|
|
|
- Bruce Hunter
- 10 years ago
- Views:
Transcription
1 Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software running on a host machine, also called a Server 3, which responds to the requests. Typically, the request made by the client consists of an Universal Resource Locator(URL) and, possibly. some additional data. The server s responses consist of web pages containing HTML code which the client interprets and displays to the user. The format and the way in which requests and responses are managed are defined by the Hypertext Transport Protocol (HTTP). The format of the web pages is defined by the Hypertext Markup Language (HTML) which may be augmented by Cascading Style Sheets (CSS) and a scripting language such as JavaScript. The combination of HTML, CSS, and scripting is referred to as Dynamic HTML (DHTML). Addressing/Identifying a Web page When we want to request a web page we type a Uniform Resource Locator (URL) into the address field of our browser. In order for the network to be able to route the HTTP request to the appropriate web server it needs to know the IP Address of the server s host machine and the port address of the server. All publicly accessible Web Servers use the same port address, 80. The IP address is derived from the domain name portion of the URL using the Domain Name System (DNS). Consider the following URL: Each part of the URL has a meaning and a purpose, as follows. Note that many parts of the URL are often not used or are optional. This defines which protocol is to be used for formatting the request. Other possible protocols which can be used in an URL 1 Internet Explore, Netscape, and Firefox are examples of web clients. 2 Microsoft IIS and Apache are examples of web servers. 3 The server host machine may contain other server software in addition to the web server, such as an FTP server, and server, and so on. The term web server, server, etc is sometimes used to refer to both the host machine as well as the software providing the service. NTC Feb 5, 2009 Page 1 of 9
2 include ftp:// for accessing ftp servers and nntp:// for accessing news servers. Alice.teaparty.wonderland.com This is the complete ( fully qualified ) domain name. The domain name is hierarchical, so that each part of the name can be considered a level in a domain name tree. The root of the tree is the rightmost portion of the domain name while the leftmost portion of the domain tree is one of the leaves of the hierarchy. This particular domain name consists of four parts, as follows: com This is the top-level domain. 4 Typical top-level domains include.com,.edu,.org,.gov,.mil, and.net. In addition, each country in the world has their own top-level domain name such as.us,.fr,.uk,.jp, and so on. wonderland This is the 2 nd level domain within the com high level domain. Notice the hierarchical nature of the URL: From right to left you have the high level domain, and than a 2 nd level domain within that high level domain. teaparty Alice Continuing down the hierarchy, this is a subdomain within the wonderland.com domain. Subdomains are not required and are created at the discretion of the organization owning the 2 nd level domain name. Each subdomain may contain subdomains of its own. The first part of a domain name is usually the hostname of the host machine (server) on which the server software resides, at the bottom of the hierarchical domain name tree. In the early days of the World Wide Web this was almost always www, but that is not a requirement. Since each host on the Internet must have a unique IP Address, this domain name must correspond to a unique IP Address. DNS is used to determine the IP address from this domain name. 4 Strictly speaking, the actual root of the domain name hierarchy is represented by a period. and in a fully-qualified domain name it should appear to the right of the top-level domain name. We normally leave the period off, but it is important in some cases to know when to include and when to leave out the period. NTC Feb 5, 2009 Page 2 of 9
3 :23054 This is the Port Address of the server application which is running within the host alice.teaparty.wonderland.com. Since there may be several server software processes running on the same host, each one must have a unique port address. Since most servers have well-known port addresses this part of the URL is rarely used; as mentioned earlier http requests assume that the server s port address is The port addresses must be specified as part of the URL only if the server s port address is different from the accepted well-known address for that kind of server. dormouse This is a folder on the server host. Each web site has a document root ; this is the folder on the server machine in which the html web pages reside. Suppose, for instance, that the document root has the following path on the server: C:\web_site\documentroot Then the domain name alice.teaparty.wonderland.com actually points to this folder. If you create folders below the root, than they must be explicitly specified in the URL. Thus this portion of our URL, Alice.teaparty.wonderland.com:23054/dormouse actually points to the folder C:\web_site\documentroot\dormouse on the server host. bio.htm This is the requested web page. This is not required. If the page is not specified (for instance, if the the specified URL were: than the server will deliver a default web page. This is a page found in the document root folder and is usually called index.htm. The name of the default page is specified when the web server for the site is configured. In Windows IIS, for instance, the default page might be defautl.asp. If no default is specified for the folder an error message Page Not Found is returned to the client, or, perhaps, al list of all the pages 5 Some other well-known port addresses you should be familiar with are: 25 for mail servers and 20 & 21 for ftp servers. NTC Feb 5, 2009 Page 3 of 9
4 in the specified folder. Hypertext Transport Protocol (HTTP) The HTTP specifies exactly how messages are formatted when communicating between a web client and web server. The specification makes this communication independent of the Hardware or Operating Systems on which the client and server are running. Only two formats are specified, one for requests (client to server) and one for responses (server to client). Both kinds of messages contain three parts. For requests the three parts are the Request Line, the Headers, and the Body. For responses they are the Status Line, the Headers, and the Body. Request Message Response Message Request Line Blank Line Status Line Blank Line Headers Headers Body Body HTTP Message Formats Request Message: The Request Line or an HTTP request message consists of three fields: Method This field specifies the action to be taken by the server, and can also be used to specify how data is passed to the server. There are several values this field may contain, but the two most common are POST (usually indicating that there is data being sent to the server, such as data from an HTML form) and GET (which simply says that the server is to send a page). Other allowed methods are NTC Feb 5, 2009 Page 4 of 9
5 OPTIONS, HEAD, PUT, DELETE, TRACE, and CONNECT. 6 Page Version The web page being requested (e. g. bio.htm in our URL example). The HTTP version being used. There are two HTTP versions in common use, HTTP 1.0 and HTTP 1.1. HTTP 1.0 is nonpersistent, which means that a new TCP session (3-way handshake) must be initiated for every element of a page. Version 1.1 is persistent, so the session (connection) persists until the entire page is delivered. Request Headers contain information for the server. For instance, the Host Header Name contains the domain name of the server and Cookie contains any cookies on the client machine associated with this web site. Headers are optional. 7 The body of a request is often empty. If the request was generated by clicking on the submit button in an HTML form page, then the body will contain the form data. Response Message: The Status Line of an HTTP response message also consists of three fields Version Status Number The same as for requests. A number indicating the result of trying to answer the request. Typical numeric responses are 200 and 404 (see below). 8 Status Text A brief text describing the status. If the status number is 200 then the text is simply OK, if the status number is 404 the text will sat Page Not Found. Response Headers contain information for the client. For instance, the Set Cookie 6 Go to for more details about these additional methods. 7 Go to for a complete list of HTTP headers. 8 Go to for a complete list and description of HTTP status codes. NTC Feb 5, 2009 Page 5 of 9
6 header will cause a cookie to be stored on the client machine. The body of a request contains the DHTML to be sent to the client. How HTTP Requests are Handled For a garden-variety page, a request to the server simply results in the server getting the page from the appropriate directory and delivering it to the client. (See the first diagram below). The server does not treat differently those pages containing client-side scripts and those that contain no scripting. If a page is not found on the server, than one of two things can happen An error message (code Not Found) is returned, or A directory listing of the directory which was the target of the URL is returned. This occurs if browsing is enabled in the server configuration for the web site. Client-Side Scripting Client-Side Scripting is accomplished by inserting lines of executable program code (a script ) directly within an HTML web page. The programming language used to write the script may be JavaScript, VBscript or any other available scripting language which the web browser (web client) knows how to interpret. The script is interpreted and executed by the browser (web client) which displays the web page. The sequence of operations, then, is 1. The browser (Web Client) requests a web page from a web server. 2. The web server returns the page to the web client 3. The web client processes the html and any embedded scripts and displays the results on the users display. Notice that a. The extension of the pages containing scripts is htm or html; it does not NTC Feb 5, 2009 Page 6 of 9
7 change to reflect the scripting language b. The only resources available to the scripts are those on the client machine, none that are on the web server host machine. c. The browser must be enabled for the scripting language Server-Side Scripting As you might guess, Server-Side Scripting consists of scripts that are executed on the web server host machine, not on the client machine. As with client-side scripts, the scripts themselves may be included directly among the text 9 in an HTML document. When the page containing the script is requested, the web server passes the page containing the script to a script processor which performs the actions requested by the script and returns the page, which now contains only HTML, to the server who, in turn, forwards it to the requesting web client (browser). The full sequence of events is 1. The browser (Web Client) requests a web page from a web server. 2. The server forwards the page, if scripting is included, to the script processor. 3. The script processor runs the script and returns the results to the server. 4. The web server returns the page to the web client 5. The web client processes the html and any embedded client side scripts and displays the results on the users display. Notice that a. The extension of the pages containing scripts is NOT.htm or.html; The extension (.jsp,.vb,.php, etc) tells the server which script processor to 9 However, scripts may also be contained in separate files which are then included in the HTML document. The effect is the same as if the scripts were written as part of the HTML document. The advantage is that these external files can be reused - the same script can then be included, if desired, in many HTML documents without having to type them over and over again. Also, if changes ever need to be made to the script, only one file needs to be modified, not every HTML page where the script is used. NTC Feb 5, 2009 Page 7 of 9
8 use 10. Also, the server can be configured to recognize that all pages in a particular directory contain scripts. An URL for such a configuration might look like In this example the fact that the page, page.php, is in the directory cgi-bin indicates to the server that the page contains a script. b. Many server features and parameters are available to server-side scripts, including Time and Date information The names and IP addresses of the server and client Server environment variables c. Server-side scripts can create, read and write files on the server d. Server-side scripts can access data bases on the server Accessing data bases is a very important feature of server-side scripts, for instance, for businesses on the web, where data bases are used to keep product information. Data Bases are accessed directly by the scripts, through a common data base access language called SQL (Structured Query Language). See the next diagram: 10 This is set up in the configuration of the web server. In fact, this configuration could be set up to send pages with.htm or.html extensions to a script processor, if that were desired. NTC Feb 5, 2009 Page 8 of 9
9 Secure HTTP Frequently we are asked to submit private/confidential information to a server via a web page form. For instance, a shopping site will want to know the Credit Card number you are using for your purchases. Clearly a need for a secure form of communication is required so this confidential data will not be compromised. Such security is provided by another protocol: HTTPS (Secure HTTP). In actuality, HTTP is not modified, but it uses the services of another protocol, Secure Socket Layer (SSL), to provide security. Thus, HTTPS is referred to as HTTP over SSL SSL has been superseded by Transport Layer Security (TLS) which provides essentially the same services and is still often referred to as SSL. SSL provides Authentication of the server (and sometimes the client as well) which guarantees to the client that the server to which the client is connected is, in fact, the correct server (and not a spoof), and Encryption of data for confidentiality. Authentication is provided through the use of a Certificate Authority (CA) which provides a certificate with which the server establishes its bona fides, and a Key Distribution Infrastructure (KDI) which securely delivers Session Keys to both parties, the client and th server. Public Key Encryption is used to generate certificates and session keys. A session key is then used by the client and server for their exchange of data. When the session completes the session key is destroyed. When secure web communication is desired, the URL protocol is instead of The port used is 443 instead of port 80 NTC Feb 5, 2009 Page 9 of 9
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
Web Browsing Examples. How Web Browsing and HTTP Works
How Web Browsing and HTTP Works 1 1 2 Lets consider an example that shows how web browsing and HTTP work. The example will cover a simple, but very common case. There are many more details of HTTP that
Apache JMeter HTTP(S) Test Script Recorder
Apache JMeter HTTP(S) Test Script Recorder This tutorial attempts to explain the exact steps for recording HTTP/HTTPS. For those new to JMeter, one easy way to create a test plan is to use the Recorder.
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Lesson Overview. Getting Started. The Internet WWW
Lesson Overview Getting Started Learning Web Design: Chapter 1 and Chapter 2 What is the Internet? History of the Internet Anatomy of a Web Page What is the Web Made Of? Careers in Web Development Web-Related
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
Lecture 2. Internet: who talks with whom?
Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve
Security Guidelines for MapInfo Discovery 1.1
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
S y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Cisco SSL Encryption Utility
About SSL Encryption Utility, page 1 About SSL Encryption Utility Unified ICM web servers are configured for secure access (HTTPS) using SSL. Cisco provides an application called the SSL Encryption Utility
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
LearningServer Portal Manager
Overview LearningServer Portal Manager Portal Manager is a web-based, add-on module to LearningServer that allows organizations to create multiple LearningServer web sites. Each site services different
IT3503 Web Development Techniques (Optional)
INTRODUCTION Web Development Techniques (Optional) This is one of the three optional courses designed for Semester 3 of the Bachelor of Information Technology Degree program. This course on web development
ShoreTel Advanced Applications Web Utilities
INSTALLATION & USER GUIDE ShoreTel Advanced Applications Web Utilities ShoreTel Advanced Applications Introduction The ShoreTel Advanced Application Web Utilities provides ShoreTel User authentication
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
INTERNET DOMAIN NAME SYSTEM
INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Domain Name System (DNS)
Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
HP Web Jetadmin Database Connector Plug-in reference manual
HP Web Jetadmin Database Connector Plug-in reference manual Copyright notice 2004 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation or translation without prior written permission
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
4 Understanding. Web Applications IN THIS CHAPTER. 4.1 Understand Web page development. 4.2 Understand Microsoft ASP.NET Web application development
4 Understanding Web Applications IN THIS CHAPTER 4.1 Understand Web page development 4.2 Understand Microsoft ASP.NET Web application development 4.3 Understand Web hosting 4.4 Understand Web services
Installation Procedure SSL Certificates in IIS 7
Installation Procedure SSL Certificates in IIS 7 This document will explain the creation and installation procedures for enabling an IIS website to use Secure Socket Layer (SSL). Check IIS for existing
BASIC CLASSWEB.LINK INSTALLATION MANUAL
LINKS MODULAR SOLUTIONS BASIC CLASSWEB.LINK INSTALLATION MANUAL classweb.link installation Links Modular Solutions Pty Ltd Table of Contents 1. SYSTEM REQUIREMENTS 3 2. DATABASES 3 Standalone Links Database
Web Programming. Robert M. Dondero, Ph.D. Princeton University
Web Programming Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn: The fundamentals of web programming... The hypertext markup language (HTML) Uniform resource locators (URLs) The
Application layer Web 2.0
Information Network I Application layer Web 2.0 Youki Kadobayashi NAIST They re revolving around the web, after all Name any Internet-related buzz: Cloud computing Smartphone Social media... You ll end
Fachgebiet Technische Informatik, Joachim Zumbrägel
Computer Network Lab 2015 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Internet Internet Protocols Fundamentals about HTTP Communication HTTP-Server, mode of operation Static/Dynamic Webpages
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2.
Testing Dynamic Web Applications How To You can use XML Path Language (XPath) queries and URL format rules to test web sites or applications that contain dynamic content that changes on a regular basis.
Getting Started with PRTG Network Monitor 2012 Paessler AG
Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,
SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE)
12/15/2012 WALISYSTEMSINC.COM SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE) Setup SSL in SharePoint 2013 In the last article (link below), you learned how to setup SSL in SharePoint 2013
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Chapter 2 Editor s Note:
[Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
What is WS_FTP Server Web Transfer Module?...1 System Requirements...2. What is WS_FTP Server Web Transfer Module?
CHAPTER 1 Introduction In This Chapter What is WS_FTP Server Web Transfer Module?...1 System Requirements...2 What is WS_FTP Server Web Transfer Module? WS_FTP Server Web Transfer Module is a web application
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
Outline. CIW Web Design Specialist. Course Content
CIW Web Design Specialist Description The Web Design Specialist course (formerly titled Design Methodology and Technology) teaches you how to design and publish Web sites. General topics include Web Site
Sage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
SSL Guide. (Secure Socket Layer)
SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother
End User Guide The guide for email/ftp account owner
End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4
IT3504: Web Development Techniques (Optional)
INTRODUCTION : Web Development Techniques (Optional) This is one of the three optional courses designed for Semester 3 of the Bachelor of Information Technology Degree program. This course on web development
Configuring Your email Client
Configuring Your email Client Introduction Until last academic year, the University email systems used no data encryption during email transfers to and from the servers. This was very fast but resulted
The World Wide Web: History
The World Wide Web: History - March, 1989, Tim Berners-Lee of Geneva s European Particle Physics Laboratory (CERN) circulated a proposal to develop a hypertext system for global information sharing in
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
WebStore Guide. The Uniform Solution
WebStore Guide The Uniform Solution Copyright 2009-2013 Premier Data Systems All rights reserved. This publication is protected by copyright and all rights are reserved by Premier Data Systems. It may
Working With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
4. Client-Level Administration
4. Client-Level Administration Introduction to Client Usage The Client Home Page Overview Managing Your Client Account o Editing Your Client Record View Account Status Report Domain Administration Page
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
WEBCONNECT INSTALLATION GUIDE. Version 1.96
WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
Overview of Extended Validation (EV) SSL
Extended Validation SSL Order Guide 1 Ordering Guide for Extended Validation SSL 1. Vetting Preparation 2. CSR Generation 3. Online Ordering Process 4. Vetting Process 5. Receiving & Installing your Certificate
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
JISIS and Web Technologies
27 November 2012 Status: Draft Author: Jean-Claude Dauphin JISIS and Web Technologies I. Introduction This document does aspire to explain how J-ISIS is related to Web technologies and how to use J-ISIS
WEB SITE DEVELOPMENT WORKSHEET
WEB SITE DEVELOPMENT WORKSHEET Thank you for considering Xymmetrix for your web development needs. The following materials will help us evaluate the size and scope of your project. We appreciate you taking
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
CHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
