changeset 527 | 968ff3fb17c6 |
parent 526 | dac7bab6cfea |
child 541 | 5cd1865d45bd |
526:dac7bab6cfea | 527:968ff3fb17c6 |
---|---|
386 |
386 |
387 \begin{textblock}{1}(11.5,13.7) |
387 \begin{textblock}{1}(11.5,13.7) |
388 \begin{tabular}{l} |
388 \begin{tabular}{l} |
389 \footnotesize on BBC Newsnight\\[-2mm] |
389 \footnotesize on BBC Newsnight\\[-2mm] |
390 \footnotesize in 2010 or |
390 \footnotesize in 2010 or |
391 \href{http://www.youtube.com/watch?v=JPAX32lgkrw}{youtube} |
391 \href{https://www.youtube.com/watch?v=Ks0SOn8hjG8}{youtube} |
392 \end{tabular} |
392 \end{tabular} |
393 \end{textblock} |
393 \end{textblock} |
394 |
394 |
395 \end{frame} |
395 \end{frame} |
396 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
396 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
502 not liable for any damage, because the code is physically |
502 not liable for any damage, because the code is physically |
503 printed and could have been stolen while you paid with your |
503 printed and could have been stolen while you paid with your |
504 card at a store. Same applies if someone cloned your CC |
504 card at a store. Same applies if someone cloned your CC |
505 reading the magnetic stripe or sniffing RFID. Only losing your |
505 reading the magnetic stripe or sniffing RFID. Only losing your |
506 VBV or MCSC password can cause serious trouble.''\\ |
506 VBV or MCSC password can cause serious trouble.''\\ |
507 \hfill{}\url{www.goo.gl/UWluh0} |
507 \hfill{}\url{https://news.ycombinator.com/item?id=3960034} |
508 \end{bubble} |
508 \end{bubble} |
509 |
509 |
510 \end{frame} |
510 \end{frame} |
511 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
511 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
512 |
512 |
579 \frametitle{JavaScript + Node.js} |
579 \frametitle{JavaScript + Node.js} |
580 |
580 |
581 A simple response from the server: |
581 A simple response from the server: |
582 |
582 |
583 \small |
583 \small |
584 \lstinputlisting{../progs/ap0.js} |
584 \lstinputlisting[xleftmargin=0.5cm]{../progs/ap0.js} |
585 \medskip\pause |
585 \medskip\pause |
586 |
586 |
587 \small |
587 \small |
588 alternative response:\smallskip\\ |
588 an alternative response:\smallskip\\ |
589 |
589 |
590 |
590 |
591 \lstinline{response.write('<H1>Hello World</H1>');} |
591 \hspace{5mm}\lstinline{response.write('<H1>Hello World</H1>');} |
592 |
592 |
593 \end{frame} |
593 \end{frame} |
594 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
594 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
595 |
595 |
596 |
596 |
652 \end{itemize} |
652 \end{itemize} |
653 \end{textblock}} |
653 \end{textblock}} |
654 |
654 |
655 \only<5>{ |
655 \only<5>{ |
656 \begin{textblock}{11}(1,3) |
656 \begin{textblock}{11}(1,3) |
657 \begin{bubble}[10cm]\small |
657 \begin{bubble}[10.2cm]\small |
658 {\bf Cookie Law:}\smallskip\\ ``In May 2011, a |
658 {\bf Cookie Law:}\smallskip\\ ``In May 2011, a |
659 European Union law was passed stating that websites that leave |
659 European Union law was passed stating that websites that leave |
660 non-essential cookies on visitors' devices have to alert the visitor |
660 non-essential cookies on visitors' devices have to alert the visitor |
661 and get acceptance from them. This law applies to both individuals and |
661 and get acceptance from them. This law applies to both individuals and |
662 businesses based in the EU regardless of the nationality of their |
662 businesses based in the EU regardless of the nationality of their |
663 website's visitors or the location of their web host. It is not enough |
663 website's visitors or the location of their web host. It is not enough |
664 to simply update a website's terms and conditions or privacy |
664 to simply update a website's terms and conditions or privacy |
665 policy. The deadline to comply with the new EU cookie law was 26th May |
665 policy. The deadline to comply with the new EU cookie law was 26th May |
666 2012 and failure to do so could mean a fine of up to |
666 2012 and failure to do so could mean a fine of up to |
667 \pounds{500,000}.'' \hfill\small\textcolor{gray}{$\rightarrow$BBC |
667 \pounds{500,000}.''\\ \mbox{}\hfill\small\textcolor{gray}{$\rightarrow$BBC |
668 News}, \url{www.goo.gl/RI4qhh} |
668 News}, \url{http://www.goo.gl/RI4qhh} |
669 \end{bubble} |
669 \end{bubble} |
670 \end{textblock}} |
670 \end{textblock}} |
671 |
671 |
672 \end{frame} |
672 \end{frame} |
673 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
673 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
867 Ashley Madison containing 31 million passwords, many of them |
867 Ashley Madison containing 31 million passwords, many of them |
868 poorly hashed |
868 poorly hashed |
869 \end{itemize}\medskip |
869 \end{itemize}\medskip |
870 |
870 |
871 \small |
871 \small |
872 (users typically maintain 25 separate accounts but use just 6.5 passwords.) |
872 (users typically maintain 25 separate accounts but use just 6.5 passwords |
873 on average) |
|
873 |
874 |
874 \end{frame}} |
875 \end{frame}} |
875 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
876 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
876 |
877 |
877 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits. |
878 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits. |