<deb61fd5 4d79 a Fri, Feb 17, 2017 at 4:08 PM (Delivered after 8 seconds) Bill MacKenty

Size: px
Start display at page:

Download "<deb61fd5 4d79 a Fri, Feb 17, 2017 at 4:08 PM (Delivered after 8 seconds) Bill MacKenty"

Transcription

1 Original Message Message ID Created at: From: To: Subject: SPF: DKIM: <deb61fd5 4d79 a Fri, Feb 17, 2017 at 4:08 PM (Delivered after 8 seconds) John Dalbey <jdalbey@calpoly.edu Bill MacKenty <bmackenty@aswarsaw.org Re: permission to use your material NEUTRAL with IP Learn more PASS with domain cpslo.onmicrosoft.com Learn more Download Original Copy to clipboard Delivered-To: bmackenty@aswarsaw.org Received: by with SMTP id y138csp209947qka; Fri, 17 Feb :09: (PST) X-Received: by with SMTP id n188mr iof ; Fri, 17 Feb :09: (PST) Return-Path: <jdalbey@calpoly.edu Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0118.outbound.protection.outlook.com. [ ]) by mx.google.com with ESMTPS id 89si ioi for <bmackenty@aswarsaw.org (version=tls1_2 cipher=ecdhe-rsa-aes128-sha bits=128/128); Fri, 17 Feb :09: (PST) Received-SPF: neutral (google.com: is neither permitted nor denied by best guess record for domain of jdalbey@calpoly.edu) client-ip= ; Authentication-Results: mx.google.com; dkim=pass header.i=@cpslo.onmicrosoft.com; spf=neutral (google.com: is neither permitted nor denied by best guess record for domain of jdalbey@calpoly.edu) smtp.mailfrom=jdalbey@calpoly.edu DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cpslo.onmicrosoft.com; s=selector1-calpoly-edu; h=from:date:subject:message-id:content-type:mime-version;

2 bh=srxpdpt/4z8nffaxy6ctbr3bh3ftgy8vr0bjvk8barw=; b=rghhofxcjilnagk0+azvrshs/yzf1mmyikpqylvtofxl/hrb9gha1tkbdd7ee K08cCAYVPp5/oDgCkMr++uggKn9C3VOaB+qjs3NI7jAFefXzH4KFKTe8TU7iWTn 5uH0PxxWT3dVICtaMrXO/L3tqq9QRHBrPzx/+bFiyrK1soo= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=jdalbey@calpoly.edu; Received: from [IPv6:2602:306:b8ee:75a0:f038:65ea:1c85:33fc] (2602:306:b8ee:75a0:f038:65ea:1c85:33fc) by BLUPR08MB1300.namprd08.prod.outlook.com ( ) with Microsoft SMTP Server (version=tls1_2, cipher=tls_ecdhe_rsa_with_aes_256_cbc_sha384_p384) id ; Fri, 17 Feb :09: Subject: Re: permission to use your material To: Bill MacKenty <bmackenty@aswarsaw.org References: <CAJXBrUgbh2DpzeQiVdxipNhpkFvAYS4TeeDRH=ewTKSz3+w3mQ@mail.gmail.com From: John Dalbey <jdalbey@calpoly.edu Message-ID: <deb61fd5-4d79-a eb4a1b5d4348@calpoly.edu Date: Fri, 17 Feb :08: User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/ Thunderbird/ MIME-Version: 1.0 In-Reply-To: <CAJXBrUgbh2DpzeQiVdxipNhpkFvAYS4TeeDRH=ewTKSz3+w3mQ@mail.gmail.com Content-Type: multipart/alternative; boundary=" B B4A60F " X-Originating-IP: [2602:306:b8ee:75a0:f038:65ea:1c85:33fc] X-ClientProxiedBy: DM5PR12CA0068.namprd12.prod.outlook.com ( ) To BLUPR08MB1300.namprd08.prod.outlook.com ( ) Return-Path: jdalbey@calpoly.edu X-MS-Office365-Filtering-Correlation-Id: e2a94c00-d7ab-422e d45746e97a X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID: (22001);SRVR:BLUPR08MB1300; 1;BLUPR08MB1300;3:XQ5EtkxFC6JncvWy9GaGRo8SJ9Z7xbUTl9dtrlMQTln2q czfq8ox3gdnl6dzb+psovmtnzmnj1gkjuh957avg3rv6nsiyoi4fjtcvvguthl2 3XQAiyd8uXakomT4Q5mmoYoHmiXYBOjJaMKQCoCNuT+np+hb9t8lI/YxJe0xcim FM81y5SevJEivEokN2GSev9D7YIK6GTaos4eYc4aE/bIQwlfsWFJL51X2OX+6Da nvkg6rid9vqpfoie1tziqyd6ofi4g5vg8e1bym61yqqg==;25:exqns4fpsuq0m adjxkox/bh2ipitm3h6fbp6uiycxhlck96q6rugfqj50p1/hn1ijwcel/myjleu 6d78+gl0c6+BGga4LzMOukv7Jb12d14iSMaywpn7izJnEDOvwMQqgIRU4wbkssw rpmu2q4jdkvnd0knc1q8tzebbhlfowxlfzdt1rvapkziro83skpn1h6whqlwray RH4rrn1pOr3GcDxy7i6jqdJSHULgeXNzxHQU4DBCkp8Sq+aEKsIa/fWnzkyZT/m OlHqkxz69tNmovyofDPRbPbZD5qpDG98lyt2rMQzhFKZG//wTY+3o5VG17DC4Vm +1SFUp933F8vaAUJdIlrF7+d/gLLhQf2GvVK/z3syjU2UVEfdUVySosg1Va6Yp7 /RHQ1AXwTsk6OlFX7KyNdGe70aY3awlS5KChQNzz8as0tjydmHKlBg1RlVZ+tTG fv/uvnub9cgkncrg== 1;BLUPR08MB1300;31:34pztX9xT8QDZfHuBydoDb+MFH64oRFA1ieNUYv/JkPK FraiUN3BnMAbt8WTU5wG7A2+VVR0TWcI7Et7caM1Oiehoq4eUtW3e80Akw4y6Zr SBdqRvXqMeYJe1fiEImZr05tzHL+H/a7llDYtcdyuyONSH/47DlR3az11QaaJwR uj+sziytnottsksahn6zbyzpzhtxu74kchucedvcd4oghfvjdbdkoganz3jdq4k AOnMGUArfTpXZCjMJEoJzAA;20:p2jYSIV2MOMQA1lzOePw+u0JgrxfHmDpN04N 0zaR19BVypCJ5MU5+DbLC3NFugyC7JdZstrLxxxeuMy9mkd6Ba/F+PHJ7OLXZpQ 2qFHJgTM/47WpwH47bILHRR6jDye29Eq/H8ff2O4DHhCdW/RU92aMky+ZKp5s8n plittluhi9ghgjc2cb5tefp5eatjnpi4cnrus518b8ss1ajpulqlb8egjwojmmy jxpn2jeuz6yzrl9mtu8cewv/iycraj8m2o0em8mc3nrghddu1jcesyrep5wtpuq

3 XIsNlvalUnRnnMWny8JBnwzfiR9Xhok1ryebHfVcfJcg+5nlGBJSS+y1cSd8k6n fri9noapx/hc+wdde/ijgntpzwjgubrguhm1ossf5mjwcvceb9cji27ae0gunvd ojlphn4pkbrlxp/dugvsywqyxtlxdmx/jrjhghmeznrnmqfdvx9ss/hb/+t6lqy Cqj2MZVUmh9Px8lv6x64u2wFvc5shrH5X8F X-Microsoft-Antispam-PRVS: prod.outlook.com X-Exchange-Antispam-Report-Test: UriScan:( ) ( ); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID: ( )(601004)( )( )( )( ) ( )( )( )( ) ( )( )( ) ( );SRVR:BLUPR08MB1300;BCL:0;PCL:0;RULEID:;SRVR:BLUPR08MB 1300; 1;BLUPR08MB1300;4:ww41ytIEHWVwA4Rk1QXSRrzfTQCUbbuSDuKvJdLv2e2dK YjRl7I1rXXKEB+cHxS3JW1h3sDEaaMFACqKlcUZtsEa8p45BAF0ro9Gw9BqVwA/ 8MhuN5CfjOa942GbhOT+rTQ4+NnJ7+kH7gUNHamDM+bZ37JaPjx5PjPVpyHlZCG N+s5yNN+EF+nbMktrLbSgHXY3HcWbUK2pDkV9rgNN2Go4jnMCVRxSvodvZ0+4q8 OnsJjaUroYMbv5kSpBAMjSwDJjxwpEDFisfBYYM/NzkDHbxFz3uiQbGzK4DQgtB ELpuF+GlPSJZ/5sczPqfuOalk11a73boK/offp2dWZAQxoz57qaxL+tMDu96XiQ D+kEMhKpDPAZrhOZaYxyMt1g22llRK1YNnXQyX9EPrz1bxoXH15T3ShQyoYaJAj gwgksqxwq06kxeeuzwox4m0+sqhh0txlxpvl2ev4eeozpaqcnd0vulw2lgmvjdv oj0zwl55aal3s7ngpt3ix14ncywtl1sedexm2oqcp/hbl7vka5eqmlmdrkm6wgb Ik8PJvMvOCf+SwqXzB4gzxwMnBmzpCceOj3cNsiKDcxo1c5U8IICsZFqrTjXZB2 443a4qVhv3H0IvY9eQGBttmTUFne2r9m1Md0zgG7I3a+Ak259Dlg76ZT2lmA8AZ cqrops8rwqwgdelfxe4nds/ybkbrb X-Forefront-PRVS: 02213C82F8 X-Forefront-Antispam-Report: SFV:NSPM;SFS:( ) ( )( )( )( )(189002)( ) ( )(199003)( )( )( )( ) ( )( )( )( )( )( ) ( )( )( )( )(966004)( ) ( )( )( )( )( )( ) ( )( )( )( )( ) ( )( )( )(606005)( )( ) ( )( )( )( )( )(236005) ( )( )( )( )(733005)( ) ( )( )( )( )( )( ) ( )( )( )( )( )( ) ( )( );DIR:OUT;SFP:1102;SCL:1;SRVR:BLUPR08MB1300;H: [IPv6:2602:306:b8ee:75a0:f038:65ea:1c85:33fc];FPR:;SPF:None;PTR :InfoNoRecords;MX:1;A:1;LANG:en; Received-SPF: None (protection.outlook.com: calpoly.edu does not designate permitted sender hosts) 1;BLUPR08MB1300;23:URpcQC0SiwdUHGsVeMbTdeOiAnbfI0tQnQCPGyIpSGAE PV4zcbmVWqJNAaEr0UweGmBSIDS7UMhr2dzUBf7MFC4UOKsuDnhp7BQsaZO0js7 bf2xz6xww6ggzv1ij5gopwgutqtfivup7oki5/va0uzy/pldpcvox1ncl/iadql UT0GN6eJOF+VgCur9/R2Uh1ALfxKJ1x7l8lEAT353HtLIseiDA/3jOw32ix1UVG D2RqB4OAdQ0K2FSnOVW3LFj/PAmSPU8cfcYzHCtQo2dwgzCseArfw6RA+0qkHWD h2jstbmoxky48spzmd6la5z/4ezpzzfat1yyttqz5ajjw7z9iitalbh/zl3wim1 9GDQh0BC5xsGMujw/2NjAP8cLkEWkQbhyDL3kz4KEXB4p2tq7dGnfZ0b5ngrlR7 9lQEQlbs2P/dbzoyoe7XoyrSmqbjqGQVDecKWR3r70uuo8CKGpyLsKzacBmBnfR hgb1kqlr5qbdl8k7cfq8jr4tjcmavg7ycntl4e9fo30xnnpgm9+ybabszijqzid cc/dz63hardqrtafnira5aqvc/iaaugklk+zldqyneqlmhs2lla6g1y62kvb49p hucdj5qzwd6vnswydscljxdehku6k87cqiqg1psv6h/pgolxs2j7slwsyvwahil qep9zeijbc9mvvujogvr5vdf+ydxbgoh2vcz7yq4cfb7a19mkutnsoewlnt95be FrbAkxRE7EWLXFwZ9oHcpLQPwZajLinDI35NLRQEypNWjP9HclufmGyFfsoBL8j cgt4ciewnmygefwzdik4rthcty+qatibpsxp4k4kq3lgepyxwowmnccayuv4g9j

4 h8iu/tsdxhym3oxgglaxtlybpfoo2tsoxwtty5n2f2hf8xjwge5phlppt01fbvv 4nwGgd6N5fvIayN7VpWIadwxIc2Ddev5ggH8Rcdq+XBLqet8u0QDFxS3ps7Cc6v NoYo9AV6yCLoRo8TKKlokEbIbAq10UOetXHUYpuqS82E/x21WDdLUd0XT9bU0bh AoTUzZ6XGCKCC+h6nhjnxhLnG5rIo5RKMp//zLLnY2xXZQKoDROw9LPvSsbKBYc EVYzaAjjawDbEI7jjP+3NW1dZHqCz+MCWfEXSuzy0axU77/VVN7/VZRZ4YF6Gau Wu+y5yk5mhZ9v/kgCtnvpHOfqXn4xibeq634hTzwdBNw6+/F2jMP2UKkW2JaUPP ruycew4d+j/1pflbhc5gmuxqcupxqtev+5cq5ap++y1/crlp4x1ovndcxkrvguv KGgvWn9NNIsmxhjJrXV0wwmiLjB2wj+AOtwgrtxZEMadTg4jeodIlwX2bwY8MxG fx7ri4ftn5ryhvvf+m4zvx/267szazvk3hhbjzqu+bio5bmo/9xf1e70qqis8lb COS2WllKPmC6mr0wZ0NuQVE3qccn/fvdbO6djUHITH9mDJGgf/pvKnxU/IJ7mnB fov67nba+idqjtx4chvyblsxxskhijt65w1hxq1ei8a6bktreujrt9t7y2ic5ev PMqpiWaWFq6JcbYUg4aNYuM= 1;BLUPR08MB1300;6:tJwVr/vuKBHod0pEx40eEU4GHoLUOgFX7AcQiIepvLSyM JqnTH6vik44joQWuK+LLYyfWj3H5IcnYoRMztCp5jkpgE1T/aXlDJb+HX6jMJUZ svc/gfjhsljfkwmh6vpnfjbrswy6etbt4urk4zvnj/mfbtqml7zf4uzp7o/ndly mohefrmvectvygnifgywpsp2gnjgc06f4crzntsjyppc/ehhyjfeu+gpa5rx0l1 Uxgo70zl4UhFpSRVakW1pPLX1WZd9wXapUzifjVcB6hpCN3Q86dFB1vVHxZOol/ KLE9hmXtW9G76AWtkIP/UcROAlu9/utNlz1haVJER2WJnio0qEeOjrZPXSv4lRo vlem/aykdfppxzw8j5uwrfnkadu6ledha36fxam1hkrira==;5:4cmh7zd/k3tz xigmdj2gorjeb65rn3xa2k1w3t3lppw0unleqci0mvs09zvbqgchyeeso9tpsdz l6x7/bitiz+wilfvhxdoivnp/bhuytrzsbhg4yycz/+10hp7t8/htaogw2y+sy7 v8bujn9um4ug==;24:zud+5+qjkagalfpxtkfb2o4n1vkhsrmed1vup8ixuegka ZHSi2UAKLxEqbKYC69iw/NabxPCdCZDYP8qHDdXM0QGOM0rGu84VOZZyRrf1g4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM 1;BLUPR08MB1300;7:zYf2ARmJY08RzKAaU0i1mvNMKBB+eDWc9RRcwtXUZA6rx MEd7GQX8t3ivxiEtrdvUdjv8qrsRTTbnwB0of3XjE0nKj1bsq83WRewUIlp1XAX YN4JxnxmSDRK2sJnK92WZof57VyioSUOGYiPhowsvF7CmQobSvhqytzt+AZBkDv f98e3gtzoicyxo28kueecnjwxjhnasakyuq2h+odl9pfsmnkv8imatvyqj8clhp jytaj9vcjzxkxgsgl/9w+2gpbuczyyx2m7u/g5maooz3nhwobubcdgixcbtvhz6 rkoulcg4pptp1batirkcfcdslxn9tydulav1go1n5o16g== X-OriginatorOrg: calpoly.edu X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Feb :09: (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR08MB B B4A60F Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit Hello Bill, Yes, you may use the materials you indicated. It's kind of you to ask. Regards, --john On 02/16/ :33 PM, Bill MacKenty wrote: Hello, My name is Bill MacKenty and I work at the non-profit American School of Warsaw as a computer science teacher. I teach grades 9

5 through 12 computer science. I am writing to ask for permission to use your content located here: ERD.html < ERD.html In my classroom wiki. This wiki is non-commercial. It is used by my students to learn about computer science. It is not password protected, nor is there any login system. There are no ads on this wiki. The wiki is at url: computersciencewiki.org < All my content is licensed under creative commons. I will reference your material and a link back to your site will be visible from the same page the content is cited (in the references section). I especially like your definitions of "what is an entity, attribute and relationship". I look forward to your reply and appreciate your response. Warmly, Bill MacKenty Bill MacKenty Computer Science Educator American School of Warsaw Bill MacKenty Computer Science Educator American School of Warsaw B B4A60F Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: 8bit <html <head

6 <meta content="text/html; charset=utf-8" httpequiv="content-type" </head <body bgcolor="#ffffff" text="#000000" <phello Bill,</p <p Yes, you may use the materials you indicated. It's kind of you to ask.</p <pregards,</p <p--john</p <p<br </p <br class="moz-cite-prefix"on 02/16/ :33 PM, Bill MacKenty wrote:<br <blockquote ail.gmail.com" type="cite" <meta http-equiv="content-type" content="text/html; charset=utf-8" style="font-family:arial,helvetica,sansserif"hello, style="font-family:arial,helvetica,sans-serif" <br style="font-family:arial,helvetica,sans-serif"my name is Bill MacKenty and I work at the non-profit American School of Warsaw as a computer science teacher. I teach grades 9 through 12 computer science. I am writing to ask for permission to use your content located here: style="font-family:arial,helvetica,sans-serif" <br face="arial, helvetica, sans-serif"<a moz-do-not-send="true" href=" O- ERD.html" WTO-ERD.html</a</font<br <br style="font-family:arial,helvetica,sans-serif"

7 face="arial, helvetica, sans-serif"in my classroom wiki. This wiki is non-commercial. It is used by my students to learn about computer science. It is not password protected, nor is there any login system. There are no ads on this wiki. The wiki is at url: <a moz-do-not-send="true" href=" target="_blank"computersciencewiki.org</a. All my content is licensed under creative commons. </font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"<br </font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"i will reference your material and a link back to your site will be visible from the same page the content is cited (in the references section). I especially like your definitions of "what is an entity, attribute and relationship".</font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"<br </font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"i look forward to your reply and appreciate your response. </font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"<br </font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"warmly, </font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"<br </font style="font-family:arial,helvetica,sans-serif"

8 face="arial, helvetica, sans-serif"bill MacKenty</font style="font-family:arial,helvetica,sans-serif" face="arial, helvetica, sans-serif"<br </font style="font-family:arial,helvetica,sansserif" class="gmailm_ gmail_signature" dir="ltr" dir="ltr" dir="ltr" dir="ltr" dir="ltr" <br </span style="color:rgb(153,153,153)" <wbr <br Bill MacKenty</span<br style="color:rgb(153,153,153)"computer Science Educator<br American

9 School of Warsa color="#888888"w<br </font</span <br style="color:rgb(153,153,153)" color="#888888"<br </font</span style="color:rgb(153,153,153)" color="#888888"<br </font</span<br <br clear="all" class="gmail_signature"

10 dir="ltr" dir="ltr" dir="ltr" dir="ltr" dir="ltr" <br </span style="color:rgb(153,153,153)" <br Bill MacKenty</span<br style="color:rgb(153,153,153)"computer Science Educator<br American School of Warsa color="#888888"w<br </font</span style="color:rgb(153,153,153)" color="#888888"<br </font</span

11 style="color:rgb(153,153,153)" color="#888888"<img moz-do-not-send="true" src=" export=download&id=0b46hjd2o4oqbrxo2dufhdxlyqjq&revid=0 B46HJD2o4OQBenhsSVNwNFZRZTdyY29hdGdGVWEvMUwrbys4PQ" height="45" width="200"<br </font</span<br <br <img moz-do-not-send="true" alt="" </blockquote <br </body </html B B4A60F

https://mail.google.com/mail/u/0/?ui=2&ik=4a9d5ab0fe&vi...

https://mail.google.com/mail/u/0/?ui=2&ik=4a9d5ab0fe&vi... Delivered-To: bmackenty@aswarsaw.org Received: by 10.194.158.100 with SMTP id wt4csp1082891wjb; X-Received: by 10.55.50.149 with SMTP id y143mr16553555qky.86.1445001190398; Return-Path:

More information

bh=9f8/dl/qo6zqvut76gpsxonsryoygj7+iz3zai0nyty=; b=uzb/khk +qtkuju4s0ehm4kowgbvgoagiofkkbeqgxde79wrvtbe2kdtnqhenm+vnp1

bh=9f8/dl/qo6zqvut76gpsxonsryoygj7+iz3zai0nyty=; b=uzb/khk +qtkuju4s0ehm4kowgbvgoagiofkkbeqgxde79wrvtbe2kdtnqhenm+vnp1 Delivered-To: bmackenty@aswarsaw.org Received: by 10.55.75.144 with SMTP id y138csp364924qka; Sat, 21 Jan 2017 01:28:46-0800 (PST) X-Received: by 10.157.54.139 with SMTP id h11mr10253536otc. 86.1484990925933;

More information

bh=40lsbgolp7pbwmgrxdkxpu2gosgmm2ifbkmg6lw1jeu=; b=wmry1ugcb83u5xihbivsnolgzuj07gjvzmm+469p5b +8PzVhEWlQ1wqSjQBPAFHp6J

bh=40lsbgolp7pbwmgrxdkxpu2gosgmm2ifbkmg6lw1jeu=; b=wmry1ugcb83u5xihbivsnolgzuj07gjvzmm+469p5b +8PzVhEWlQ1wqSjQBPAFHp6J Delivered-To: bmackenty@aswarsaw.org Received: by 10.55.80.139 with SMTP id e133csp463209qkb; Mon, 1 May 2017 03:07:15-0700 (PDT) X-Received: by 10.107.5.12 with SMTP id 12mr16189961iof. 186.1493633235602;

More information

59YHTgcmmrUbp965ht2TugQFZRjjak9Ckrp66CTxKEsgBZZJZqJvz462M3ePt5EGVcuL

59YHTgcmmrUbp965ht2TugQFZRjjak9Ckrp66CTxKEsgBZZJZqJvz462M3ePt5EGVcuL Delivered-To: bmackenty@gmail.com Received: by 10.79.136.130 with SMTP id k124csp2649542ivd; Mon, 7 Aug 2017 04:59:05-0700 (PDT) X-Received: by 10.84.231.194 with SMTP id g2mr312696pln. 5.1502107145823;

More information

Delivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN)

Delivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN) 1 of 5 2/3/2018 6:03 PM Subject: Bounce detected (list gbird) from Toni.J.Piaggio@aphis.usda.gov From: mj2-owner@lists.ncsu.edu Date: 2/17/2017 12:06 PM To: gbird-owner@lists.ncsu.edu Detected a bounce

More information

<OF1C8DBAB4.F6DD93FA ON852580F EA Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds)

<OF1C8DBAB4.F6DD93FA ON852580F EA Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds) Original Message Message ID Created at: From: To: Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds) IBM Knowledge

More information

Phishing and Ransomware

Phishing and Ransomware Phishing and Ransomware Dave Phillips Information Technology Resources March 2, 2016 Phishing Phishing What it looks like How to identify What happens to your credentials Remember that ITR will NEVER,

More information

Case 3:09-cv F Document Filed 04/07/11 Page 17 of 23 PageID 16514

Case 3:09-cv F Document Filed 04/07/11 Page 17 of 23 PageID 16514 Case 3:09-cv-00988-F Document 440-1 Filed 04/07/11 Page 17 of 23 PageID 16514 To: "'Elizabeth M. Schurig'" , "'jeffbaron1@gmail.com'" , "Michelle Rosenblatt" ,

More information

From: Sent: To: Subject:

From: Sent: To: Subject: From: Justin Michael Nelson Sent: Monday, December 12, 2016 10:21 PM To: s_huminski@live.com Subject: Hello from the OTHER SIDE! Hello, it's me. I was wondering if after

More information

sender) client-ip= ; dkim=pass

sender) client-ip= ; dkim=pass Delivered-To: ryanlawhsv@gmail.com Received: by 10.129.162.146 with SMTP id z140csp2021593ywg; X-Received: by 10.200.36.81 with SMTP id d17mr24690451qtd.99.1487704818927; Return-Path:

More information

Advanced Introduction to Machine Learning CMU-10715

Advanced Introduction to Machine Learning CMU-10715 Advanced Introduction to Machine Learning CMU-10715 MLE, MAP, Bayes classification Barnabás Póczos Sept 9, 2015 Outline Theory: Probabilities: Dependence, Independence, Conditional Independence Parameter

More information

s. has become a primary means of communication. can easily be forged. can be abused

s.  has become a primary means of communication.  can easily be forged.  can be abused E-mails Email has become a primary means of communication. Email can easily be forged Email can be abused Spam Aid in committing a crime Threatening email, Challenges to E-mail Authenticity Origin & Sender

More information

n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2:

n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2: Outline n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2: n Understand the use of social networking, search engines, and Google hacking in

More information

Module Contact: Dr Graeme Richards, CMP. Copyright of the University of East Anglia Version 1

Module Contact: Dr Graeme Richards, CMP. Copyright of the University of East Anglia Version 1 UNIVERSITY OF EAST ANGLIA School of Computing Sciences Main Series UG Examination 2015/16 WEB BASED PROGRAMMING CMP-4011A Time allowed: 2 hours Answer BOTH questions in Section A and TWO questions from

More information

HTML Summary. All of the following are containers. Structure. Italics Bold. Line Break. Horizontal Rule. Non-break (hard) space.

HTML Summary. All of the following are containers. Structure. Italics Bold. Line Break. Horizontal Rule. Non-break (hard) space. HTML Summary Structure All of the following are containers. Structure Contains the entire web page. Contains information

More information

i-mscp OpenDKIM plugin

i-mscp OpenDKIM plugin 2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.

More information

Naïve Bayes Classifier. Lecture 8: Aykut Erdem October 2017 Hacettepe University

Naïve Bayes Classifier. Lecture 8: Aykut Erdem October 2017 Hacettepe University Naïve Bayes Classifier Lecture 8: Aykut Erdem October 2017 Hacettepe University Today Bayes rule - Naïve Bayes Classifier Application - Text classification - Mind reading = fmri data processing 2 Recap:

More information

1.1 Text Alternatives: Provide text alternatives for any non-text content. 3.1 Readable: Make text content readable and understandable.

1.1 Text Alternatives: Provide text alternatives for any non-text content. 3.1 Readable: Make text content readable and understandable. Monday April 29, 2013 10:10:00 Source URL: http://hastanerandevu.gov.tr/randevu/randevu.jsp Source Title: Hastane Randevu Merkezi Yönlendirme Accessibility Review (Guidelines: WCAG 2.0 (Level AA)) Report

More information

Over 99% of s are SPAM! Useless for mankind!

Over 99% of  s are SPAM! Useless for mankind! Advanced Mail Introduction SPAM vs. non-spam Mail sent by spammer vs. non-spammer Problem of SPAM mail Over 99% of E-mails are SPAM! Useless for mankind! SPAM detection? Client-based detection These methods

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Web Development and HTML. Shan-Hung Wu CS, NTHU

Web Development and HTML. Shan-Hung Wu CS, NTHU Web Development and HTML Shan-Hung Wu CS, NTHU Outline How does Internet Work? Web Development HTML Block vs. Inline elements Lists Links and Attributes Tables Forms 2 Outline How does Internet Work? Web

More information

BACKTRACING S. Michael Sonntag

BACKTRACING  S. Michael Sonntag BACKTRACING E-MAILS Michael Sonntag SOURCE E-MAILS Source of E-Mails: My personal spam folder! real_viagra.eml Fake GMX E-Mail For comparison a real GMX messages: Beispielmail_GMX.eml As_lecture.eml A

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

Internet Engineering Task Force (IETF) Category: Standards Track April 2011 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track April 2011 ISSN: Internet Engineering Task Force (IETF) M. Kucherawy Request for Comments: 6212 Cloudmark, Inc. Category: Standards Track April 2011 ISSN: 2070-1721 Authentication-Results Registration for Vouch by Reference

More information

Towards authentication

Towards  authentication Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC

More information

Application Notes for Mutare EVM Plus gistt with Avaya IP Office 8.1 and Embedded Voic Issue 1.0

Application Notes for Mutare EVM Plus gistt with Avaya IP Office 8.1 and Embedded Voic Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Mutare EVM Plus gistt with Avaya IP Office 8.1 and Embedded Voicemail Issue 1.0 Abstract These Application Notes describe a compliance-tested

More information

Setting Up in Daycare Works Help. Version: 06/25/2013

Setting Up  in Daycare Works Help. Version: 06/25/2013 Setting Up Email in Daycare Works Help Version: 06/25/2013 Table of Contents Table of Contents 2 How to Setup a SMTP Server 3 Setting up an SMTP server allows administrators the ability to route emails

More information

Create HTML subscription and unsubscription pages

Create HTML subscription and unsubscription pages How to Create HTML subscription and unsubscription pages This How-to shows how to create your own HTML forms for newsletter subscription and unsubscription. You will find examples of confirmation and error

More information

STARS Classroom Entering Grades

STARS Classroom Entering Grades STARS Classroom Entering Grades Table of Contents Click on any section to be taken to the appropriate page. STARS Classroom Entering Grades... 1 Table of Contents... 1 Logging into STARS Classroom... 2

More information

CSCI 1100L: Topics in Computing Spring 2018 Web Page Project 50 points

CSCI 1100L: Topics in Computing Spring 2018 Web Page Project 50 points CSCI 1100L: Topics in Computing Spring 2018 Web Page Project 50 points Project Due (All lab sections): Check on elc Assignment Objectives: Lookup and correctly use HTML tags. Lookup and correctly use CSS

More information

Applications & Application-Layer Protocols: The Web & HTTP

Applications & Application-Layer Protocols: The Web & HTTP CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1 The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images

More information

HTML Overview. With an emphasis on XHTML

HTML Overview. With an emphasis on XHTML HTML Overview With an emphasis on XHTML What is HTML? Stands for HyperText Markup Language A client-side technology (i.e. runs on a user s computer) HTML has a specific set of tags that allow: the structure

More information

Web Publishing Intermediate 2

Web Publishing Intermediate 2 Web Publishing Intermediate 2 Building a Three Column Site with divs and float Jeff Pankin Information Services and Technology Table of Contents Course Objectives... 2 The CIG Web Site... 3 Using the Div

More information

M 3 AAWG DMARC Training Series. Mike Adkins, Paul Midgen DMARC.org October 22, 2012

M 3 AAWG DMARC Training Series. Mike Adkins, Paul Midgen DMARC.org October 22, 2012 M 3 AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012 M3AAWG DMARC Training Videos (2.5 hours of training) This is Segment 3 of 6 The complete series of DMARC training videos

More information

Networking Overview: Everything you need to know, in 50 minutes. CS 161: Computer Security Prof. David Wagner

Networking Overview: Everything you need to know, in 50 minutes. CS 161: Computer Security Prof. David Wagner Networking Overview: Everything you need to know, in 50 minutes CS 161: Computer Security Prof. David Wagner February 26, 2013 Local-Area Networks! A C point-to-point shared How does computer A send a

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Hoster: openload.co - Free PLUGIN_DEFECT-Error: 08d a1830b60ab13ddec9a2ff6

Hoster: openload.co - Free PLUGIN_DEFECT-Error: 08d a1830b60ab13ddec9a2ff6 JDownloader - Bug #80273 Bug # 75914 (Closed): Hoster: openload.co - Free Hoster: openload.co - Free PLUGIN_DEFECT-Error: 08d9453425a1830b60ab13ddec9a2ff6 08/18/2016 02:13 AM - StatServ Status: Closed

More information

Electronic mail, usually called , consists of simple text messages a piece of text sent to a recipient via the internet.

Electronic mail, usually called  , consists of simple text messages a piece of text sent to a recipient via the internet. 1 Electronic Mail Electronic mail, usually called e-mail, consists of simple text messages a piece of text sent to a recipient via the internet. E-mail Clients To read e-mail, we use an e-mail client,

More information

w3 JMial SmtpMail Properties

w3 JMial SmtpMail Properties w3 JMial SmtpMail Properties Body : String Charset : String ContentTransferEncoding : String ContentType : String DeferredDelivery : Date Encoding : String ErrorCode : Integer ErrorMessage : String ErrorSource

More information

Modify cmp.htm, contactme.htm and create scheduleme.htm

Modify cmp.htm, contactme.htm and create scheduleme.htm GRC 175 Assignment 2 Modify cmp.htm, contactme.htm and create scheduleme.htm Tasks: 1. Setting up Dreamweaver and defining a site 2. Convert existing HTML pages into proper XHTML encoding 3. Add alt tags

More information

Sample Exam 2 (Version 1) CIS 228: The Internet Prof. St. John Lehman College City University of New York 7 November 2007

Sample Exam 2 (Version 1) CIS 228: The Internet Prof. St. John Lehman College City University of New York 7 November 2007 Sample Exam 2 (Version 1) CIS 228: The Internet Prof. St. John Lehman College City University of New York 7 November 2007 NAME (Printed) NAME (Signed) E-mail Exam Rules Show all your work. Your grade will

More information

Applications & Application-Layer Protocols: The Web & HTTP

Applications & Application-Layer Protocols: The Web & HTTP CS 312 Internet Concepts Applications & Application-Layer Protocols: The Web & HTTP Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs312-f11/

More information

SPF (Sender Policy Framework)

SPF (Sender Policy Framework) SPF (Sender Policy Framework) Harpreet Singh Riat (hsr22@bath.ac.uk) 1 Agenda What s SPF? Why is it needed? How does it work? Who uses it? 2 Security flaws in SMTP Flaw: SMTP allows any computer to send

More information

HTTP Authentication API

HTTP Authentication API HTTP Authentication API Note: Both GET (URL format) and POST http requests are supported. Note that POST is considered better security as URL data can be cached in the browser. HTTP URL Format http(s)://your_securenvoy_server/secserver?flag=desktop&version=2.0&status=auth&userid=(my_userid)&passcode=(6

More information

How browsers talk to servers. What does this do?

How browsers talk to servers. What does this do? HTTP HEADERS How browsers talk to servers This is more of an outline than a tutorial. I wanted to give our web team a quick overview of what headers are and what they mean for client-server communication.

More information

Configuring Hotspots

Configuring Hotspots CHAPTER 12 Hotspots on the Cisco NAC Guest Server are used to allow administrators to create their own portal pages and host them on the Cisco NAC Guest Server. Hotspots created by administrators can be

More information

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue

More information

Identity Standards Manual for Mississippi Department of Education

Identity Standards Manual for Mississippi Department of Education Identity Standards Manual for Mississippi Department of Education Our brand is the distinctive image associated with our department. It is the visual, emotional, and rational impression that we elicit

More information

Inline Elements Karl Kasischke WCC INP 150 Winter

Inline Elements Karl Kasischke WCC INP 150 Winter Inline Elements 2009 Karl Kasischke WCC INP 150 Winter 2009 1 Inline Elements Emphasizing Text Increasing / Decreasing Text Size Quotes and Citations Code, Variables, and Sample Output Spanning Text Subscripts

More information

('cre Learning that works for Utah STRANDS AND STANDARDS WEB DEVELOPMENT 1

('cre Learning that works for Utah STRANDS AND STANDARDS WEB DEVELOPMENT 1 STRANDS AND STANDARDS Course Description Web Development is a course designed to guide students in a project-based environment, in the development of up-to-date concepts and skills that are used in the

More information

Using Active Directory Certificate Services. Copyright 2016 Hewlett Packard Enterprise Development LP

Using Active Directory Certificate Services. Copyright 2016 Hewlett Packard Enterprise Development LP Copyright Copyright 2016 Hewlett Packard Enterprise Development LP Open Source Code Certain Aruba products include Open Source software code developed by third parties, including software code subject

More information

Mr. Gottlieb, The Central Bank of Belize is not permitted by statute to respond to your specific questions.

Mr. Gottlieb, The Central Bank of Belize is not permitted by statute to respond to your specific questions. 1 of 7 19/04/2018 9:39 p.m. Subject: RE: Choice Bank From: Customer.Reports Date: 18/04/2018 5:16 p.m. To: OPM Security X-Account-Key: account26

More information

Internet Electronic Mail

Internet Electronic Mail Internet Electronic Mail Antonio Carzaniga Faculty of Informatics University of Lugano March 9, 2010 Outline General concepts Transport protocol: SMTP Basic message format MIME format A Postal Service

More information

Electronic mail security

Electronic mail security Electronic mail security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Pretty Good Privacy (PGP) S/MIME 2 1 Pretty Good Privacy Philip R.

More information

Dreamweaver: Portfolio Site

Dreamweaver: Portfolio Site Dreamweaver: Portfolio Site Part 3 - Dreamweaver: Developing the Portfolio Site (L043) Create a new Site in Dreamweaver: Site > New Site (name the site something like: Portfolio, or Portfolio_c7) Go to

More information

KidBlog. Teacher Set Up. Control Panel/Dashboard

KidBlog. Teacher Set Up. Control Panel/Dashboard Kidblog is designed specifically for elementary and middle school teachers who want to provide each student with their own blog. It s free, uncluttered, adfree, easy to set up and private by default. Teachers

More information

PayPal Non-receipt - Claim - #PP MAIL FRAUD

PayPal Non-receipt - Claim - #PP MAIL FRAUD PayPal Non-receipt - Claim - #PP-004-937-637-368 - MAIL FRAUD Claimants: Sarah Katz and David M. Katz 12 Edwin Lane Monsey New York 10952-3101 USA d6katz@verizon.net 8453566975 1. PROOF THAT THE CLAIM

More information

Who s Marcus? mail() 2008 Marcus Bointon

Who s Marcus? mail() 2008 Marcus Bointon 1 Who s Marcus? Programming since 1982 Years of multimedia production for CD-ROM In PHP since 2001 Technical Director of Synchromedia Ltd Sole architect and coder of Smartmessages.net Delivering around

More information

JavaScript (5A) JavaScript

JavaScript (5A) JavaScript JavaScript (5A) JavaScript Copyright (c) 2012 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any

More information

PreK Web Site Frequently Asked Questions

PreK Web Site Frequently Asked Questions PreK Web Site Frequently Asked Questions (Updated: October 20 th, 2010) Table of Contents QUESTION PAGE How do I log into the PALS-PreK Web site? 1 As a consortium, program, or site director, how do I

More information

HeadMaster: Setting HeadMaster Up Part I

HeadMaster: Setting HeadMaster Up Part I HeadMaster: Setting HeadMaster Up Part I 1 Copyright Copyright 2014 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including

More information

Installation guide for Choic Multi User Edition

Installation guide for Choic Multi User Edition Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL

More information

Using the Control Panel

Using the Control Panel Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox

More information

SEO Authority Score: 40.0%

SEO Authority Score: 40.0% SEO Authority Score: 40.0% The authority of a Web is defined by the external factors that affect its ranking in search engines. Improving the factors that determine the authority of a domain takes time

More information

Filtering 7 April 2014

Filtering 7 April 2014 Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations

More information

Information Network Systems The application layer. Stephan Sigg

Information Network Systems The application layer. Stephan Sigg Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012

More information

td { page-break-inside: avoid; } tr { page-break-after: avoid; } div.section1 { page: Section1; }

td { page-break-inside: avoid; } tr { page-break-after: avoid; } div.section1 { page: Section1; } Message-ID: Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_part_2_1682789042.1449849216456"

More information

Certified HTML5 Developer VS-1029

Certified HTML5 Developer VS-1029 VS-1029 Certified HTML5 Developer Certification Code VS-1029 HTML5 Developer Certification enables candidates to develop websites and web based applications which are having an increased demand in the

More information

CORS Attacks. Author: Milad Khoshdel Blog: P a g e. CORS Attacks

CORS Attacks. Author: Milad Khoshdel Blog: P a g e. CORS Attacks Author: Milad Khoshdel Blog: https://blog.regux.com Email: miladkhoshdel@gmail.com 1 P a g e Contents What is CORS?...3 How to Test?...4 CORS Checker Script...6 References...9 2 P a g e What is CORS? CORS

More information

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping

More information

HHH Instructional Computing Fall

HHH Instructional Computing Fall Quick Start Guide for School Web Lockers Teacher log-on is the same as for Infinite Campus Student log-on is the same initial log on to the network except no school year is required before their user name

More information

SAMPLE PAPER I CLASS- X SUBJECT FOUNDATION OF IT. TIME : 3 HRS M.M - 90 NOTE: 1. All questions are compulsory. 2. Write neat and clean.

SAMPLE PAPER I CLASS- X SUBJECT FOUNDATION OF IT. TIME : 3 HRS M.M - 90 NOTE: 1. All questions are compulsory. 2. Write neat and clean. SAMPLE PAPER I CLASS- X SUBJECT FOUNDATION OF IT TIME : 3 HRS M.M - 90 NOTE: 1. All questions are compulsory. 2. Write neat and clean. I. Fill in the Blanks: (10x1=10) 1. is a computer threat that multiplies

More information

HTML and CSS: An Introduction

HTML and CSS: An Introduction JMC 305 Roschke spring14 1. 2. 3. 4. 5. The Walter Cronkite School... HTML and CSS: An Introduction

More information

Python easy mail library Documentation

Python easy mail library Documentation Python easy mail library Documentation Release 1.0.2 Alain Spineux Oct 31, 2017 Contents 1 Download and Install 3 2 Support for Python 3.x 5 3 Use pyzmail 7 4 Documentation 9 4.1 Articles..................................................

More information

Adaptive Strong Authenticator Configuration Guide 10g ( ) December 2007

Adaptive Strong Authenticator Configuration Guide 10g ( ) December 2007 Adaptive Strong Authenticator Configuration Guide 10g (10.1.4.3.0) December 2007 Adaptive Strong Authenticator Configuration Guide, 10g (10.1.4.3.0) Copyright 2007, Oracle. All rights reserved. The Programs

More information

ID: Cookbook: browseurl.jbs Time: 00:29:59 Date: 16/12/2017 Version:

ID: Cookbook: browseurl.jbs Time: 00:29:59 Date: 16/12/2017 Version: ID: 40237 Cookbook: browseurl.jbs Time: 00:29:59 Date: 16/12/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis

More information

t and Migration of WLCG TEIR-2

t and Migration of WLCG TEIR-2 IPv6 Deploymen t and Migration of WLCG TEIR-2 site resources on Privat te Cloud Saqib Haleem Saqib Haleem National Centre for Physics, Pakistan Agenda Introduction of National Centre for Physics (NCP)

More information

Blue Coat Security First Steps Solution for Exception Pages

Blue Coat Security First Steps Solution for Exception Pages Blue Coat Security First Steps Solution for Exception Pages SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

HTML BEGINNING TAGS. HTML Structure <html> <head> <title> </title> </head> <body> Web page content </body> </html>

HTML BEGINNING TAGS. HTML Structure <html> <head> <title> </title> </head> <body> Web page content </body> </html> HTML BEGINNING TAGS HTML Structure Web page content Structure tags: Tags used to give structure to the document.

More information

Web Development IB PRECISION EXAMS

Web Development IB PRECISION EXAMS PRECISION EXAMS Web Development IB EXAM INFORMATION Items 53 Points 73 Prerequisites COMPUTER TECHNOLOGY Grade Level 10-12 Course Length ONE YEAR Career Cluster INFORMATION TECHNOLOGY Performance Standards

More information

Web Publishing Basics I

Web Publishing Basics I Web Publishing Basics I Jeff Pankin Information Services and Technology Contents Course Objectives... 2 Creating a Web Page with HTML... 3 What is Dreamweaver?... 3 What is HTML?... 3 What are the basic

More information

SMTP Relay set up. Technical team

SMTP Relay set up. Technical team Technical team 09/08/2016 Summary Introduction... 3 SMTP Relay service description... 3 Presentation of our service... 4 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending authentication...

More information

Anser Technology Block Curriculum. Anser TechBlock. Part II: Introduction to Software. Oliver Fritsch Aubrey Miles

Anser Technology Block Curriculum. Anser TechBlock. Part II: Introduction to Software. Oliver Fritsch Aubrey Miles Anser Technology Block Curriculum Part II: Introduction to Software Oliver Fritsch Aubrey Miles 1.11.2005 Schedule Date October 25 November 1 November 8 November 15 November 22 December 6 Group A (Persi

More information

LING 408/508: Computational Techniques for Linguists. Lecture 14

LING 408/508: Computational Techniques for Linguists. Lecture 14 LING 408/508: Computational Techniques for Linguists Lecture 14 Administrivia Homework 5 has been graded Last Time: Browsers are powerful Who that John knows does he not like? html + javascript + SVG Client-side

More information

Santa Tracker. Release Notes Version 1.0

Santa Tracker. Release Notes Version 1.0 Santa Tracker Release Notes Version 1.0 App Parameters and Styling In your Caspio account, go to the App s Overview screen and on the right sidebar click on Manage in the App Parameters area. Edit any

More information

Semantic web. Tapas Kumar Mishra 11CS60R32

Semantic web. Tapas Kumar Mishra 11CS60R32 Semantic web Tapas Kumar Mishra 11CS60R32 1 Agenda Introduction What is semantic web Issues with traditional web search The Technology Stack Architecture of semantic web Meta Data Main Tasks Knowledge

More information

Web Services Application Programming Interface (API) Specification

Web Services Application Programming Interface (API) Specification Web Services Application Programming Interface (API) Specification Version 1.1 July 10, 2018 Web Services API Specifications 2 of 36 Table of s 1. Terrain Sources... 3 1.1. GET Method... 3 1.2. POST Method...

More information

WEBMAIL INTERFACE MANUAL GUIDE

WEBMAIL INTERFACE MANUAL GUIDE WEBMAIL INTERFACE MANUAL GUIDE (Mobile Version) Mail Hosting Service 2016. All rights reserved. Power by Support Mail team (support mail@ntt.co.th) NTT Communications (Thailand) Co.,Ltd. Library of instructions

More information

Stained Glass Window Project

Stained Glass Window Project e n i l a of Stained Glass Window Project SAMPLES 2015 Hello Learning Teacher Directions You can make this project as guided or independent as needed for your class. For my more advanced students I went

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

LAMP, WEB ARCHITECTURE, AND HTTP

LAMP, WEB ARCHITECTURE, AND HTTP CS 418 Web Programming Spring 2013 LAMP, WEB ARCHITECTURE, AND HTTP SCOTT G. AINSWORTH http://www.cs.odu.edu/~sainswor/cs418-s13/ 2 OUTLINE Assigned Reading Chapter 1 Configuring Your Installation pgs.

More information

Network Security (PhD Section)

Network Security (PhD Section) CSE508 Network Security (PhD Section) 4/7/2015 Email Michalis Polychronakis Stony Brook University 1 Email Overview MUA: Mail User Agent Thunderbird, webmail, Pine, MSA: Mail Submission Agent SMTP (port

More information

The information in this manual is designed to answer the following questions:

The information in this manual is designed to answer the following questions: Genesis Security Overview This document is concerned with user access security. Genesis User Access Security is designed to be comprehensive and easy to administer. The goal of User Access Security is

More information

World-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved

World-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved World-Wide Web Protocols CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved World-Wide Web The Information Universe World-Wide Web structure: hypertext Nonlinear presentation of information Key

More information

Glogster

Glogster Glogster http://edu.glogster.com Page 1 A Glog is like a poster, only better. Glogs allow you to create an online poster using photographs, images, graphics, video files and sound files. Glogs allow you

More information

Barracuda NextGen Report Creator

Barracuda NextGen Report Creator The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,

More information

Subject: [Middle-east-structure] Fwd: IPT/Transmission - Progress Report: Sep 2017 From: Leon Mellul via Middle-east-structure

Subject: [Middle-east-structure] Fwd: IPT/Transmission - Progress Report: Sep 2017 From: Leon Mellul via Middle-east-structure Subject: [Middle-east-structure] Fwd: IPT/Transmission - Progress Report: Sep 2017 From: Leon Mellul via Middle-east-structure Date: 1/10/2017 5:52 PM To: Middle East

More information

Designing Your Teacher Page. Medora Community School Corporation

Designing Your Teacher Page. Medora Community School Corporation Designing Your Teacher Page Medora Community School Corporation Introduction This tutorial will show you the basics of creating and running your teacher page on the Medora Community Schools website. This

More information

Computer Security Incident Response Team Slovakia CSIRT.SK

Computer Security Incident Response Team Slovakia CSIRT.SK Computer Security Incident Response Team Slovakia CSIRT.SK Martin Jurčík, CSIRT.SK CS Danube, 15 th March, 2016, Prague CS Danube (Cyber Security in Danube Region) project is part financed by the European

More information