek Perkins
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
Stormpath
 
Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016
Kate Walser
 
Html5 Fit: Get Rid of Love Handles
Html5 Fit:  Get Rid of Love HandlesHtml5 Fit:  Get Rid of Love Handles
Html5 Fit: Get Rid of Love Handles
Chris Love
 
Our application got popular and now it breaks
Our application got popular and now it breaksOur application got popular and now it breaks
Our application got popular and now it breaks
ColdFusionConference
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365
Kris Wagner
 
Difference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.netDifference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.net
Umar Ali
 
Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion
Mary Jo Sminkey
 
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
Amazon Web Services
 
Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)
Stormpath
 
User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...
Vahid Jalili
 
Build A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON APIBuild A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON API
Stormpath
 
Web Development for UX Designers
Web Development for UX DesignersWeb Development for UX Designers
Web Development for UX Designers
Ashlimarie
 

What's hot (19)

Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...
 
Ajax learning tutorial
Ajax learning tutorialAjax learning tutorial
Ajax learning tutorial
 
QuickConnect
QuickConnectQuickConnect
QuickConnect
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes
 
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016
 
Html5 Fit: Get Rid of Love Handles
Html5 Fit:  Get Rid of Love HandlesHtml5 Fit:  Get Rid of Love Handles
Html5 Fit: Get Rid of Love Handles
 
Our application got popular and now it breaks
Our application got popular and now it breaksOur application got popular and now it breaks
Our application got popular and now it breaks
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365
 
Difference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.netDifference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.net
 
Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion
 
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
 
Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)
 
User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...
 
Build A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON APIBuild A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON API
 
Web Development for UX Designers
Web Development for UX DesignersWeb Development for UX Designers
Web Development for UX Designers
 

Viewers also liked

Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Bernard Toplak
 
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen
sree438
 
Graphical password
Graphical passwordGraphical password
Graphical password
swapnilbirdawade
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
Devyani Vaidya
 
Employability, The Labor Force and the Economy
Employability, The Labor Force and the EconomyEmployability, The Labor Force and the Economy
Employability, The Labor Force and the Economy
npologeorgis
 
First grade teachers
First grade teachersFirst grade teachers
First grade teachers
rfleming888
 
First grade teachers
First grade teachersFirst grade teachers
First grade teachers
rfleming888
 
TGPE_ONCE
TGPE_ONCETGPE_ONCE
TGPE_ONCE
beasoldevilla
 
Gasteiz martxoak 3
Gasteiz martxoak 3Gasteiz martxoak 3
Gasteiz martxoak 3
csanv
 
Program USPI
Program USPIProgram USPI
Program USPI
uspi
 
20140218test
20140218test20140218test
20140218test
mh0306052
 
05122015 114613
05122015 11461305122015 114613
05122015 114613
Montse Román
 
Eğiticinin Eğitimi - Part 1
Eğiticinin Eğitimi - Part 1Eğiticinin Eğitimi - Part 1
Eğiticinin Eğitimi - Part 1
Referans Kariyer ve Bilişim Merkezi
 
First grade teachers
First grade teachersFirst grade teachers
First grade teachers
rfleming888
 
slide awal 1945p
slide awal 1945pslide awal 1945p
slide awal 1945p
uspi
 
The Mechanics of Social Media
The Mechanics of Social MediaThe Mechanics of Social Media
The Mechanics of Social Media
Matthew Gerrior
 
First grade teachers: Powerpoint
First grade teachers: PowerpointFirst grade teachers: Powerpoint
First grade teachers: Powerpoint
rfleming888
 

Viewers also liked (20)

Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
 
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Employability, The Labor Force and the Economy
Employability, The Labor Force and the EconomyEmployability, The Labor Force and the Economy
Employability, The Labor Force and the Economy
 
First grade teachers
First grade teachersFirst grade teachers
First grade teachers
 
First grade teachers
First grade teachersFirst grade teachers
First grade teachers
 
TGPE_ONCE
TGPE_ONCETGPE_ONCE
TGPE_ONCE
 
Gasteiz martxoak 3
Gasteiz martxoak 3Gasteiz martxoak 3
Gasteiz martxoak 3
 
Program USPI
Program USPIProgram USPI
Program USPI
 
20140218test
20140218test20140218test
20140218test
 
05122015 114613
05122015 11461305122015 114613
05122015 114613
 
Antalya İnsan Kaynakları
Antalya İnsan Kaynakları Antalya İnsan Kaynakları
Antalya İnsan Kaynakları
 
Presentation2
Presentation2Presentation2
Presentation2
 
Eğiticinin Eğitimi - Part 1
Eğiticinin Eğitimi - Part 1Eğiticinin Eğitimi - Part 1
Eğiticinin Eğitimi - Part 1
 
First grade teachers
First grade teachersFirst grade teachers
First grade teachers
 
slide awal 1945p
slide awal 1945pslide awal 1945p
slide awal 1945p
 
The Mechanics of Social Media
The Mechanics of Social MediaThe Mechanics of Social Media
The Mechanics of Social Media
 
First grade teachers: Powerpoint
First grade teachers: PowerpointFirst grade teachers: Powerpoint
First grade teachers: Powerpoint
 
I.k. planlaması
I.k. planlamasıI.k. planlaması
I.k. planlaması
 

Similar to Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Testing

CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
edm00se
 
Session and cookies,get and post methods
Session and cookies,get and post methodsSession and cookies,get and post methods
Session and cookies,get and post methods
baabtra.com - No. 1 supplier of quality freshers
 
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
NETUserGroupBern
 
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag
Dru Lavigne
 
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14
kbabhishek4
 
Developer Night - Opticon18
Developer Night - Opticon18Developer Night - Opticon18
Developer Night - Opticon18
Optimizely
 
Code your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard LearnCode your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard Learn
Dan Rinzel
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
devbhargav1
 
Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?
Daniel Zivkovic
 
A A A
A A AA A A
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
HashiCorp
 
Job portal
Job portalJob portal
Job portal
LoveBug Shashank
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
Jayaprasanna4
 
Proxy Caches and Web Application Security
Proxy Caches and Web Application SecurityProxy Caches and Web Application Security
Proxy Caches and Web Application Security
Tim Bass
 
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Looker
 
The Testing Planet Issue 2
The Testing Planet Issue 2The Testing Planet Issue 2
The Testing Planet Issue 2
Rosie Sherry
 
Cookies authentication
Cookies authenticationCookies authentication
Cookies authentication
Rsilwal123
 
Authentication in Svelte using cookies.pptx
Authentication in Svelte using cookies.pptxAuthentication in Svelte using cookies.pptx
Authentication in Svelte using cookies.pptx
Knoldus Inc.
 
Website Security
Website SecurityWebsite Security
Website Security
Carlos Z
 

Similar to Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Testing (20)

CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
 
Session and cookies,get and post methods
Session and cookies,get and post methodsSession and cookies,get and post methods
Session and cookies,get and post methods
 
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
 
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag
 
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14
 
Developer Night - Opticon18
Developer Night - Opticon18Developer Night - Opticon18
Developer Night - Opticon18
 
Code your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard LearnCode your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard Learn
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
 
Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?
 
A A A
A A AA A A
A A A
 
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
 
Job portal
Job portalJob portal
Job portal
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
 
Proxy Caches and Web Application Security
Proxy Caches and Web Application SecurityProxy Caches and Web Application Security
Proxy Caches and Web Application Security
 
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...
 
The Testing Planet Issue 2
The Testing Planet Issue 2The Testing Planet Issue 2
The Testing Planet Issue 2
 
Cookies authentication
Cookies authenticationCookies authentication
Cookies authentication
 
Authentication in Svelte using cookies.pptx
Authentication in Svelte using cookies.pptxAuthentication in Svelte using cookies.pptx
Authentication in Svelte using cookies.pptx
 
Website Security
Website SecurityWebsite Security
Website Security
 

Recently uploaded

Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 

Recently uploaded (20)

Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 

Startup Institute NY (Summer 2016) - Authentication, Validation, and Basic Testing