I luvz hacking challenges sites - do you?
|
|
- Noah Bishop
- 5 years ago
- Views:
Transcription
1 I luvz hacking challenges sites - do you? Yaniv Miron aka Lament HackFest 2014 CANADA
2 / About me Yaniv Miron aka Lament Security Researcher and Consultant Certified Locksmith & CISO Certified Found IBM, Oracle, Microsoft, Apache, Facebook (F-U for not giving me credit & bounty) and more.
3 Some of them are Stego, Logic and Reversing. / What s going on here? There are many CTF games and these hacking challenges are kind of online Capture The Flag. I would like to share my experience with demoing some examples of these online hacking challenges.
4 Hacking challenges sites? There are different sites that offer challenges, some of them actually grade and rank the users and some just let the users download challenges and try them offline.
5 HackThisSite.Org One of the largest sites in this area Different cool challenges in there
6 Other sites Many more
7 The Ranks Different levels gives different ranks
8 The Different Challenges
9 Because it s a small % out of the real challenges and you need to learn somehow. Why the h311 are you giving solutions? Unfortunately most of them are somewhere online. Unfortunately people just copy the solutions from others and paste the answer.
10 Solutions There are different ways to solve different tasks, it could be that there are easier ways than what I m showing here but this is the path that I took. I m trying to show how to think rather than just show the quick way to get a solution. Sometimes it makes the solution more complicated.
11 DEMO Time!
12 Stego5.bmp #1 Hack The Planet stego5.bmp
13 Stego5.bmp #2 First thing first, is it really a BMP file?
14 Looks like it: Stego5.bmp #3
15 Stego5.bmp #4 So what s next? I think I saw something similar in the past Maybe as a user avatar? Let s save it avatar.jpg
16 Stego5.bmp #5 We have a problem You can t really compare BMP (The original) and JPG (the Avatar) Or can we?
17 Stego5.bmp #6 Let s just turn the JPG to BMP
18 Stego5.bmp #7 Now let s try to compare them with some hex
19 Stego5.bmp #8
20 Stego5.bmp #9 LSB? It s widely used in Stego
21 Stego5.bmp #10 We will take the stego5.bmp hex, turn it into binary.
22 Stego5.bmp #11 Lets write a python script cuz we re kewl
23 Stego5.bmp #12 And back to ascii Looks interesting syn-ack-? maybe it s
24 Logic.Binary #1 Q1: Binary:
25 Logic.Binary #2 Binary are 1 s and 0 s isn t it? Clean the 2 s and the 3 s Binary:
26 Logic.Binary #3 Put it nicely Binary:
27 Logic.Binary #4 Binary -> ASCII Answer is: i win
28 Logic.Riddle #1 Q2: I call, but I never talk. I knock, but I never enter. I feel a bit insecure.
29 Logic.Riddle #2 Port scanner knocks but never enter, calling the ports but never talks with them. Insecure? A2: nmap
30 Logic.URL #1 Q3: Sometimes when you are coding a web based program you make a mistake with URL's. Correct this link. The link we get is: ks
31 Logic.URL #2 A3: It looks like a Google link, as this is the format Google is using. Let s change it to: cks
32 Logic.URL #3
33 Q4: Logic.Num #1
34 Logic.Num #2 1 of 2 = 12 1 of 1 and 1 of 2 = of 1 and 1 of 2 = of 3, 2 of 1 and 1 of 2 = of 1, 1 of 3, 1 of 2, 2 of 1 and 1 of 2 = of 1, 1 of 3, 1 of 1, 2 of 2, 2 of 1 and 1 of 2 = A4:
35 Reversing.app7 #1 We get a file called app7win.zip with 2 files inside: app7win.exe encrypted.enc Let s try to run it
36 Reversing.app7 #2 So it seems that we need to find a password here Let s try to remove the encrypted.enc file from the folder, maybe it will help:
37 Reversing.app7 #3 Let s see what s inside this encrypted.enc file Doesn t look promising (at least at the moment)
38 Reversing.app7 #4 Let s see it with OllyDbg
39 Reversing.app7 #5 jnz->jz? YEAH! We got junk
40 Reversing.app7 #6 Oh well It didn t worked Off we go to IDA Pro
41 Reversing.app7 #7 So we need to get 0DCAh
42 Reversing.app7 #8 Oh no it s not gonna be that easy dude
43 Reversing.app7 #9 This is the interesting part which handles our buffer and the.enc file
44 Reversing.app7 #10 The general thing that is happening in this block is that it runs 5 times and every time reads a character from the.enc file. The characters that were read (in hex) are "31,4D,39,35,33" or in ascii "1M953". This is not the password but it will help us get the password (this is the key from the.enc file)
45 Reversing.app7 #11
46 Reversing.app7 #12 Next, the app takes the user input + [ENTER=A] So if our input is A it will be 41+A=4B, if it s AA it will be A=8C Then place it in var_1c and xor it with each of the 5 chars.
47 Reversing.app7 #13
48 Reversing.app7 #14 Adds all of them and place the result in var_18 which needs to be cmp with "0DCAh" (3530). So 31xor8C+4Dxor8C+39xor8C+35xor8C+33 xor8c =3AB Is it true??? Nop
49 Reversing.app7 #15
50 Reversing.app7 #16 So to solve this problem we need to have: 31xorX+4DxorX+39xorX+35xorX+33xorX= 0DCA So what is X???
51 Reversing.app7 #17 To solve it we can just brute force it. So we will try first "A" as input, then "AA" then "AAA" until we will get the right result. At the end the result was that as long as our input equal 753 (2F1) it would solve the problem. Therefore it doesn't really matter what is the input as long as it's 753 together.
52 Reversing.app7 #18 I have used: ccccccc2 We need to remember that at the end of our input there is "enter" which is 10 so our total should be actually 743. c(99)+ c(99)+ c(99)+ c(99)+ c(99)+ c(99)+ c(99)+ 2(50)+ENTER(10)=753. So: 31xor2F1+4Dxor2F1+39xor2F1+35xor2F1 +33xor2F1=0DCA
53 Reversing.app7 #19
54 Reversing.app7 #20 Game over!
55 Reversing.app13 #1 Let s run it
56 Reversing.app13 #2
57 Reversing.app13 #3 So let s skip IDA & Olly and check the hints
58 Reversing.app13 #4 We can monitor the time that takes the app to check every number that we enter Python script that gets and monitor how much time takes the app to check it Slowest number is the right one (?) Close even explorer.exe because it takes CPU power and could change our results
59 Reversing.app13 #5 So let s do a quick & dirty BF to this app
60 Reversing.app13 #6 And run it
61 Reversing.app13 #7
62 Reversing.app13 #8 Let s just to it 3 more times, every time adding the last value instead of the dummy one that we had
63 Reversing.app13 #9 Our monitoring worked!
64 Forensics.1 #1 We get this: And a file: image.tar.gz
65 Forensics.1 #2
66 Forensics.1 #3 So we need to find a password First thing first, extract the file. We get a dd file - image.dd Let s check what s in there real quick
67 Forensics.1 #4 Looks like we got an NTFS windows system
68 Forensics.1 #5
69 So it s mounted Forensics.1 #6
70 Forensics.1 #7 3 empty folders
71 Forensics.1 #8 Well it s a forensics challenge So probably we need to recover some deleted data. Let s try to see what kind of deleted files are there.
72 Forensics.1 #9
73 Forensics.1 #10 We ve got 17 files, different types.
74 Forensics.1 #11 Oh boy well let s check the other files We ve got a media file: Voic 1.wav When played we can hear the Tech Support guy telling stacy that the password is her phone number. And what is her phone number?
75 Forensics.1 #12 Let s dig some more, we can see that there is a file called Termination - Allen Smith.docx
76 Forensics.1 #13 Using the phone number we can extract the content of Your new password is.rar Inside there is a file called Your new password is.docx Inside we got our password
77 Forensics.1 #14 We ve saved the world again!
78 To Wrap It Up Hacking challenges sites are KEWL It helps you practice your skills & prepare for CTF games You have a community to support you while trying
79 # E [0] F # Q? the lounge now or) >> lament [AT] ilhack [DOT] org Join In god we trust, all others we monitor.
9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired?
Page: 1 of 14 1 R1 And this is tell me what this is? 2 Stephanie x times y plus x times y or hm? 3 R1 What are you thinking? 4 Stephanie I don t know. 5 R1 Tell me what you re thinking. 6 Stephanie Well.
More informationA practicalintroduction to embedded programming. Brian Plancher 10/17/2018
A practicalintroduction to embedded programming Brian Plancher Brian_Plancher@g.harvard.edu 10/17/2018 This week s task is simple: 1. Since the boards you made 2 weeks ago are perfect and are still in
More informationIntro. Scheme Basics. scm> 5 5. scm>
Intro Let s take some time to talk about LISP. It stands for LISt Processing a way of coding using only lists! It sounds pretty radical, and it is. There are lots of cool things to know about LISP; if
More informationINSIDE THE ULTIMA ONLINE CLIENT - INSERTING A SLEEP
INSIDE THE ULTIMA ONLINE CLIENT - INSERTING A SLEEP GOAL The Ultima Online client utilizes too much CPU power when it s not doing anything useful. For example, when we are at the logon screen or when we
More informationPSoC Academy: How to Create a PSoC BLE Android App Lesson 3: Configure the BLE Component 1
1 Welcome back. At this point we ve completely configured our schematic. The schematic will define all of the firmware that will run inside of our project. Remember there s two things going on. There will
More informationThe purchaser of the ebook is licensed to copy ebook for use with immediate family members only.
Copyright 2017 Leah Nieman www.leahnieman.com All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical,
More informationXchange for Samsung MAC User Guide. Version 2.4
Xchange for Samsung MAC User Guide Version 2.4 Contents Welcome to Xchange for Samsung Mac Desktop Client... 32 How to Install Xchange... 3 Where is it?... 43 The Dock menu... 4 The menu bar... 4 Preview
More information4Sight for Mac User Guide. Version 2.4
4Sight for Mac User Guide Version 2.4 Contents Welcome to 4Sight for Mac Desktop Client... 3 How to Install 4Sight... 3 Where is it?... 4 The Dock menu... 4 The menu bar... 4 Phone window... 5 Preview
More information(Refer Slide Time 6:48)
Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 8 Karnaugh Map Minimization using Maxterms We have been taking about
More informationHow To Upload Your Newsletter
How To Upload Your Newsletter Using The WS_FTP Client Copyright 2005, DPW Enterprises All Rights Reserved Welcome, Hi, my name is Donna Warren. I m a certified Webmaster and have been teaching web design
More information5 R1 The one green in the same place so either of these could be green.
Page: 1 of 20 1 R1 Now. Maybe what we should do is write out the cases that work. We wrote out one of them really very clearly here. [R1 takes out some papers.] Right? You did the one here um where you
More information1.7 Limit of a Function
1.7 Limit of a Function We will discuss the following in this section: 1. Limit Notation 2. Finding a it numerically 3. Right and Left Hand Limits 4. Infinite Limits Consider the following graph Notation:
More informationLab #2 Physics 91SI Spring 2013
Lab #2 Physics 91SI Spring 2013 Objective: Some more experience with advanced UNIX concepts, such as redirecting and piping. You will also explore the usefulness of Mercurial version control and how to
More informationCTF Workshop. Crim Synopsys, Inc. 1
CTF Workshop Crim2018 31.10.2018 2018 Synopsys, Inc. 1 CTF (Capture the Flag) Capture the Flag (CTF) is a computer security competition. CTF are usually designed test and teach computer security skills.
More informationWeb Hosting. Important features to consider
Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,
More informationJacksonville Linux User Group Presenter: Travis Phillips Date: 02/20/2013
Jacksonville Linux User Group Presenter: Travis Phillips Date: 02/20/2013 Welcome Back! A Quick Recap of the Last Presentation: Overview of web technologies. What it is. How it works. Why it s attractive
More informationNo con Name Facebook CTF Quals 2013
No con Name Facebook CTF Quals 2013 Dragon Sector write-ups Team information Please use the following e mail address to contact our team's captain: gynvael@coldwind.pl If qualified, we will provide a list
More informationSucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead
Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead 1 Question #1: What is the benefit to spammers for using someone elses UA code and is there a way
More informationMITOCW watch?v=se4p7ivcune
MITOCW watch?v=se4p7ivcune The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More information10 Online Tools. To Streamline Your Personal Trainer Marketing
With the busy lives we lead, personal trainers often ask how to make their lives easier and how to automate and streamline their marketing. I ve found a suite of core services that tick all the doing more
More informationDownload Sat study guide answers
Sat study guide answers DownloadSat study guide answers. Free Pdf Download 2004-08-04 12 00 20480 c windows system32 wmpui. Many national chain stores have unlocked phones n their websites - even places
More informationServers & Developers. Julian Nadeau Production Engineer
Servers & Developers Julian Nadeau Production Engineer Provisioning & Orchestration of Servers Setting a server up Packer - one server at a time Chef - all servers at once Containerization What are Containers?
More informationReverse Engineering For The Not So Backward
Reverse Engineering For The Not So Backward It is a Friday night and I am sitting home hyped up on caffeine and resting from a long work week. I like to relax on Friday nights and get stuff done, such
More informationPractical Malware Analysis
Practical Malware Analysis Ch 4: A Crash Course in x86 Disassembly Revised 1-16-7 Basic Techniques Basic static analysis Looks at malware from the outside Basic dynamic analysis Only shows you how the
More informationLecture 1: Overview
15-150 Lecture 1: Overview Lecture by Stefan Muller May 21, 2018 Welcome to 15-150! Today s lecture was an overview that showed the highlights of everything you re learning this semester, which also meant
More informationRev101. spritzers - CTF team. spritz.math.unipd.it/spritzers.html
Rev101 spritzers - CTF team spritz.math.unipd.it/spritzers.html Disclaimer All information presented here has the only purpose of teaching how reverse engineering works. Use your mad skillz only in CTFs
More informationChapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change
Chapter01.fm Page 1 Monday, August 23, 2004 1:52 PM Part I The Mechanics of Change The Mechanics of Change Chapter01.fm Page 2 Monday, August 23, 2004 1:52 PM Chapter01.fm Page 3 Monday, August 23, 2004
More informationCOMP : Practical 9 ActionScript: Text and Input
COMP126-2006: Practical 9 ActionScript: Text and Input This practical exercise includes two separate parts. The first is about text ; looking at the different kinds of text field that Flash supports: static,
More information6 Stephanie Well. It s six, because there s six towers.
Page: 1 of 10 1 R1 So when we divided by two all this stuff this is the row we ended up with. 2 Stephanie Um hm. 3 R1 Isn t that right? We had a row of six. Alright. Now before doing it see if you can
More informationCivil Engineering Computation
Civil Engineering Computation First Steps in VBA Homework Evaluation 2 1 Homework Evaluation 3 Based on this rubric, you may resubmit Homework 1 and Homework 2 (along with today s homework) by next Monday
More informationWeek - 01 Lecture - 04 Downloading and installing Python
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and
More informationClickbank Domination Presents. A case study by Devin Zander. A look into how absolutely easy internet marketing is. Money Mindset Page 1
Presents A case study by Devin Zander A look into how absolutely easy internet marketing is. Money Mindset Page 1 Hey guys! Quick into I m Devin Zander and today I ve got something everybody loves! Me
More informationChapter 1. Getting Started
Chapter 1. Hey, Logy, whatcha doing? What s it look like I m doing. I m cleaning the windows so we can get started on our new adventure. Can t you leave the housekeeping until later. We ve got Logo work
More informationWin-Back Campaign- Re-Engagement Series
Win-Back Campaign- Re-Engagement Series At this point the re-engagement campaign has ended, so if the prospect still hasn t responded it s time to turn up the heat. NOTE: In the emails below, everywhere
More informationICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions:
Recorded in October, 2009 [Music Intro] ICANN Start, Episode 1: Redirection and Wildcarding Welcome to ICANN Start. This is the show about one issue, five questions: What is it? Why does it matter? Who
More informationLesson 9 Transcript: Backup and Recovery
Lesson 9 Transcript: Backup and Recovery Slide 1: Cover Welcome to lesson 9 of the DB2 on Campus Lecture Series. We are going to talk in this presentation about database logging and backup and recovery.
More informationDecisions, Decisions. Testing, testing C H A P T E R 7
C H A P T E R 7 In the first few chapters, we saw some of the basic building blocks of a program. We can now make a program with input, processing, and output. We can even make our input and output a little
More informationOracle Cloud. Content and Experience Cloud ios Mobile Help E
Oracle Cloud Content and Experience Cloud ios Mobile Help E82090-01 February 2017 Oracle Cloud Content and Experience Cloud ios Mobile Help, E82090-01 Copyright 2017, 2017, Oracle and/or its affiliates.
More informationIf Statements, For Loops, Functions
Fundamentals of Programming If Statements, For Loops, Functions Table of Contents Hello World Types of Variables Integers and Floats String Boolean Relational Operators Lists Conditionals If and Else Statements
More informationHey there, I m (name) and today I m gonna talk to you about rate of change and slope.
Rate and Change of Slope A1711 Activity Introduction Hey there, I m (name) and today I m gonna talk to you about rate of change and slope. Slope is the steepness of a line and is represented by the letter
More informationThe name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet.
Mr G s Java Jive #2: Yo! Our First Program With this handout you ll write your first program, which we ll call Yo. Programs, Classes, and Objects, Oh My! People regularly refer to Java as a language that
More informationTranscriber(s): Aboelnaga, Eman Verifier(s): Yedman, Madeline Date Transcribed: Fall 2010 Page: 1 of 9
Page: 1 of 9 0:00 1 R1 The color s not going to show a little bit, but okay. Okay. So, um, a plus b quantity cubed, you said, means Stephanie a plus b times a plus b times a plus b /R1 3 R1 Okay, so you
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 04 Tutorial 1, Part 1 Ubuntu Hi everyone, welcome to the first
More informationBEGINNER PHP Table of Contents
Table of Contents 4 5 6 7 8 9 0 Introduction Getting Setup Your first PHP webpage Working with text Talking to the user Comparison & If statements If & Else Cleaning up the game Remembering values Finishing
More informationMITOCW watch?v=0jljzrnhwoi
MITOCW watch?v=0jljzrnhwoi The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationChapter 1. Data types. Data types. In this chapter you will: learn about data types. learn about tuples, lists and dictionaries
Chapter 1 Data types In this chapter you will: learn about data types learn about tuples, lists and dictionaries make a magic card trick app. Data types In Python Basics you were introduced to strings
More informationStarting Boolean Algebra
Boolean Algebra March 2, 27 Diagram for FunChip2 Here is a picture of FunChip2 that we created more or less randomly in class on /25 (used in various Activities): Starting Boolean Algebra Boolean algebra
More informationComputer Science 324 Computer Architecture Mount Holyoke College Fall Topic Notes: Bits and Bytes and Numbers
Computer Science 324 Computer Architecture Mount Holyoke College Fall 2007 Topic Notes: Bits and Bytes and Numbers Number Systems Much of this is review, given the 221 prerequisite Question: how high can
More informationMonitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins
Monitoring Tool Made to Measure for SharePoint Admins By Stacy Simpkins Contents About the Author... 3 Introduction... 4 Who s it for and what all can it do?... 4 SysKit Insights Features... 6 Drillable
More informationIMPORTANT WORDS AND WHAT THEY MEAN
MOBILE PHONES WHAT IS DATA Data is Internet. It can let you do lots of different things on your phone or tablet. You can send or receive texts, emails or photos, listen to music, watch TV shows, movies
More informationHow To Set User Account Password In Windows 7 From Guest
How To Set User Account Password In Windows 7 From Guest To change the password of a specific user in windows 7 or 8.1, without knowing How to change or set Windows 7 default font settings to bold, italic?
More informationMr G s Java Jive. #11: Formatting Numbers
Mr G s Java Jive #11: Formatting Numbers Now that we ve started using double values, we re bound to run into the question of just how many decimal places we want to show. This where we get to deal with
More information(Refer Slide Time 3:31)
Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions
More informationDigital Workflow 10 Tech Rules to Guide You
Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy
More informationSPRITES Moving Two At the Same Using Game State
If you recall our collision detection lesson, you ll likely remember that you couldn t move both sprites at the same time unless you hit a movement key for each at exactly the same time. Why was that?
More informationHaving problems accessing the Closed Public Beta? This F.A.Q will guide you and answer the most frequently encountered problems.
Having problems accessing the Closed Public Beta? This F.A.Q will guide you and answer the most frequently encountered problems. I. Where can I retrieve my M&M Heroes 6 Beta Key 2. I didn t receive my
More informationCIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability
CIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability CIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability Featuring Accenture managing directors
More informationMITOCW watch?v=w_-sx4vr53m
MITOCW watch?v=w_-sx4vr53m The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources for free. To
More informationIntro to x86 Binaries. From ASM to exploit
Intro to x86 Binaries From ASM to exploit Intro to x86 Binaries I lied lets do a quick ctf team thing Organization Ideas? Do we need to a real structure right now? Mailing list is OTW How do we get more
More informationMemory Addressing, Binary, and Hexadecimal Review
C++ By A EXAMPLE Memory Addressing, Binary, and Hexadecimal Review You do not have to understand the concepts in this appendix to become well-versed in C++. You can master C++, however, only if you spend
More informationLesson 13 Transcript: User-Defined Functions
Lesson 13 Transcript: User-Defined Functions Slide 1: Cover Welcome to Lesson 13 of DB2 ON CAMPUS LECTURE SERIES. Today, we are going to talk about User-defined Functions. My name is Raul Chong, and I'm
More informationSubversion was not there a minute ago. Then I went through a couple of menus and eventually it showed up. Why is it there sometimes and sometimes not?
Subversion was not there a minute ago. Then I went through a couple of menus and eventually it showed up. Why is it there sometimes and sometimes not? Trying to commit a first file. There is nothing on
More informationDetailed instructions for adding (or changing) your Avatar (profile picture next to your
Detailed instructions for adding (or changing) your Avatar (profile picture next to your name) on Ustream (disclaimer this is how it works for me using Internet Explorer it may look slightly different
More informationBasic Reliable Transport Protocols
Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they
More informationIntegrating Spatial Data with the rest of your E&P Data
Integrating Spatial Data with the rest of your E&P Data ESRI PUG Houston 11-March-2003 Ian Batty PPDM Association 1 PPDM Association Public Petroleum Data Model Association The PPDM Association is a non-profit
More informationOracle Cloud. Content and Experience Cloud Android Mobile Help E
Oracle Cloud Content and Experience Cloud Android Mobile Help E82091-01 Februrary 2017 Oracle Cloud Content and Experience Cloud Android Mobile Help, E82091-01 Copyright 2017, Oracle and/or its affiliates.
More informationDigital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience
Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,
More informationHow To Create Backlinks
How To Create Backlinks 1 Page Contents Who Is This Book For?... 3 A Trip In The Way-Back Machine... 4 A Little Refresher... 4 How To Build Backlinks... 6 Build Backlinks With Guest Posts... 7 Build Backlinks
More informationWhat did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation
Week 12 - Friday What did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation Here is some code that sorts an array in ascending order
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 07 Tutorial 2 Part 1 Facebook API Hi everyone, welcome to the
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)
More informationMobile Computing Professor Pushpedra Singh Indraprasth Institute of Information Technology Delhi Andriod Development Lecture 09
Mobile Computing Professor Pushpedra Singh Indraprasth Institute of Information Technology Delhi Andriod Development Lecture 09 Hello, today we will create another application called a math quiz. This
More informationLocate it inside of your Class/DreamWeaver folders and open it up.
Simple Rollovers A simple rollover graphic is one that changes somehow when the mouse rolls over it. The language used to write rollovers is JavaScript. Luckily for us, when we use DreamWeaver we don t
More informationThe first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below.
Graphing in Excel featuring Excel 2007 1 A spreadsheet can be a powerful tool for analyzing and graphing data, but it works completely differently from the graphing calculator that you re used to. If you
More informationIT 280 Study Guide Winter Don Colton Brigham Young University Hawai i
IT 280 Study Guide Winter 2013 Don Colton Brigham Young University Hawai i March 27, 2013 1 This is the Official IT 280 Study Guide for the IT 280 Computer Networking class taught by Don Colton, Winter
More informationPHP & MySQL For Dummies, 4th Edition PDF
PHP & MySQL For Dummies, 4th Edition PDF Here's what Web designers need to know to create dynamic, database-driven Web sites To be on the cutting edge, Web sites need to serve up HTML, CSS, and products
More informationGrade 6 Math Circles November 6 & Relations, Functions, and Morphisms
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Relations Let s talk about relations! Grade 6 Math Circles November 6 & 7 2018 Relations, Functions, and
More informationMultiple Variable Drag and Drop Demonstration (v1) Steve Gannon, Principal Consultant GanTek Multimedia
Multiple Variable Drag and Drop Demonstration (v1) Steve Gannon, Principal Consultant GanTek Multimedia steve@gantekmultimedia.com Back Story An associate of mine, Marc Lee (a Flash coder and fellow Articulate
More informationECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017
ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 Combinational Logic Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke) Last
More informationProgramming Project #6: Password File Cracker
CSE231 Spring 2017 Programming Project #6: Password File Cracker (Edits: changed itertools permutations to product either works for these passwords, but product is the correct one. Removed lists and tuples
More informationCSCI 1100L: Topics in Computing Lab Lab 11: Programming with Scratch
CSCI 1100L: Topics in Computing Lab Lab 11: Programming with Scratch Purpose: We will take a look at programming this week using a language called Scratch. Scratch is a programming language that was developed
More informationLeakDAS Version 4 The Complete Guide
LeakDAS Version 4 The Complete Guide SECTION 4 LEAKDAS MOBILE Second Edition - 2014 Copyright InspectionLogic 2 Table of Contents CONNECTING LEAKDAS MOBILE TO AN ANALYZER VIA BLUETOOTH... 3 Bluetooth Devices...
More informationText Input and Conditionals
Text Input and Conditionals Text Input Many programs allow the user to enter information, like a username and password. Python makes taking input from the user seamless with a single line of code: input()
More informationImage Credit: Photo by Lukas from Pexels
Are you underestimating the importance of Keywords Research In SEO? If yes, then really you are making huge mistakes and missing valuable search engine traffic. Today s SEO world talks about unique content
More informationBlitz! (Outlook 2011 for Mac)
Email Blitz! (Outlook 2011 for Mac) Finding your inbox unmanageable? Follow the tips in this document to take back control. Tips for having a thorough clear out The techniques here can be used when spring
More informationPersonal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018
Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About
More informationmarketing versus marketing automation What s the difference and why should B2B marketers care?
email marketing versus marketing automation What s the difference and why should B2B marketers care? who is this white paper for? You re a B2B marketer in a company that s been using email marketing for
More informationWHAT IS GOOGLE+ AND WHY SHOULD I USE IT?
CHAPTER ONE WHAT IS GOOGLE+ AND WHY SHOULD I USE IT? In this chapter: + Discovering Why Google+ Is So Great + What Is the Difference between Google+ and Other Social Networks? + Does It Cost Money to Use
More informationMeet our Example Buyer Persona Adele Revella, CEO
Meet our Example Buyer Persona Adele Revella, CEO 685 SPRING STREET, NO. 200 FRIDAY HARBOR, WA 98250 W WW.BUYERPERSONA.COM You need to hear your buyer s story Take me back to the day when you first started
More informationPenguin/Panda SEO Interview with Eric Lanchares
Penguin/Panda SEO Interview with Eric Lanchares Ezra: Hey, everyone. Ezra Firestone here. I m with my good buddy, Eric Lanchares, the SEO Doctor. I don t think they saw your wave. He s on a bouncy ball
More informationGetting Started. Excerpted from Hello World! Computer Programming for Kids and Other Beginners
Getting Started Excerpted from Hello World! Computer Programming for Kids and Other Beginners EARLY ACCESS EDITION Warren D. Sande and Carter Sande MEAP Release: May 2008 Softbound print: November 2008
More informationSIMPLE PROGRAMMING. The 10 Minute Guide to Bitwise Operators
Simple Programming SIMPLE PROGRAMMING The 10 Minute Guide to Bitwise Operators (Cause you've got 10 minutes until your interview starts and you know you should probably know this, right?) Twitter: Web:
More informationBackend IV: Authentication, Authorization and Sanitization. Tuesday, January 13, 15
6.148 Backend IV: Authentication, Authorization and Sanitization The Internet is a scary place Security is a big deal! TODAY What is security? How will we try to break your site? Authentication,
More informationIn today s video I'm going show you how you can set up your own online business using marketing and affiliate marketing.
Hey guys, Diggy here with a summary of part two of the four part free video series. If you haven't watched the first video yet, please do so (https://sixfigureinc.com/intro), before continuing with this
More informationPart 6b: The effect of scale on raster calculations mean local relief and slope
Part 6b: The effect of scale on raster calculations mean local relief and slope Due: Be done with this section by class on Monday 10 Oct. Tasks: Calculate slope for three rasters and produce a decent looking
More informationStoryStylus Scripting Help
StoryStylus Scripting Help Version 0.9.6 Monday, June 29, 2015 One More Story Games, Inc. 2015 Contents Versions... 3 Scripting User Interface... 4 Script Triggers... 5 If-Then Scripting Language... 6
More informationClose Your File Template
In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of
More informationUpload Your Site. & Update. How to
15 From the book, The Non-Designer s Web Book, How to Upload Your Site by Robin Williams and john Tollett On the shelves in late September 1997 Robin Williams and John Tollett & Update Your web site is
More informationWeb Server Setup Guide
SelfTaughtCoders.com Web Server Setup Guide How to set up your own computer for web development. Setting Up Your Computer for Web Development Our web server software As we discussed, our web app is comprised
More informationOpenCTF 2015 write-ups [vulscryptos]
OpenCTF 2015 write-ups [vulscryptos] vulscryptos scored 1910 pts, ranked 4th. So close! It was great fun. Many thanks to the organizers! 37. Sanity Check (trivia 10) Hack the Planet! 7. Runic Power (binary,
More information