Server-side Development using Python and SQL
|
|
|
- Dorothy Sims
- 10 years ago
- Views:
Transcription
1 Lab 2 Server-side Development using Python and SQL Authors: Sahand Sadjadee Alexander Kazen Gustav Bylund Per Jonsson Tobias Jansson Spring 2015 TDDD97 Web Programming Department of Computer and Information Science (IDA) Linköping University Sweden 1
2 2
3 1. Introduction In this second lab, you will use Python and SQL to implement the server side of the final web application. You will use the Flask micro framework, and the SQLite to handle web requests and data storage respectively. You are required to develop step by step and implement each step according to the instructions. Once you are finished with each lab, you will present your work to your responsible lab assistant. For more specific information about the presentation and evaluation process of lab 2, please check section 6: Presentation and Evaluation. For more general information about the examination process, please check the course page. Requirements By the end of lab 2, the following requirements shall be met: Functional: All the server functions specified in the lab instructions shall work exactly as specified. Non Functional: The server shall use an SQLite database to store all user data. The server shall use appropriate HTTP methods for all routes. All the server side methods will return the result in JSON. 3
4 2. The Project Folder You need to create a new project folder with an arbitrary name. Your project folder shall at least contain the following files by the end of lab 2: 1.server.py 2.database_helper.py 3.database.db 4.database.schema server.py This file shall contain all the server side remote procedures, implemented using Python and Flask. database_helper.py This file will contain all the functions that access and control the database and shall contain some SQL scripts. This file will be used by the server to access the database. database.db This is a SQLite file which will contain your database. Your database is composed of different tables which in turn contain the actual data, such as users personal information. database.schema This file shall contain the SQL script used to initialize the database. database_helper.pyor SQLite3 front end will use this file to create all the tables and insert the default data. This file should be completed and executed before implementing and running any of the server side procedures. 4
5 3. Development tools Like in lab 1 you are free to use any text/code editor of your choice. You will also need the following tools to complete lab 2. Python In order to be able to install the packages you need to complete this lab you will need to create a virtual environment for Python, in which you can install additional modules. In this lab you are required to use python 2.7.x. You can verify which version of Python you are running by executing the following command in a terminal: python V Once you have made sure that you are running the correct version of Python, you can proceed to create a new directory for the virtual environment. Python virtual environments are created using the command line tool virtualenv, which should already be installed if you are using the correct version of Python. You can learn how to use virtualenv in the documentation found at their website: Use virtualenv to create a new virtual environment in a new directory. virtualenvwill install a new version of Python found in <specified_directory>/bin. virtualenv will also install pip, a tool for managing and installing Python packages. The documentation for pip can be found at installer.org/en/latest/usage.html#usage. You ll need to use pipin order to install Flask. Note: From this point you will work with the executables available in the virtual environment. Python documentation: Flask Flask is a lightweight web framework written in Python. One of the good features of the Flask framework is that it provides a built in development web server and debugger. By using Flask you can write your back end code in Python and run it using the built in web server. Flask can be added as a module to your already created Python virtual environment using the pipcommand. The following links provide more information about the Flask framework and how to install it. Flask official website: Information about installing Flask: 5
6 Once you are done you can use the command pip freeze to see which packages have been installed by using pipand verify that Flask has been installed successfully. Make sure that you always run your application using the executables in the virtual environment. If you use the global Python executable, any packages installed using pip will not be available. SQLite SQLite is a relational database management system which is now widely used for client side and server side purposes. It does not provide a separate process and lets you store your data directly in an individual file on disk using SQL language. the version 3 of SQLite is available on the lab systems and accessible via the command sqlite3. you can get information about how to use the SQLite3 front end by executing the following command on the lab systems: man sqlite3 SQLite official website Information about SQL language Information about using SQLite3 in python programs Information about using SQLite3 with Flask framework 6
7 Telnet client Telnet is a network protocol for bidirectional text exchange over network. By Using telnet client you can get connected to a web server and send http requests to it. Once your request is processed by the server, it returns a text based http response to the telnet client which is displayed right after. The Telnet client is installed on our lab systems and your can access it by using the telnet command. you can get information about how to use the Telnet client by executing the following command on the lab systems: man telnet HTTP basics In this lab, you are about to write the server side functionalities for your Twidder application. This means you need to understand the basics of HTTP, the protocol used to transfer data in Web. There is a huge amount of resources available online, we suggest taking a look at the following link: Make sure you read the parts about the POST and GET methods, to be able to use each of them in its correct place. It is important to have a good understanding about what an HTTP header is and what it contains. 7
8 4. Lab Instructions The lab has been divided into the following three steps. After completing each server function, you are required to test it using telnet. Step 0: Hello Flask! In this first step you are required to install the Flask framework on your system according to the instructions available in section 2. Once it s done, you will write a Hello World example and test it by using Telnet or any other tools. An example can be found in the documentation provided for Flask. Step 1: Implementing the Twidder back end using Python and SQL In this step you shall implement all the functions needed by your front end application from lab 1. The server functions you create here will often have a direct counterpart in serverstub.js, provided in the previous lab. You will need to create a route for each function, so that it is accessible by the client. The list of the functions you shall implement, and a small description for each function: The list is formatted as this: function_name(arguments) Description: A small description of what the function is intended to do. Input: A description of what input the server is expecting. Returned data: Either a description of what data the server should return, or a if no special data is to be returned. sign_in( , password) Description: Authenticates the username by the provided password. Input: Two string values representing the username ( address) and password. Returned data: A text string containing a randomly generated access token if the authentication is successful. sign_up( , password, firstname, familyname, gender, city, country) Description: Registers a user in the database. Input: Seven string values representing the following: , password, firstname, familyname, gender, city and country. Returned data: sign_out(token) 8
9 Description: Signs out a user from the system. Input: A string containing the access token of the user requesting to sign out. Returned data: change_password(token, old_password, new_password) Description: Changes the password of the current user to a new one. Input: token: A string containing the access token of the current user oldpassword: The old password of the current user newpassword: The new password Returned data: get_user_data_by_token(token) Description: Retrieves the stored data for the user whom the passed token is issued for. The currently signed in user can use this method to retrieve all its own information from the server. Input : A string containing the access token of the current user. Returned data: A text string containing the following information: , firstname, familyname, gender, city and country. get_user_data_by_ (token, ) Description: Retrieves the stored data for the user specified by the passed address. Input: token: A string containing the access token of the current user The address of the user to retrieve data for Returned data: A text string containing the following information: , firstname, familyname, gender, city and country. get_user_messages_by_token(token) Description: Retrieves the stored messages for the user whom the passed token is issued for. The currently signed in user can use this method to retrieve all its own messages from the server. Input: A string containing the access token of the current user. Returned data: A text string containing all of the messages sent to the user. get_user_messages_by_ (token, ) 9
10 Description: Retrieves the stored messages for the user specified by the passed address. Input: token: A string containing the access token of the current user The address of the user to retrieve messages for Returned data: A text string containing all of the messages sent to the user. post_message(token, message, ) Description: Tries to post a message to the wall of the user specified by the address. Input: token: A string containing the access token of the current user message: The message to post The address of the recipient Returned data: Each function, when invoked through its route, is required to return the data in JSON format containing the following information, fields: 1. A text indicating if the function has been executed successfully or not. E.g. true or false. 2. A text message describing the success or failure. 3. The actual requested data. Note: You can also use error codes instead of items 1 and 2. Remember, if you do so then you will need to upgrade your client side code by the end of lab 3. One of the important tasks of the back end is to store information more or less permanently. In this step you need to use SQLite3/SQL and python data structures to store certain information at server side, for example information about signed up or signed in users. It s up to you to decide how to store each type of data but you need to defend your choice during presentation. If you are in doubt, discuss your choice of implementation with your lab assistant. As you proceed, you need to call the implemented procedures using the Telnet client, your browser or any other tool.telnet gives you the possibility to call server side procedures with arbitrary arguments and methods and investigate the output. 10
11 5. Questions for consideration 1. What security risks can storing passwords in plain text cause? How can this problem be addressed programmatically? 2. As http requests and responses are text based information, they can be easily intercepted and read by a third party on the Internet. Please explain how this problem has been solved in real world scenarios. 3. How can we use Flask for implementing multi page web applications? Please explain how Flask templates can help us on the way? 4. Please describe a Database Management System. How SQLite is different from other DBMSs? 5. Do you think the Telnet client is a good tool for testing server side procedures? What are its possible shortages? 6. Presentation and Evaluation Once you are finished with lab 2, you will present your work to your responsible lab assistant during a scheduled lab session. You may be asked about the details of your implementation individually. 11
Client-side Development using HTML, Javascript and CSS
Lab 1 Client-side Development using HTML, Javascript and CSS Authors: Sahand Sdjadee Alexander Kazen Gustav Bylund Per Jonsson Tobias Jansson Spring 2015 TDDD97 Web Programming http://www.ida.liu.se/~tddd97/
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Web Development with Flask and the Raspberry Pi Leading by Example CUAUHTEMOC CARBAJAL ITESM CEM 22/04/2014
Web Development with Flask and the Raspberry Pi Leading by Example CUAUHTEMOC CARBAJAL ITESM CEM 22/04/2014 Introduction Flask: lightweight web application framework written in Python and based on the
Web Service for SKF @ptitude Observer. Installation Manual. Part No. 32179700 Revision A
Web Service for SKF @ptitude Observer Part No. 32179700 Revision A Copyright 2009 by SKF Reliability Systems All rights reserved. Aurorum 30, 977 75 Luleå Sweden Telephone: +46 (0) 920 758 00, Fax: +46
Backing Up CNG SAFE Version 6.0
Backing Up CNG SAFE Version 6.0 The CNG-Server consists of 3 components. 1. The CNG Services (Server, Full Text Search and Workflow) 2. The data file repository 3. The SQL Server Databases The three services
INSTALLING, CONFIGURING, AND DEVELOPING WITH XAMPP
INSTALLING, CONFIGURING, AND DEVELOPING WITH XAMPP by Dalibor D. Dvorski, March 2007 Skills Canada Ontario DISCLAIMER: A lot of care has been taken in the accuracy of information provided in this article,
Copyright 2014 http://itfreetraining.com
This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.
Novell Identity Manager
Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Visual COBOL ASP.NET Shopping Cart Demonstration
Visual COBOL ASP.NET Shopping Cart Demonstration Overview: The original application that was used as the model for this demonstration was the ASP.NET Commerce Starter Kit (CSVS) demo from Microsoft. The
Wakanda Studio Features
Wakanda Studio Features Discover the many features in Wakanda Studio. The main features each have their own chapters and other features are documented elsewhere: Wakanda Server Administration Data Browser
aspwebcalendar FREE / Quick Start Guide 1
aspwebcalendar FREE / Quick Start Guide 1 TABLE OF CONTENTS Quick Start Guide Table of Contents 2 About this guide 3 Chapter 1 4 System Requirements 5 Installation 7 Configuration 9 Other Notes 12 aspwebcalendar
Pine Exchange mini HOWTO
Pine Exchange mini HOWTO Alexandru Roman v1.0, 2002 03 28 Revision History Revision 1.0 2002 03 28 Revised by: ar Submitted to the LDP for publication. Revision 0.3 2002 03 25 Revised
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue
Device Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
Advanced Tornado TWENTYONE. 21.1 Advanced Tornado. 21.2 Accessing MySQL from Python LAB
21.1 Advanced Tornado Advanced Tornado One of the main reasons we might want to use a web framework like Tornado is that they hide a lot of the boilerplate stuff that we don t really care about, like escaping
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015
Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international
SPHOL207: Database Snapshots with SharePoint 2013
2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Novell Identity Manager
AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with
As a CIFEX user, we suggest you have a look at Use Cases. As a CIFEX administrator, we suggest you have at least a look at
CIFEX The CISD File EXchanger Executive Summary CIFEX (CISD File EXchanger) allows internet users to share large files using only a modern web browser (such as Firefox, Safari or Internet Explorer) on
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,
Polar Help Desk Installation Guide
Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or
NetBeans IDE Field Guide
NetBeans IDE Field Guide Copyright 2005 Sun Microsystems, Inc. All rights reserved. Table of Contents Introduction to J2EE Development in NetBeans IDE...1 Configuring the IDE for J2EE Development...2 Getting
ZODIANET API (ZAPI2)
ZODIANET API (ZAPI2) ZODIANET API ZAPI 2 Description of information exchange between the Zodianet platform and third-parties Document : specification Source: ZODIANET Mail: [email protected] Revision:
Microsoft Windows PowerShell v2 For Administrators
Course 50414B: Microsoft Windows PowerShell v2 For Administrators Course Details Course Outline Module 1: Introduction to PowerShell the Basics This module explains how to install and configure PowerShell.
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
c360 Portal Installation Guide
c360 Portal Installation Guide Microsoft Dynamics CRM 2011 compatible c360 Solutions, Inc. www.c360.com [email protected] Table of Contents c360 Portal Installation Guide... 1 Table of Contents... 2 Overview
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Section 4 Application Description - LDAP
Section 4 Application Description - LDAP This section describes the applications and configuration required for authentication utilizing Windows 2000 Server s Active Directory features and a NetScreen
Quick Scan Features Setup Guide
Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)
There are more security levels in ARCHIBUS, as described bellow.
Glossary: VPA = Virtual Private ARCHIBUS restriction SSO = Single Sign-On LDAP = Lightweight Directory Access Protocol WebCentral = ARCHIBUS Core Engine IIS = Internet Information Services (IIS, formerly
Microsoft Expression Web
Microsoft Expression Web Microsoft Expression Web is the new program from Microsoft to replace Frontpage as a website editing program. While the layout has changed, it still functions much the same as
Authentication in OpenStack
Draft Draft entication in OpenStack Jorge L Williams Khaled Hussein Ziad N Sawalha Abstract The purpose of this
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
UFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
Microsoft Business Intelligence 2012 Single Server Install Guide
Microsoft Business Intelligence 2012 Single Server Install Guide Howard Morgenstern Business Intelligence Expert Microsoft Canada 1 Table of Contents Microsoft Business Intelligence 2012 Single Server
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
How To Create A Database Driven Website On A Computer Or Server Without A Database (Iis) Or A Password (Ict) On A Server (Iip) Or Password (Web) On An Anonymous Guestbook (Iit) On Your
Information and Communication Technologies Division Security Notes on Active Server Pages (ASP) and MS-SQL Server Integration Prepared by: Contributor: Reviewed: Richard Grime Chris Roberts Tom Weil Version:
Click-To-Talk. ZyXEL IP PBX License IP PBX LOGIN DETAILS. Edition 1, 07/2009. LAN IP: https://192.168.1.12 WAN IP: https://172.16.1.1.
Click-To-Talk ZyXEL IP PBX License Edition 1, 07/2009 IP PBX LOGIN DETAILS LAN IP: https://192.168.1.12 WAN IP: https://172.16.1.1 Username: admin Password: 1234 www.zyxel.com Copyright 2009 ZyXEL Communications
Active Directory Authentication Integration
Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.
COMP28112 Exercise 2: Wedding Planner Duration: 3 sessions
COMP28112 Exercise 2: Wedding Planner Duration: 3 sessions 1 Introduction You need to arrange, for the earliest time possible, a wedding. You are required to make two reservations a hotel to host and a
Ad Hoc Transfer Plug-in for Outlook Installation Guide
IPSWITCH TECHNICAL BRIEF Ad Hoc Transfer Plug-in for Outlook Installation Guide In This Document Installing the Ad Hoc Transfer Plug-in for Outlook...1 Silent Install for Ad Hoc Transfer Plug-in for Outlook...3
SQL Injection Attack Lab
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0)
Alfresco Share SAML Version 1.1 Revisions 1.1 1.1.1 IDP & Alfresco user logs in using saml login page (Added info about saving the username and IDP login date as a solution for the Security concern mentioned
IBM FileNet eforms Designer
IBM FileNet eforms Designer Version 5.0.2 Advanced Tutorial for Desktop eforms Design GC31-5506-00 IBM FileNet eforms Designer Version 5.0.2 Advanced Tutorial for Desktop eforms Design GC31-5506-00 Note
NovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt Objective This lab may introduce new CCNP lab equipment and certain IOS features. This introductory activity also describes how to
Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, [email protected] Writing a custom web
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Objective This lab will introduce to the student the CCNP lab equipment and certain IOS features that might be new. This introductory
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution
MICROSTRATEGY 9.3 Supplement Files Setup Transaction Services for Dashboard and App Developers
NOTE: You can use these instructions to configure instructor and student machines. Software Required Microsoft Access 2007, 2010 MicroStrategy 9.3 Microsoft SQL Server Express 2008 R2 (free from Microsoft)
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Perceptive Intelligent Capture Solution Configration Manager
Perceptive Intelligent Capture Solution Configration Manager Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: February 2016 2015 Lexmark International Technology, S.A.
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
FTP and email. Computer Networks. FTP: the file transfer protocol
Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
Deploying Cisco Unified Contact Center Express Volume 1
Deploying Cisco Unified Contact Center Express Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional References Your Training Curriculum General Administration
Uploads from client PC's to mercury are not enabled for security reasons.
Page 1 Oracle via SSH (on line database classes only) The CS2 Oracle Database (Oracle 9i) is located on a Windows 2000 server named mercury. Students enrolled in on line database classes may access this
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Microsoft Dynamics CRM Security Provider Module
Microsoft Dynamics CRM Security Provider Module for Sitecore 6.6-8.0 CRM Security Provider Rev: 2015-04-15 Microsoft Dynamics CRM Security Provider Module for Sitecore 6.6-8.0 Developer's Guide A developer's
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
DevKey Documentation. Release 0.1. Colm O Connor
DevKey Documentation Release 0.1 Colm O Connor March 23, 2015 Contents 1 Quickstart 3 2 FAQ 5 3 Release Notes 7 i ii DevKey Documentation, Release 0.1 Github PyPI Contents 1 DevKey Documentation, Release
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
WA1802 SOA for Architects Using WebSphere ESB. Student Labs. Web Age Solutions Inc.
WA1802 SOA for Architects Using WebSphere ESB Student Labs Web Age Solutions Inc. 1 Table of Contents Lab 7 - Service Composition Pattern...3 2 Lab 7 - Service Composition Pattern Service composition is
Table of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync.
This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview... 2 Evaluating Exchange ActiveSync for MailEnable...
Getting started with OWASP WebGoat 4.0 and SOAPUI.
Getting started with OWASP WebGoat 4.0 and SOAPUI. Hacking web services, an introduction. Version 1.0 by Philippe Bogaerts [email protected] www.radarhack.com Reviewed by Erwin Geirnaert
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group
Installation Guide Version 1.5 May 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and
Institutionen för datavetenskap
Institutionen för datavetenskap Department of Computer and Information Science Final thesis Generating web applications containing XSS and CSRF vulnerabilities by Gustav Ahlberg LIU-IDA/LITH-EX-A--14/054--SE
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
SQL Injection Attack Lab Using Collabtive
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
Bubble Code Review for Magento
User Guide Author: Version: Website: Support: Johann Reinke 1.1 https://www.bubbleshop.net [email protected] Table of Contents 1 Introducing Bubble Code Review... 3 1.1 Features... 3 1.2 Compatibility...
Content Management System
Content Management System XT-CMS INSTALL GUIDE Requirements The cms runs on PHP so the host/server it is intended to be run on should ideally be linux based with PHP 4.3 or above. A fresh install requires
Microsoft SQL 2008 / R2 Configuration Guide
TM Triple Crown Microsoft SQL 2008 / R2 Configuration Guide Revised June 11, 2013 2013 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
GravityLab Multimedia Inc. Windows Media Authentication Administration Guide
GravityLab Multimedia Inc. Windows Media Authentication Administration Guide Token Auth Menu GravityLab Multimedia supports two types of authentication to accommodate customers with content that requires
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Aradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).
Ipswitch Client Installation Guide
IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group
SpectraPro. SLQ Server databases
VMI AB SpectraPro SLQ Server databases Release date: February 2011 Doc Ref No. AN 02106 SpectraPro - SQL Server Databases SpectraPro - SQL Server databases 1. Introduction SpectraPro can create a machine
Implementing Microsoft SQL Server 2008 Exercise Guide. Database by Design
Implementing Microsoft SQL Server 2008 Exercise Guide Database by Design Installation Lab: This lab deals with installing the SQL Server 2008 database. The requirements are to have either a Windows 7 machine
