SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Web Security System




                     Website Security Systems




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 1
Web Security System


                         Website Security Systems

       • Website Security Systems is very important for
         a webmaster.
       • If a webmaster to ignore the security aspect of
         a website, the website will be very vulnerable
         to attacks from a hacker.
       • To strengthen the web of security in terms of
         knowledge about web security systems
         needed to be overcome.
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 2
Web Security System


                                                 Web hacking
       • Web hacking is usually done through port 80.
         Because the website using port 80. The
         attacks are usually carried out are:
          • Deface Site
          • SQL Injection
          • Remote File Inclusion (RFI)
          • Local File Inclusion (LFI)
          • Cross Site Scripting (XSS)
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 3
Web Security System


                                                   Deface Site
       • Deface is an activity to change the front page
         (index) or the content of a Web site or its
         contents so that the view in accordance with
         the desired.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 4
Web Security System


         The techniques of web site Deface
       • Generally the amount of deface can be done
         in 3 ways:
          1. Generally speaking, Enter Illegal Input.
             The aim is that the user was thrown out of
             the directory files and go to the web server
             root directory and then run the cmd.exe
             and observing the structure of the target
             directory on the NT server.
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 5
Web Security System


         The techniques of web site Deface
       2. With TFTP (Trivial File Transfer Protocol) is a
          UDP based protocol which listen on ports 69
          and is very susceptible safety and most web
          servers running this TFTP service.
       3. With the FTP with a web that has been filled
          deface materials. Each NT server has ftp.exe
          file upload to FTP or FTP downloads.


Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 6
Web Security System


                                                           Netcat
       • Netcat allows you to form their own port
         filter that allows file transfers without using
         FTP. Furthermore, netcat can be used to avoid
         the port filters on most firewalls, spoofing IP
         address, to conduct session hijacking.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 7
Web Security System


              Securing IIS Server from Deface
       • Always updating with the latest service packs and
         the latest hotfix.
       • Protect with a firewall and IDS (Intrusion Detection
         System).
       • Eliminating Options Write on the HTTP protocol
         (HTTP 1.0 and HTTP 1.1).
         • Commands supported are:
         CONNECT*, DELETE*, GET, HEAD, OPTIONS, POST,
         PUT, TRACE
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 8
Web Security System


                                               SQL Injection
       • SQL injection attack is one attack to reach
         access to the database system based on
         Microsoft SQL Server.
       • These techniques take advantage of
         weaknesses in the programming language in
         SQL scripting in processing a database system
         that allows someone without an account can
         enter and pass the verification of the MS SQL
         Server.
Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 9
Web Security System


                                               SQL Injection
       For handling this case is set to:
       • Only certain characters may be inputted.
       • If the illegal character is detected,
         immediately rejected the request.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 10
Web Security System


                       Remote File Inclusion (RFI)
       • Methods that exploit the weaknesses of PHP
         scripts include (), include_once (), Require (),
         require_once () the variable is not declared
         properly.
       • With RFI an attacker can either include a file
         that is located outside the respective servers.



Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 11
Web Security System


                             Local File Inclusion (LFI)
       • Methods that exploit the weaknesses of PHP
         scripts include (), include_once (), Require (),
         require_once () the variable is not declared
         properly.
       • With LFI an attacker can either include a file
         that is located on the server concerned.



Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 12
Web Security System


                           Cross Site Scripting (XSS)
       • XSS also known as the CSS is an acronym for
         Cross Site Scripting.
       • XSS is a method to insert HTML or script code
         into a website that is run through a browser
         on the client.




Copyright © 2009-Present Mobile88.com. All Rights Reserved.
Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected.   Slide 13

Weitere ähnliche Inhalte

Ähnlich wie Website security systems

Ähnlich wie Website security systems (20)

Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
Denis Baranov - Root via XSS
Denis Baranov - Root via XSSDenis Baranov - Root via XSS
Denis Baranov - Root via XSS
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 

Mehr von Mobile88 (6)

Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and future
 
Domain name server
Domain name serverDomain name server
Domain name server
 
Tips for a better success of e commerce
Tips for a better success of e commerceTips for a better success of e commerce
Tips for a better success of e commerce
 
Tips On Attracting Bulk Traffics into your website
Tips On Attracting Bulk Traffics into your websiteTips On Attracting Bulk Traffics into your website
Tips On Attracting Bulk Traffics into your website
 
UK Online Fraud Report 2010
UK Online Fraud Report 2010 UK Online Fraud Report 2010
UK Online Fraud Report 2010
 
Mobile88 Weekly IT Talks
Mobile88 Weekly IT TalksMobile88 Weekly IT Talks
Mobile88 Weekly IT Talks
 

Kürzlich hochgeladen

How to Build a Simple Shopify Website
How to Build a Simple Shopify WebsiteHow to Build a Simple Shopify Website
How to Build a Simple Shopify Website
mark11275
 
➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men 🔝dehradun🔝 Escor...
➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men  🔝dehradun🔝   Escor...➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men  🔝dehradun🔝   Escor...
➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men 🔝dehradun🔝 Escor...
amitlee9823
 
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
amitlee9823
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
gajnagarg
 
Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...
Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...
Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...
nirzagarg
 

Kürzlich hochgeladen (20)

How to Build a Simple Shopify Website
How to Build a Simple Shopify WebsiteHow to Build a Simple Shopify Website
How to Build a Simple Shopify Website
 
Q4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationQ4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentation
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men 🔝dehradun🔝 Escor...
➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men  🔝dehradun🔝   Escor...➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men  🔝dehradun🔝   Escor...
➥🔝 7737669865 🔝▻ dehradun Call-girls in Women Seeking Men 🔝dehradun🔝 Escor...
 
Lecture 01 Introduction To Multimedia.pptx
Lecture 01 Introduction To Multimedia.pptxLecture 01 Introduction To Multimedia.pptx
Lecture 01 Introduction To Multimedia.pptx
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
 
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
 
WhatsApp Chat: 📞 8617697112 Call Girl Baran is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Baran is experiencedWhatsApp Chat: 📞 8617697112 Call Girl Baran is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Baran is experienced
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Sector 104, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 104, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 104, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 104, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Gamestore case study UI UX by Amgad Ibrahim
Gamestore case study UI UX by Amgad IbrahimGamestore case study UI UX by Amgad Ibrahim
Gamestore case study UI UX by Amgad Ibrahim
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
 
The hottest UI and UX Design Trends 2024
The hottest UI and UX Design Trends 2024The hottest UI and UX Design Trends 2024
The hottest UI and UX Design Trends 2024
 
Sweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptxSweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptx
 
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
 
Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...
Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...
Nisha Yadav Escorts Service Ernakulam ❣️ 7014168258 ❣️ High Cost Unlimited Ha...
 

Website security systems

  • 1. Web Security System Website Security Systems Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 1
  • 2. Web Security System Website Security Systems • Website Security Systems is very important for a webmaster. • If a webmaster to ignore the security aspect of a website, the website will be very vulnerable to attacks from a hacker. • To strengthen the web of security in terms of knowledge about web security systems needed to be overcome. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 2
  • 3. Web Security System Web hacking • Web hacking is usually done through port 80. Because the website using port 80. The attacks are usually carried out are: • Deface Site • SQL Injection • Remote File Inclusion (RFI) • Local File Inclusion (LFI) • Cross Site Scripting (XSS) Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 3
  • 4. Web Security System Deface Site • Deface is an activity to change the front page (index) or the content of a Web site or its contents so that the view in accordance with the desired. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 4
  • 5. Web Security System The techniques of web site Deface • Generally the amount of deface can be done in 3 ways: 1. Generally speaking, Enter Illegal Input. The aim is that the user was thrown out of the directory files and go to the web server root directory and then run the cmd.exe and observing the structure of the target directory on the NT server. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 5
  • 6. Web Security System The techniques of web site Deface 2. With TFTP (Trivial File Transfer Protocol) is a UDP based protocol which listen on ports 69 and is very susceptible safety and most web servers running this TFTP service. 3. With the FTP with a web that has been filled deface materials. Each NT server has ftp.exe file upload to FTP or FTP downloads. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 6
  • 7. Web Security System Netcat • Netcat allows you to form their own port filter that allows file transfers without using FTP. Furthermore, netcat can be used to avoid the port filters on most firewalls, spoofing IP address, to conduct session hijacking. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 7
  • 8. Web Security System Securing IIS Server from Deface • Always updating with the latest service packs and the latest hotfix. • Protect with a firewall and IDS (Intrusion Detection System). • Eliminating Options Write on the HTTP protocol (HTTP 1.0 and HTTP 1.1). • Commands supported are: CONNECT*, DELETE*, GET, HEAD, OPTIONS, POST, PUT, TRACE Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 8
  • 9. Web Security System SQL Injection • SQL injection attack is one attack to reach access to the database system based on Microsoft SQL Server. • These techniques take advantage of weaknesses in the programming language in SQL scripting in processing a database system that allows someone without an account can enter and pass the verification of the MS SQL Server. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 9
  • 10. Web Security System SQL Injection For handling this case is set to: • Only certain characters may be inputted. • If the illegal character is detected, immediately rejected the request. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 10
  • 11. Web Security System Remote File Inclusion (RFI) • Methods that exploit the weaknesses of PHP scripts include (), include_once (), Require (), require_once () the variable is not declared properly. • With RFI an attacker can either include a file that is located outside the respective servers. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 11
  • 12. Web Security System Local File Inclusion (LFI) • Methods that exploit the weaknesses of PHP scripts include (), include_once (), Require (), require_once () the variable is not declared properly. • With LFI an attacker can either include a file that is located on the server concerned. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 12
  • 13. Web Security System Cross Site Scripting (XSS) • XSS also known as the CSS is an acronym for Cross Site Scripting. • XSS is a method to insert HTML or script code into a website that is run through a browser on the client. Copyright © 2009-Present Mobile88.com. All Rights Reserved. Restricted & Non Disclosed Use Only. Strictly Private, Confidential & Intellectual Property Protected. Slide 13