slides/slides01.tex
changeset 527 968ff3fb17c6
parent 526 dac7bab6cfea
child 541 5cd1865d45bd
equal deleted inserted replaced
526:dac7bab6cfea 527:968ff3fb17c6
   386 
   386 
   387 \begin{textblock}{1}(11.5,13.7)
   387 \begin{textblock}{1}(11.5,13.7)
   388 \begin{tabular}{l}
   388 \begin{tabular}{l}
   389 \footnotesize on BBC Newsnight\\[-2mm] 
   389 \footnotesize on BBC Newsnight\\[-2mm] 
   390 \footnotesize in 2010 or 
   390 \footnotesize in 2010 or 
   391 \href{http://www.youtube.com/watch?v=JPAX32lgkrw}{youtube}
   391 \href{https://www.youtube.com/watch?v=Ks0SOn8hjG8}{youtube}
   392 \end{tabular}
   392 \end{tabular}
   393 \end{textblock}
   393 \end{textblock}
   394   
   394   
   395 \end{frame}
   395 \end{frame}
   396 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   396 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   502 not liable for any damage, because the code is physically
   502 not liable for any damage, because the code is physically
   503 printed and could have been stolen while you paid with your
   503 printed and could have been stolen while you paid with your
   504 card at a store. Same applies if someone cloned your CC
   504 card at a store. Same applies if someone cloned your CC
   505 reading the magnetic stripe or sniffing RFID. Only losing your
   505 reading the magnetic stripe or sniffing RFID. Only losing your
   506 VBV or MCSC password can cause serious trouble.''\\
   506 VBV or MCSC password can cause serious trouble.''\\
   507 \hfill{}\url{www.goo.gl/UWluh0}
   507 \hfill{}\url{https://news.ycombinator.com/item?id=3960034}
   508 \end{bubble}
   508 \end{bubble}
   509 
   509 
   510 \end{frame}
   510 \end{frame}
   511 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
   511 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
   512 
   512 
   579 \frametitle{JavaScript + Node.js}
   579 \frametitle{JavaScript + Node.js}
   580 
   580 
   581 A simple response from the server:
   581 A simple response from the server:
   582 
   582 
   583 \small
   583 \small
   584 \lstinputlisting{../progs/ap0.js}
   584 \lstinputlisting[xleftmargin=0.5cm]{../progs/ap0.js}
   585 \medskip\pause
   585 \medskip\pause
   586 
   586 
   587 \small
   587 \small
   588 alternative response:\smallskip\\
   588 an alternative response:\smallskip\\
   589 
   589 
   590 
   590 
   591 \lstinline{response.write('<H1>Hello World</H1>');}
   591 \hspace{5mm}\lstinline{response.write('<H1>Hello World</H1>');}
   592 
   592 
   593 \end{frame}
   593 \end{frame}
   594 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   594 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   595 
   595 
   596 
   596 
   652 \end{itemize}  
   652 \end{itemize}  
   653 \end{textblock}}
   653 \end{textblock}}
   654 
   654 
   655 \only<5>{
   655 \only<5>{
   656 \begin{textblock}{11}(1,3)
   656 \begin{textblock}{11}(1,3)
   657 \begin{bubble}[10cm]\small
   657 \begin{bubble}[10.2cm]\small
   658 {\bf Cookie Law:}\smallskip\\ ``In May 2011, a
   658 {\bf Cookie Law:}\smallskip\\ ``In May 2011, a
   659 European Union law was passed stating that websites that leave
   659 European Union law was passed stating that websites that leave
   660 non-essential cookies on visitors' devices have to alert the visitor
   660 non-essential cookies on visitors' devices have to alert the visitor
   661 and get acceptance from them. This law applies to both individuals and
   661 and get acceptance from them. This law applies to both individuals and
   662 businesses based in the EU regardless of the nationality of their
   662 businesses based in the EU regardless of the nationality of their
   663 website's visitors or the location of their web host. It is not enough
   663 website's visitors or the location of their web host. It is not enough
   664 to simply update a website's terms and conditions or privacy
   664 to simply update a website's terms and conditions or privacy
   665 policy. The deadline to comply with the new EU cookie law was 26th May
   665 policy. The deadline to comply with the new EU cookie law was 26th May
   666 2012 and failure to do so could mean a fine of up to
   666 2012 and failure to do so could mean a fine of up to
   667 \pounds{500,000}.''  \hfill\small\textcolor{gray}{$\rightarrow$BBC
   667 \pounds{500,000}.''\\ \mbox{}\hfill\small\textcolor{gray}{$\rightarrow$BBC
   668   News}, \url{www.goo.gl/RI4qhh}
   668   News}, \url{http://www.goo.gl/RI4qhh}
   669 \end{bubble}
   669 \end{bubble}
   670 \end{textblock}}
   670 \end{textblock}}
   671   
   671   
   672 \end{frame}
   672 \end{frame}
   673 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   673 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   867 Ashley Madison containing 31 million passwords, many of them 
   867 Ashley Madison containing 31 million passwords, many of them 
   868 poorly hashed
   868 poorly hashed
   869 \end{itemize}\medskip
   869 \end{itemize}\medskip
   870 
   870 
   871 \small
   871 \small
   872 (users typically maintain 25 separate accounts but use just 6.5 passwords.)
   872 (users typically maintain 25 separate accounts but use just 6.5 passwords
       
   873 on average)
   873 
   874 
   874 \end{frame}}
   875 \end{frame}}
   875 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   876 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   876 
   877 
   877 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits.
   878 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits.