SlideShare ist ein Scribd-Unternehmen logo
1 von 168
Downloaden Sie, um offline zu lesen
URL to HTML
a minute in the life of a webpage
François Marier @fmarier mozilla
mozilla newmarket
8 engineers
8 engineers
1 designer
8 engineers
1 designer
1 manager
video & media
marketplace
cloud services
crash investigation
video & media
marketplace
cloud services
crash investigation
video & media
marketplace
cloud services
crash investigation
video & media
marketplace
cloud services
crash investigation
> 1,000 employees world-wide
</ >
1. Learn HTML
2. ?
3. Profit !
abstractions
asbtraction
construct used to understand a
complicated topic at a high level
asbtraction
extra layer added to avoid writing
the same code over and over
drawSquare()
drawLine()
drawLine()
drawLine()
drawLine()
drawSquare()
if you don't understand the
layers below, you won't know what
to do when the abstraction breaks
mastery
requires a high-level understanding
of the rest of the stack
web performance
web performance
how bytes make it to the user
web performance
how bytes make it to the user
how the browser renders the page
URL
DNS
IP
TCP
HTTP / TLS
HTML
URL
DNS
IP
TCP
HTTP / TLS
HTML
URL
uniform ressource locator
http://www.example.com
http://www.example.com
http://www.example.com
/articles/
http://www.example.com
/articles/tutorial.cgi
http://www.example.com
/articles/tutorial.cgi
?showsolutions=0&topic=web
http://www.example.com
/articles/tutorial.cgi
?showsolutions=0&topic=web
#part5
http://www.example.com:80
/articles/tutorial.cgi
?showsolutions=0&topic=web
#part5
http://username:password@
www.example.com:80
/articles/tutorial.cgi
?showsolutions=0&topic=web
#part5
DNS
domain name system
$ cat /etc/resolv.conf
nameserver 208.67.222.222
nameserver 208.67.220.220
www.cs.auckland.ac.nz
www.cs.auckland.ac.nz
130.216.158.22
$ dig nz NS @199.7.83.42
$ dig nz NS @199.7.83.42
; <<>> DiG 9.8.1-P1 <<>> nz NS @199.7.83.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 412
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADD
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;nz. IN NS
;; AUTHORITY SECTION:
nz. 172800 IN NS ns1.dns.net.nz.
nz. 172800 IN NS ns2.dns.net.nz.
nz. 172800 IN NS ns3.dns.net.nz.
nz. 172800 IN NS ns4.dns.net.nz.
nz. 172800 IN NS ns5.dns.net.nz.
nz. 172800 IN NS ns6.dns.net.nz.
nz. 172800 IN NS ns7.dns.net.nz.
$ dig ac.nz NS @ns1.dns.net.nz
$ dig ac.nz NS @ns1.dns.net.nz
; <<>> DiG 9.8.1-P1 <<>> ac.nz NS @ns1.dns.net.nz
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 391
;; flags: qr aa rd; QUERY: 1, ANSWER: 7, AUTHORITY: 0,
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;ac.nz. IN NS
;; ANSWER SECTION:
ac.nz. 86400IN NS ns7.dns.net.nz.
ac.nz. 86400IN NS ns4.dns.net.nz.
ac.nz. 86400IN NS ns2.dns.net.nz.
ac.nz. 86400IN NS ns1.dns.net.nz.
ac.nz. 86400IN NS ns6.dns.net.nz.
ac.nz. 86400IN NS ns3.dns.net.nz.
ac.nz. 86400IN NS ns5.dns.net.nz.
$ dig auckland.ac.nz NS @ns1.dns.net.nz
$ dig auckland.ac.nz NS @ns1.dns.net.nz
; <<>> DiG 9.8.1-P1 <<>> auckland.ac.nz NS @ns1.dns.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 598
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADD
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;auckland.ac.nz. IN NS
;; AUTHORITY SECTION:
auckland.ac.nz. 86400IN NS pubsec.domainz.net.nz.
auckland.ac.nz. 86400IN NS dns1.auckland.ac.nz.
auckland.ac.nz. 86400IN NS dns2.auckland.ac.nz.
;; ADDITIONAL SECTION:
dns1.auckland.ac.nz.86400IN A 130.216.1.2
dns2.auckland.ac.nz.86400IN A 130.216.1.1
$ dig cs.auckland.ac.nz NS @dns1.auckland.ac.nz
$ dig cs.auckland.ac.nz NS @dns1.auckland.ac.nz
; <<>> DiG 9.8.1-P1 <<>> cs.auckland.ac.nz NS @dns1.auc
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 485
;; flags: qr aa rd; QUERY: 1, ANSWER: 4, AUTHORITY: 0,
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;cs.auckland.ac.nz. IN NS
;; ANSWER SECTION:
cs.auckland.ac.nz. 10800 IN NS dns2.auckland.ac.nz.
cs.auckland.ac.nz. 10800 IN NS kronos2.cs.auckland.ac.n
cs.auckland.ac.nz. 10800 IN NS dns1.auckland.ac.nz.
cs.auckland.ac.nz. 10800 IN NS kronos1.cs.auckland.ac.n
;; ADDITIONAL SECTION:
dns1.auckland.ac.nz.1800 IN A 130.216.1.2
$ dig www.cs.auckland.ac.nz @kronos1.cs.auckland.ac.nz
$ dig www.cs.auckland.ac.nz @kronos1.cs.auckland.ac.nz
; <<>> DiG 9.8.1-P1 <<>> www.cs.auckland.ac.nz A @krono
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 175
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4,
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;www.cs.auckland.ac.nz. IN A
;; ANSWER SECTION:
www.cs.auckland.ac.nz. 10800 IN A 130.216.158.22
;; AUTHORITY SECTION:
cs.auckland.ac.nz. 10800IN NS kronos2.cs.auckland.ac.nz
cs.auckland.ac.nz. 10800IN NS dns2.auckland.ac.nz.
cs.auckland.ac.nz. 10800IN NS dns1.auckland.ac.nz.
cs.auckland.ac.nz. 10800IN NS kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
l.root-servers.net
ns1.dns.net.nz
ns1.dns.net.nz
dns1.auckland.ac.nz
kronos1.cs.auckland.ac.nz
IP
internet protocol
www.bbc.co.uk
212.58.246.94
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
$ mtr 212.58.246.94
1. 192.168.1.1
2. llu.bng1.tvc.orcon.net.nz
3. xe-3-3-0.cre1.sky.orcon.net.nz
4. 121.98.9.137
5. ae1-0.cre2.nct.odyssey.net.nz
6. ORCON-INTER.bar1.SanFrancisco1.Level3.net
7. xe-5-0-0.bar1.SanFrancisco1.Level3.net
8. ae-0-11.bar2.SanFrancisco1.Level3.net
9. ae-6-6.ebr2.SanJose1.Level3.net
10. ae-62-62.csw1.SanJose1.Level3.net
11. ae-61-61.ebr1.SanJose1.Level3.net
12. ae-2-2.ebr2.NewYork1.Level3.net
13. ae-62-62.csw1.NewYork1.Level3.net
14. ae-61-61.ebr1.NewYork1.Level3.net
15. ae-43-43.ebr2.London1.Level3.net
16. ae-57-222.csw2.London1.Level3.net
17. ae-229-3605.edge4.London1.Level3.net
18. BBC-TECHNOL.edge4.London1.Level3.net
19. ???
20. ???
21. ae0.er01.cwwtf.bbc.co.uk
22. 132.185.255.165
23. bbc-vip015.cwwtf.bbc.co.uk
130.216.158.22
212.58.246.94
130.216.158.22
212.58.246.94
router drops packets
packets arrive in wrong order
130.216.158.22
212.58.246.94
router drops packets
cable is cut
packets arrive in wrong order
130.216.158.22
212.58.246.94
router drops packets
cable is cut
packets arrive in wrong order
ideal network actual network
TCP
transmission control protocol
guarantees in-order
delivery of packets
abstraction of a reliable point-to-point
connection with built-in re-try logic
applications have a lot
less errors to deal with
UDP
user datagram protocol
TCP UDP
reminder: abstractions are leaky
3-way handshake
establishing a new connection
hi
how are you?
good, you?
client server
client
SYN
x=42
server
client
SYN
x=42
SYN+ACK
y=10,x=43
server
client
SYN
x=42
SYN+ACK
y=10,x=43
ACK
y=11
server
HTTP
hypertext transfer protocol
http://www.example.com
http://www.example.com
clear text protocol
client
request
server
client
request
response
server
Host: www.example.com
User-Agent: Mozilla/5.0 (rv:29.0) Firefox/29.0
DNT: 1
Host: www.example.com
User-Agent: Mozilla/5.0 (rv:29.0) Firefox/29.0
DNT: 1
<request body goes in here>
Content-Type: text/html
Date: Thu, 22 May 2014 05:34:47 GMT
Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT
Content-Length: 1270
<!doctype html>
<html>
<head>
<title>Example Domain</title>
</head>
<body>
<div>
<h1>Example Domain</h1>
<p>This domain is established to be used for
domain in examples without prior coordination
</div>
</body>
</html>
200 OK
404 Not Found
$ curl http://www.example.com
<!doctype html>
<html>
<head>
<title>Example Domain</title>
</head>
<body>
<div>
<h1>Example Domain</h1>
<p>This domain is established to be used for
domain in examples without prior coordinatio
</div>
</body>
</html>
$ curl --head http://www.example.com
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=604800
Content-Type: text/html
Date: Thu, 22 May 2014 05:42:26 GMT
Etag: "359670651"
Expires: Thu, 29 May 2014 05:42:26 GMT
Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT
Server: ECS (cpm/F858)
X-Cache: HIT
x-ec-custom-error: 1
Content-Length: 1270
verbs
(fancy word for commands)
GET
POST
GET /article/43228
GET /article/43228
GET /article/43228
GET /article/43228
POST /article/delete/last
GET /article/43228
POST /article/delete/last
POST /article/delete/last
GET /article/43228
POST /item/20/buy
POST /item/20/buy
$$$
$$$
TLS
transport layer security
SSL
secure sockets layer
HTTPS
hypertext transfer protocol secure
secure
(sometimes)
client server
(pk, sk)
client
hello!
server
(pk, sk)
client
hello!
hello!
pubkey
server
(pk, sk)
client
hello!
hello!
pubkey
server
(pk, sk)
session key
client
hello!
hello!
pubkey
i'm done!encryptpk
(session key)
server
(pk, sk)
session key
client
hello!
hello!
pubkey
i'm done!encryptpk
(session key)
server
(pk, sk)
session key
session key
man-in-the-middle
client server
(pk, sk)
client server
(pk, sk)
NSA
(pk, sk)
client
hello!
server
(pk, sk)
NSA
(pk, sk)
client
hello!
server
(pk, sk)
NSA
(pk, sk)
hello!
client
hello!
hello!
pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
client
hello!
hello!
pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
hello!
pubkey
client
hello!
hello!
pubkey
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
key
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
i'm done!encrypt(key)key
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
i'm done!encrypt(key)key
key
client
hello!
hello!
pubkey
i'm done!encrypt(key)
server
(pk, sk)
key
NSA
(pk, sk)
hello!
hello!
pubkey
i'm done!encrypt(key)key
key
authentication
(of the server)
client
hello!
hello!
pubkey
server
(pk, sk)
session key
client
hello!
hello!
signed pubkey
server
(pk, sk)
session key
verify
signature
client
hello!
hello!
signed pubkey
server
(pk, sk)
session key
verify
signature
i'm done!encryptpk
(session key)
session key
client
hello!
hello!
signed pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
hello!
signed pubkeykey
client
hello!
hello!
signed pubkey
server
(pk, sk)
NSA
(pk, sk)
hello!
hello!
signed pubkeykey
abort!
how can you tell you're
talking to the right person?
(and not to the NSA)
trusted third-party
certificate authority
trusted third-party
certificate authority
EFF has found
more than
650
certificate
authorities
in the wild
*.google.com
*.google.com
*.google.com
*.google.com 7 different domains
*.google.com 7 different domains
$100
$1,000
$100
$1,000$1,000
$100
HTML
hypertext markup language
parsing
.png
.jpg .js .css
resolve all hostnames
establish TCP connections
negotiate TLS session
URL
DNS
IP
TCP
HTTP / TLS
HTML
@fmarier francois@mozilla.com
questions?
Copyright © 2014 Francois Marier <francois@mozilla.com>
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
leaky pipe: https://www.flickr.com/photos/ifl/3920636654
leaky pipe with elephant: https://www.flickr.com/photos/rcrhee/10785374875
sky tower: https://www.flickr.com/photos/elisfanclub/6120863439
golden gate: https://www.flickr.com/photos/jeffgunn/6663212147
san jose: https://www.flickr.com/photos/the_tahoe_guy/3183673224
statue of liberty: https://www.flickr.com/photos/suewaters/7574642942
big ben: https://www.flickr.com/photos/timmorris/3103896345
bbc house: https://www.flickr.com/photos/redvers/532073098
fingers crossed: https://www.flickr.com/photos/bearpark/6861722073
prince charles : http://en.wikipedia.org/wiki/File:Prince_Charles_2012.jpg
southern cross cable: https://en.wikipedia.org/wiki/File:Southern_Cross_Cable_route.svg
image credits

Weitere ähnliche Inhalte

Was ist angesagt?

Java script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers GroupJava script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers GroupAdam Caudill
 
Mitigating CSRF with two lines of codes
Mitigating CSRF with two lines of codesMitigating CSRF with two lines of codes
Mitigating CSRF with two lines of codesMinhaz A V
 
Javascript Security
Javascript SecurityJavascript Security
Javascript Securityjgrahamc
 
Honing headers for highly hardened highspeed hypertext
Honing headers for highly hardened highspeed hypertextHoning headers for highly hardened highspeed hypertext
Honing headers for highly hardened highspeed hypertextFastly
 
JS Fest 2019. Andrew Betts. Headers for hackers
JS Fest 2019. Andrew Betts. Headers for hackersJS Fest 2019. Andrew Betts. Headers for hackers
JS Fest 2019. Andrew Betts. Headers for hackersJSFestUA
 
Mitigate Maliciousness -- jQuery Europe 2013
Mitigate Maliciousness -- jQuery Europe 2013Mitigate Maliciousness -- jQuery Europe 2013
Mitigate Maliciousness -- jQuery Europe 2013Mike West
 
Two scoops of Django - Security Best Practices
Two scoops of Django - Security Best PracticesTwo scoops of Django - Security Best Practices
Two scoops of Django - Security Best PracticesSpin Lai
 
Practical django secuirty
Practical django secuirtyPractical django secuirty
Practical django secuirtyAndy Dai
 
Django Web Application Security
Django Web Application SecurityDjango Web Application Security
Django Web Application Securitylevigross
 
Client-side JavaScript Vulnerabilities
Client-side JavaScript VulnerabilitiesClient-side JavaScript Vulnerabilities
Client-side JavaScript VulnerabilitiesOry Segal
 
HTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC EditionHTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC EditionXavier Mertens
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Jeremiah Grossman
 
Tecnologias Open Source para Alta Disponibilidade e Segurança de Aplicações Web
Tecnologias Open Source para  Alta Disponibilidade e Segurança de Aplicações WebTecnologias Open Source para  Alta Disponibilidade e Segurança de Aplicações Web
Tecnologias Open Source para Alta Disponibilidade e Segurança de Aplicações WebAlexandro Silva
 
Configuring SSL on NGNINX and less tricky servers
Configuring SSL on NGNINX and less tricky serversConfiguring SSL on NGNINX and less tricky servers
Configuring SSL on NGNINX and less tricky serversAxilis
 
Content Security Policy
Content Security PolicyContent Security Policy
Content Security PolicyRyan LaBouve
 
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
 Ghost in the Browser: Broad-Scale Espionage with Bitsquatting Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Ghost in the Browser: Broad-Scale Espionage with BitsquattingBishop Fox
 
HTTP Security Headers Every Java Developer Must Know
HTTP Security Headers Every Java Developer Must KnowHTTP Security Headers Every Java Developer Must Know
HTTP Security Headers Every Java Developer Must KnowAyoma Wijethunga
 
Modern Web Application Defense
Modern Web Application DefenseModern Web Application Defense
Modern Web Application DefenseFrank Kim
 

Was ist angesagt? (20)

Java script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers GroupJava script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers Group
 
Mitigating CSRF with two lines of codes
Mitigating CSRF with two lines of codesMitigating CSRF with two lines of codes
Mitigating CSRF with two lines of codes
 
Javascript Security
Javascript SecurityJavascript Security
Javascript Security
 
Honing headers for highly hardened highspeed hypertext
Honing headers for highly hardened highspeed hypertextHoning headers for highly hardened highspeed hypertext
Honing headers for highly hardened highspeed hypertext
 
JS Fest 2019. Andrew Betts. Headers for hackers
JS Fest 2019. Andrew Betts. Headers for hackersJS Fest 2019. Andrew Betts. Headers for hackers
JS Fest 2019. Andrew Betts. Headers for hackers
 
Mitigate Maliciousness -- jQuery Europe 2013
Mitigate Maliciousness -- jQuery Europe 2013Mitigate Maliciousness -- jQuery Europe 2013
Mitigate Maliciousness -- jQuery Europe 2013
 
Two scoops of Django - Security Best Practices
Two scoops of Django - Security Best PracticesTwo scoops of Django - Security Best Practices
Two scoops of Django - Security Best Practices
 
Practical django secuirty
Practical django secuirtyPractical django secuirty
Practical django secuirty
 
Bünyamin Demir - Secure YourApp
Bünyamin Demir - Secure YourAppBünyamin Demir - Secure YourApp
Bünyamin Demir - Secure YourApp
 
Django Web Application Security
Django Web Application SecurityDjango Web Application Security
Django Web Application Security
 
Client-side JavaScript Vulnerabilities
Client-side JavaScript VulnerabilitiesClient-side JavaScript Vulnerabilities
Client-side JavaScript Vulnerabilities
 
HTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC EditionHTTP For the Good or the Bad - FSEC Edition
HTTP For the Good or the Bad - FSEC Edition
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
 
Tecnologias Open Source para Alta Disponibilidade e Segurança de Aplicações Web
Tecnologias Open Source para  Alta Disponibilidade e Segurança de Aplicações WebTecnologias Open Source para  Alta Disponibilidade e Segurança de Aplicações Web
Tecnologias Open Source para Alta Disponibilidade e Segurança de Aplicações Web
 
Bünyamin Demir - 10 Adımda Yazılım Güvenliği
Bünyamin Demir - 10 Adımda Yazılım GüvenliğiBünyamin Demir - 10 Adımda Yazılım Güvenliği
Bünyamin Demir - 10 Adımda Yazılım Güvenliği
 
Configuring SSL on NGNINX and less tricky servers
Configuring SSL on NGNINX and less tricky serversConfiguring SSL on NGNINX and less tricky servers
Configuring SSL on NGNINX and less tricky servers
 
Content Security Policy
Content Security PolicyContent Security Policy
Content Security Policy
 
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
 Ghost in the Browser: Broad-Scale Espionage with Bitsquatting Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
 
HTTP Security Headers Every Java Developer Must Know
HTTP Security Headers Every Java Developer Must KnowHTTP Security Headers Every Java Developer Must Know
HTTP Security Headers Every Java Developer Must Know
 
Modern Web Application Defense
Modern Web Application DefenseModern Web Application Defense
Modern Web Application Defense
 

Andere mochten auch

Mho Web Dynpro Abap
Mho Web Dynpro AbapMho Web Dynpro Abap
Mho Web Dynpro Abapthomas_jung
 
LeverX ABAP Tutorial - HTTP Request Handler Creation
LeverX ABAP Tutorial - HTTP Request Handler CreationLeverX ABAP Tutorial - HTTP Request Handler Creation
LeverX ABAP Tutorial - HTTP Request Handler CreationLeverX
 
Thinh Hoang Resume
Thinh Hoang Resume Thinh Hoang Resume
Thinh Hoang Resume Thinh Hoang
 
Lecture14 abap on line
Lecture14 abap on lineLecture14 abap on line
Lecture14 abap on lineMilind Patil
 
Automate user creation using sap gui scripting
Automate user creation using sap gui scriptingAutomate user creation using sap gui scripting
Automate user creation using sap gui scriptingsparten369
 
Creating mass users using e_catt
Creating mass users using e_cattCreating mass users using e_catt
Creating mass users using e_cattsparten369
 

Andere mochten auch (6)

Mho Web Dynpro Abap
Mho Web Dynpro AbapMho Web Dynpro Abap
Mho Web Dynpro Abap
 
LeverX ABAP Tutorial - HTTP Request Handler Creation
LeverX ABAP Tutorial - HTTP Request Handler CreationLeverX ABAP Tutorial - HTTP Request Handler Creation
LeverX ABAP Tutorial - HTTP Request Handler Creation
 
Thinh Hoang Resume
Thinh Hoang Resume Thinh Hoang Resume
Thinh Hoang Resume
 
Lecture14 abap on line
Lecture14 abap on lineLecture14 abap on line
Lecture14 abap on line
 
Automate user creation using sap gui scripting
Automate user creation using sap gui scriptingAutomate user creation using sap gui scripting
Automate user creation using sap gui scripting
 
Creating mass users using e_catt
Creating mass users using e_cattCreating mass users using e_catt
Creating mass users using e_catt
 

Ähnlich wie URL to HTML

Drupalcon2007 Sun
Drupalcon2007 SunDrupalcon2007 Sun
Drupalcon2007 Sunsmattoon
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the InternetRIPE NCC
 
Kubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe BarcelonaKubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe BarcelonaHenning Jacobs
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...Jisc
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivAleksey Asiutin
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNIJisc
 
Smart networking with service meshes
Smart networking with service meshes  Smart networking with service meshes
Smart networking with service meshes Mitchell Pronschinske
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slideskj teoh
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey GordeychikCODE BLUE
 
Data Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10gData Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10gIbrahim Malek
 
TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所Kyohei Moriyama
 
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...Nagios
 
Keep it simple web development stack
Keep it simple web development stackKeep it simple web development stack
Keep it simple web development stackEric Ahn
 
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程Jimmy Chang
 
Practical Operation Automation with StackStorm
Practical Operation Automation with StackStormPractical Operation Automation with StackStorm
Practical Operation Automation with StackStormShu Sugimoto
 
Issuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultIssuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultOlinData
 

Ähnlich wie URL to HTML (20)

URL to HTML
URL to HTMLURL to HTML
URL to HTML
 
Drupalcon2007 Sun
Drupalcon2007 SunDrupalcon2007 Sun
Drupalcon2007 Sun
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the Internet
 
Kubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe BarcelonaKubernetes Failure Stories - KubeCon Europe Barcelona
Kubernetes Failure Stories - KubeCon Europe Barcelona
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Long live to CMAN!
Long live to CMAN!Long live to CMAN!
Long live to CMAN!
 
DoH, DoT and ESNI
DoH, DoT and ESNIDoH, DoT and ESNI
DoH, DoT and ESNI
 
Smart networking with service meshes
Smart networking with service meshes  Smart networking with service meshes
Smart networking with service meshes
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slides
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
 
Data Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10gData Guard on EBS R12 DB 10g
Data Guard on EBS R12 DB 10g
 
(Re)discover your AEM
(Re)discover your AEM(Re)discover your AEM
(Re)discover your AEM
 
TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所TerraformとAzureを組み合わせて使うときの勘所
TerraformとAzureを組み合わせて使うときの勘所
 
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
Nagios Conference 2013 - Troy Lea - Leveraging and Understanding Performance ...
 
Keep it simple web development stack
Keep it simple web development stackKeep it simple web development stack
Keep it simple web development stack
 
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
[文件] 華創造型SERVER安裝過程記錄 -V6R2016X 安裝流程
 
Practical Operation Automation with StackStorm
Practical Operation Automation with StackStormPractical Operation Automation with StackStorm
Practical Operation Automation with StackStorm
 
Issuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultIssuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vault
 

Mehr von Francois Marier

Security and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power UsersSecurity and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power UsersFrancois Marier
 
Getting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your WebappGetting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your WebappFrancois Marier
 
Hardening Firefox for Security and Privacy
Hardening Firefox for Security and PrivacyHardening Firefox for Security and Privacy
Hardening Firefox for Security and PrivacyFrancois Marier
 
Privacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxPrivacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxFrancois Marier
 
Supporting Debian machines for friends and family
Supporting Debian machines for friends and familySupporting Debian machines for friends and family
Supporting Debian machines for friends and familyFrancois Marier
 
Outsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to DebianOutsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to DebianFrancois Marier
 
Easy logins for Ruby web applications
Easy logins for Ruby web applicationsEasy logins for Ruby web applications
Easy logins for Ruby web applicationsFrancois Marier
 
Easy logins for JavaScript web applications
Easy logins for JavaScript web applicationsEasy logins for JavaScript web applications
Easy logins for JavaScript web applicationsFrancois Marier
 
You're still using passwords on your site?
You're still using passwords on your site?You're still using passwords on your site?
You're still using passwords on your site?Francois Marier
 
Killing Passwords with JavaScript
Killing Passwords with JavaScriptKilling Passwords with JavaScript
Killing Passwords with JavaScriptFrancois Marier
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwordsFrancois Marier
 
Easy logins for PHP web applications
Easy logins for PHP web applicationsEasy logins for PHP web applications
Easy logins for PHP web applicationsFrancois Marier
 
Persona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebPersona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebFrancois Marier
 
Taking the pain out of signing users in
Taking the pain out of signing users inTaking the pain out of signing users in
Taking the pain out of signing users inFrancois Marier
 
Mozilla Persona for your domain
Mozilla Persona for your domainMozilla Persona for your domain
Mozilla Persona for your domainFrancois Marier
 
Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?Francois Marier
 
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...Francois Marier
 
The problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about itThe problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about itFrancois Marier
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwordsFrancois Marier
 
Persona: un système d'identité pour le Web
Persona: un système d'identité pour le WebPersona: un système d'identité pour le Web
Persona: un système d'identité pour le WebFrancois Marier
 

Mehr von Francois Marier (20)

Security and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power UsersSecurity and Privacy settings for Firefox Power Users
Security and Privacy settings for Firefox Power Users
 
Getting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your WebappGetting Browsers to Improve the Security of Your Webapp
Getting Browsers to Improve the Security of Your Webapp
 
Hardening Firefox for Security and Privacy
Hardening Firefox for Security and PrivacyHardening Firefox for Security and Privacy
Hardening Firefox for Security and Privacy
 
Privacy and Tracking Protection in Firefox
Privacy and Tracking Protection in FirefoxPrivacy and Tracking Protection in Firefox
Privacy and Tracking Protection in Firefox
 
Supporting Debian machines for friends and family
Supporting Debian machines for friends and familySupporting Debian machines for friends and family
Supporting Debian machines for friends and family
 
Outsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to DebianOutsourcing your webapp maintenance to Debian
Outsourcing your webapp maintenance to Debian
 
Easy logins for Ruby web applications
Easy logins for Ruby web applicationsEasy logins for Ruby web applications
Easy logins for Ruby web applications
 
Easy logins for JavaScript web applications
Easy logins for JavaScript web applicationsEasy logins for JavaScript web applications
Easy logins for JavaScript web applications
 
You're still using passwords on your site?
You're still using passwords on your site?You're still using passwords on your site?
You're still using passwords on your site?
 
Killing Passwords with JavaScript
Killing Passwords with JavaScriptKilling Passwords with JavaScript
Killing Passwords with JavaScript
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwords
 
Easy logins for PHP web applications
Easy logins for PHP web applicationsEasy logins for PHP web applications
Easy logins for PHP web applications
 
Persona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole WebPersona: a federated and privacy-protecting login system for the whole Web
Persona: a federated and privacy-protecting login system for the whole Web
 
Taking the pain out of signing users in
Taking the pain out of signing users inTaking the pain out of signing users in
Taking the pain out of signing users in
 
Mozilla Persona for your domain
Mozilla Persona for your domainMozilla Persona for your domain
Mozilla Persona for your domain
 
Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?Passwords and freedom: can we lose the former and retain the latter?
Passwords and freedom: can we lose the former and retain the latter?
 
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
Login de usuários: podemos fazer algo melhor que usar senhas ou serviços cent...
 
The problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about itThe problem with passwords on the web and what to do about it
The problem with passwords on the web and what to do about it
 
Securing the Web without site-specific passwords
Securing the Web without site-specific passwordsSecuring the Web without site-specific passwords
Securing the Web without site-specific passwords
 
Persona: un système d'identité pour le Web
Persona: un système d'identité pour le WebPersona: un système d'identité pour le Web
Persona: un système d'identité pour le Web
 

Kürzlich hochgeladen

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 

Kürzlich hochgeladen (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 

URL to HTML