Devonagentpro

Total Page:16

File Type:pdf, Size:1020Kb

Devonagentpro DEVONagent Pro VERSION 3.11.1 DOCUMENTATION © 2001-2019 DEVONtechnologies TABLE OF CONTENTS Read Me 4 Menus 29 The DEVONagent Pro Advantage 5 The DEVONagent Pro menu 29 System Requirements 6 The File menu 30 Installing, Updating, Removing 6 The Edit menu 31 Trial Restrictions 6 The Data menu 32 Version history 7 The Sort menu 33 License Agreement 11 The View menu 33 Credits 11 The Web menu 34 The History menu 35 Getting Started 12 The Go menu 36 Why use DEVONagent Pro? 12 The Window menu 36 When to use DEVONagent Pro? 12 The Services menu 37 DEVONagent Pro at a Glance 13 The Scripts menu 37 First steps with DEVONagent Pro 13 The Help menu 37 The Dock menu 38 Common Tasks 14 Windows and panels 39 How to find on the Internet 14 How to search beyond Google 14 Search window 40 How to customize DEVONagent Pro 15 Web browser 46 How to set up a search set to crawl feeds 15 Archive window 52 How to run a search automatically 16 Search sets 54 How to archive search results 16 Plugins and scanners 54 Downloads 56 Queries 18 Preferences 57 Assistant 57 Operators 18 Designing a search query 19 Preferences 59 Search sets 21 General 59 Search 60 What are search sets? 21 Menu extra 61 Choosing a search set 21 Web 62 Creating and managing sets 22 Tabs 63 Sharing sets 23 Bookmarks 64 General tab 23 Email 64 Advanced tab 25 Update 65 Sites tab 25 Plugins tab 26 Menu extra 66 Actions tab 27 Scripts 67 Schedule tab 28 Introduction 67 DEVONagent Pro's Scripts menu 68 Automator 69 DEVONagent Pro 3.11.1 Documentation, page 2 Plugin Development 70 Creating Your Own Plugins 70 XML and JSON Keys 72 Troubleshooting 77 DEVONagent Pro behaves irrationally 77 Problems interacting with DEVONthink 77 FAQ 78 General questions 78 Release schedules, Mac OS X, and Windows 78 Purchasing 79 Mac App Store 80 Your software license 81 Product-related questions 81 Technology 82 General Concept 82 Features 82 Structure 82 Applications 83 Other Products 84 Overview 84 DEVONthink 84 DEVONagent 84 DEVONsphere 84 DEVONnote 85 Needful Things 85 Appendix 86 Glossary 86 FAQ (product-specific) 87 List of Search Sets 88 List of Plugins 88 List of Scanners 94 Log message codes 94 DEVONagent Pro 3.11.1 Documentation, page 3 READ ME In this chapter: Web Searching: Fed up with Web searches that return loads of useless links? Using advanced search The DEVONagent Pro Advantage 5 techniques, DEVONagent Pro takes on all those System Requirements 6 tedious search-and-review tasks, releasing you to Installing, Updating, Removing 6 concentrate on relevant results. Trial Restrictions 6 Version history 7 License Agreement 11 Credits 11 DEVONagent Pro 3.11.1 Documentation, page 4 THE DEVONAGENT PRO ADVANTAGE WHY DEVONAGENT PRO? WHAT DEVONAGENT PRO DOES FOR YOU Using advanced search techniques, DEVONagent Using both standard and specialized search Pro takes on all those tedious search-and-review engines, DEVONagent Pro intelligently tasks, releasing you to concentrate on relevant summarizes the results -- fast! results. It assists you in Alternatively, DEVONagent Pro shows you an even larger number of search results using its finding, unique graphical topic map. collecting, and DEVONagent Pro support your research while organizing browsing the Web, e.g., by listing all objects such information from the Web or your DEVONthink Pro as images, linked documents, or outgoing links Office databases with a powerful and flexible search embedded into a viewed page. architecture. It also features a powerful, research- DEVONagent Pro archives your search results oriented web browser and simple built-in archive, with a single click or sends them to your and tightly integrates with DEVONthink. DEVONthink database. Instead of making you repeat actions, DEVONagent Pro performs those actions for you. Combine search sets, schedule searches, etc., to create your very own personalized search assistant. DEVONagent Pro 3.11.1 Documentation, page 5 PERFECT INTEGRATION To update an existing version of DEVONagent Pro, simply copy the application package from the disk DEVONagent Pro integrates seamlessly with image to your Applications folder, replacing the old DEVONthink. With just one click, archive your version. Your database(s) will not be affected. search results, webpages, and other information grabbed from the Web to your DEVONthink If you would like to switch from the Mac App database. Store variant of DEVONagent Pro to one directly Select text in any application and use downloaded from the DEVONtechnologies website, DEVONagent Pro's Services menu or a you can do so at any time. The official version will contextual menu item to search for it. The Menu accept your Mac App Store receipt as a valid license. Extra keeps DEVONagent Pro at your fingertips. Copies not downloaded from the Mac App Store Use various actions, including notifications and also allow you to buy an upgrade to a higher edition AppleScript, to inform you of search results, or version (if available). then send them to either DEVONthink or the To remove DEVONagent Pro traces from your application of your choice to process them any computer, trash the following files and folders (~ way you wish. represents your home folder): Learn more about why you should use DEVONagent DEVONagent Pro Pro, when you should use it, and how to run your ~/Library/Application Support/DEVONagent Pro first query: See also p. 12ff ~/Library/Contextual Menu Items/DEVONagent Pro CM.plugin SYSTEM REQUIREMENTS ~/Library/Preferences/com.devon- technologies.agentexpress.* Every Mac running OS X Yosemite or later. In Depending on whether you have installed the addition, a fast Internet connection is highly following extras or not, remove them, too: recommended. The product-specific scripts in ~/Library/Scripts and ~/Library/Workflows INSTALLING, UPDATING, The contextual menu plugin in ~/Library/ REMOVING Contextual Menu Items/ The Dashboard widget Just move the DEVONagent Pro application package to the Applications folder or any other Note: Depending the version of OS X you are directory you have access to. Please note that OS using, some files may or may not be installed on X Services and the connection to DEVONthink your machine. work only for applications installed into one of the Applications folders, and that logout and login or a TRIAL RESTRICTIONS restart is required after installation. Unregistered DEVONagent Pro runs for 60 hours of non-continous runtime. Close the app to stop the clock from ticking and re-open later to continue your evaluation. The menu extra is restricted to 100 searches until DEVONagent Pro is registered. DEVONagent Pro 3.11.1 Documentation, page 6 VERSION HISTORY New Improved Fixed Removed VERSION 3.11.1 This maintenance release addresses a sporadic crash some users had when accessing the Preferences panel on macOS Mojave, as well as some visual artifacts in the interface. We have also added support for JSON RSS feeds and improved handling of RSS feeds in general. Overall reliability has been the primary focus of this release. Added support for JSON RSS feeds. Updated plugins: Government > USA.gov, References > SEC. Renamed the search option Atom, RSS, RSD & RDF feeds to Atom, RSS & JSON feeds. Improved handling of untitled RSS feed items. Improved overall performance and reliability. Fixed various visual artifacts including ones affecting tabs on search windows (macOS Mojave). Fixed an issue where opening the License panel could stall the application when a network connection was not available or reliable. Fixed an issue where an alert was not displayed after entering an incorrect license code. Fixed a crash and incomplete display of the window when accessing the Preferences panel (macOS Mojave). VERSION 3.11 This release features fixes, including greater compatibility with macOS Mojave, as well as other improvements. We have reorganized the search sets and updated a number of plugins as well as the thumbnail galleries scanner. A new option allows you to group search sets for more easily managing your sets. You can now choose to install and update extras automatically in the Support Assistant. A change to parsing a web page's rendered HTML allows for better See Also, translation, and automation via AppleScript. VoiceOver support in the interface has been enhanced too. You can now create search set groups in Windows > Search Sets. The action menu in the Search Sets panel now has New Group and New Set options. Search sets can now be installed via Help > Support Assistant. Added an option to the Support Assistant for installing and updating extras automatically. DEVONagent Pro 3.11.1 Documentation, page 7 Plugins updated: Qwant, Yandex, Blogs > Google Blog Search, News > BBC News, News > Google News, News > Topix, News > World News Network, Patents > Google Patents Search sets updated: Marketing, Mac > Latest News, and Mac > Latest Software. Scanners updated: Thumbnail Galleries. Renamed, merged, and reorganized the default search sets. Merged the Advanced and Exclude tabs of the Search Sets panel. Improved automatic selection of content of web pages after choosing Remember Selection from the contextual menu. The toolbar button Share > Email in a browser window uses the current website's title as the subject line. Improved adding URLs via drag-and-drop in the Downloads window and the Sites tab of a search set. Improved keyboard navigation in outline views of windows like Archive and Search Sets. Renamed Go > Workspace > Update... to Update. The last used workspace is now updated. Added tooltips to the buttons on the Downloads window. Tooltips in the menu extra results now update more quickly. Minor cosmetic adjustments made in Search windows and Properties inspector of browser windows. Improved VoiceOver support. Increased efficiency in handling of RSS feeds. Improved filtering and retrieval of links, especially in Express mode.
Recommended publications
  • The Effectiveness of Application Permissions
    The Effectiveness of Application Permissions Adrienne Porter Felt,∗ Kate Greenwood, David Wagner University of California, Berkeley apf, kate eli, [email protected] Abstract cations’ permission requirements up-front so that users can grant them during installation. Traditional user-based permission systems assign the Traditional user-based permission systems assign the user’s full privileges to all applications. Modern plat- user’s full privileges to all of the user’s applications. In forms are transitioning to a new model, in which each the application permission model, however, each appli- application has a different set of permissions based on cation can have a customized set of permissions based its requirements. Application permissions offer several on its individual privilege requirements. If most applica- advantages over traditional user-based permissions, but tions can be satisfied with less than the user’s full priv- these benefits rely on the assumption that applications ileges, then three advantages of application permissions generally require less than full privileges. We explore over the traditional user-based model are possible: whether that assumption is realistic, which provides in- sight into the value of application permissions. • User Consent: Security-conscious users may be We perform case studies on two platforms with appli- hesitant to grant access to dangerous permissions cation permissions, the Google Chrome extension sys- without justification. For install-time systems, this tem and the Android OS. We collect the permission re- might alert some users to malware at installation; quirements of a large set of Google Chrome extensions for time-of-use systems, this can prevent an in- and Android applications.
    [Show full text]
  • Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges
    Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges Declaration: I, Rajeev Ghode, persuing my Ph.D. in Department of Communication Studies, Pune University. Title of Ph.D. Research is "To study potential and challenges in the use and adoption of ICT in Higher Education"For this research purpose, I want to collect quantitative data from all the professors of colleges which are affiliated to Pune University. I ensure that all the data collected will be used only for the Ph.D. research and secrecy of the data will be maintained. I appreciate you for spending your valuable time to fill this questionnaire. Thanking You <•;. Prof. Rajeev Ghode Questionnaire Name of the College Address/City 1 Arts Science and Commerce College 1 Arts Science and Commerce College with Computer Science Type of College 1 Commerce and BBA Q B.Ed. College 1 1 Law Institutional ICT Infrastructure Sr. ICT Infrastructure Yes No Provision in near No. future 1. Multimedia /Conference Hall 2. Computer Lab 3. Internet Connectivity in Campus 4. Digital Library 5. Website 6. Organization e-mail Server 7. Blog Appendix - I Sr. ICT Infrastructure Yes No Provision in near No. future 8. Presence on SNS 9. Online Admission System 10. Online/Offline Examination Application 11. Biometric Attendance 12. Student Management System 13. Professional membership for online journals Department-wise ICT Infrastructure Sr. ICT Infrastructure Yes No Provision in near No. future 1. Do you have separate Desktops for faculties in every department? 2. Do you have separate Laptops for every department? 3. Does every department have LCD Projector? 4.
    [Show full text]
  • Empirical Study on Media Monitoring and Internationalisation Resources
    MULTISENSOR Mining and Understanding of multilinguaL contenT for Intelligent Sentiment Enriched coNtext and Social Oriented inteRpretation FP7-610411 D2.1 Empirical study on media monitoring and internationalisation resources Dissemination level: Public Contractual date of delivery: Month 6, 30 April 2014 Actual date of delivery: Month 6, 30 April 2014 Workpackage: WP2 Multilingual and multimedia content extraction Task: T2.1 Empirical study Type: Report Approval Status: Final Draft Version: 1.1 Number of pages: 172 Filename: D2.1_EmpiricalStudy_2014-04-30_v1.1.pdf Abstract This empirical study identifies the resources and the type of information that needs to be extracted in the project and their encoding types. In addition it reports information retrieval and crawling techniques that could be employed for the extraction of this information. The information in this document reflects only the author’s views and the European Community is not liable for any use that may be made of the information contained therein. The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Page 1 Co-funded by the European Union Page 2 D2.1 – V1.1 History Version Date Reason Revised by 0.1 20/03/2014 Draft V. Aleksić (LT) 0.2 03/04/2014 Comments S. Vrochidis (CERTH), I. Arapakis (BM-Y!) 0.3 15/04/2014 Update V.Aleksić (LT) 0.4 16/04/2014 Document for internal review V.Aleksić (LT) 0.5 24/04/2014 Review A.
    [Show full text]
  • Apigee X Migration Offering
    Apigee X Migration Offering Overview Today, enterprises on their digital transformation journeys are striving for “Digital Excellence” to meet new digital demands. To achieve this, they are looking to accelerate their journeys to the cloud and revamp their API strategies. Businesses are looking to build APIs that can operate anywhere to provide new and seamless cus- tomer experiences quickly and securely. In February 2021, Google announced the launch of the new version of the cloud API management platform Apigee called Apigee X. It will provide enterprises with a high performing, reliable, and global digital transformation platform that drives success with digital excellence. Apigee X inte- grates deeply with Google Cloud Platform offerings to provide improved performance, scalability, controls and AI powered automation & security that clients need to provide un-parallel customer experiences. Partnerships Fresh Gravity is an official partner of Google Cloud and has deep experience in implementing GCP products like Apigee/Hybrid, Anthos, GKE, Cloud Run, Cloud CDN, Appsheet, BigQuery, Cloud Armor and others. Apigee X Value Proposition Apigee X provides several benefits to clients for them to consider migrating from their existing Apigee Edge platform, whether on-premise or on the cloud, to better manage their APIs. Enhanced customer experience through global reach, better performance, scalability and predictability • Global reach for multi-region setup, distributed caching, scaling, and peak traffic support • Managed autoscaling for runtime instance ingress as well as environments independently based on API traffic • AI-powered automation and ML capabilities help to autonomously identify anomalies, predict traffic for peak seasons, and ensure APIs adhere to compliance requirements.
    [Show full text]
  • How to Write a Scientific Report
    How to Write an EEI Contents: 1. Formatting your report………………………………………………………….page 3 Grammar v Tense………………………. page 5 Data V Crap………………………………… page 5 Googling ……………………………………. page 6 Referencing………………………………… page 8 Bibliography………………………………. page 12 2. Planning your investigation…………………………………………………..page 14 Variables……………………………………… page 16 Assumptions……………………………….. page 16 Experimental Replication……………. page 17 Checklist for Experimental Design page 17 3. Writing your Report……………………………………………………………….page 17 Title ……………………………………………… page 19 Abstract ………………………………………. page 20 Introduction…………………………………. page 21 Hypothesis ………………………………….. page 22 Risk Assessment………………………….. page 23 Variables………………………………………. Page 24/25 Method…………………………………………. Page 26 Results…………………………………………. page 27 Discussion ………………………………….. page 28, 29, 30 Conclusion ………………………………….. page 31 Literature Cited / Bibliography ….. page 33 Appendices………………………………….. page 34 APPENDICIES Appendix 1 – Data Analysis Appendix 3 – Scientific Drawings Appendix 4 – Literature Reviews Appendix 5 – Example/model reports Appendix 6 – False Positive Data Analysis FORMATTING YOUR REPORT Before you start Grammar and Tense FORMATTING Data v Crap! Qualitative v Quantitative data „Googling‟ How to search online Referencing How to cite reference within your text Bibliography How to write a scientific bibliography Use past tense, third person when writing your report…. e.g. “The research into the corrosion of metals was performed to see if …..” not “We did the experiment to see if….” FORMATTING “It
    [Show full text]
  • EN-Google Hacks.Pdf
    Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52.
    [Show full text]
  • Exploring Mood on the Web
    ESSE: Exploring Mood on the Web Sara Owsley Sood and Lucy Vasserman Computer Science Department, Pomona College 185 East Sixth Street, Room 232 Claremont, CA 91711 [email protected], [email protected] Abstract Google or Yahoo! afford. Rather, it enables the user to Future machines will connect with users on an emotional browse their topically relevant search results by mood, level in addition to performing complex computations providing the user with a unique perspective on the topic at (Norman 2004). In this article, we present a system that hand. Consider a user wishing to read opinions about the adds an emotional dimension to an activity that Internet new president of the United States. Typing “President users engage in frequently, search. ESSE, which stands for Obama” into a Google search box will return (among other Emotional State Search Engine, is a web search engine that results), a few recent news stories about Obama, the goes beyond facilitating a user’s exploration of the web by Whitehouse’s website, as well as a wikipedia article about topic, as search engines such as Google or Yahoo! afford. him. Typing “President Obama” to a Google Blog Search Rather, it enables the user to browse their topically relevant box user a bit closer to their goal in that all of the results search results by mood, providing the user with a unique perspective on the topic at hand. Consider a user wishing to are indeed blogs (typically opinions) about Obama. read opinions about the new president of the United States. However, where blog search engines fall short is in Typing “President Obama” into a Google search box will providing users with a way to navigate and digest the return (among other results), a few recent news stories about vastness of the blogosphere, the incredible number of Obama, the Whitehouse’s website, as well as a wikipedia results for the query “President Obama” (approximately article about him.
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • La Influencia Del 2.0 En Los Negocios De La Empresa Actual
    Empresa 2.0 Proyecto Final de Carrera Ingeniería Técnica Informática de Gestión Autor: Joshua Ivars Medina Tutor: Juan Vicente Oltra Gutiérrez Marzo 2013 Agradecimientos Este trabajo es el resultado de un proceso arduo y laborioso que no hubiera sido posible sin la ayuda de las siguientes personas a las que me gustaría agradecer: A mi tutor, Juan Vicente Oltra, por la atención y orientación que me ha prestado durante todo el proyecto. Al experto en marketing Juan Merodio, que ha sido mi gurú gracias a sus múltiples conferencias que han sido de gran ayuda. Y respondiendo puntualmente todas mis dudas y me ha suministrado información. A mi padre por permitirme hacer mis primeros “experimentos” en esto del marketing digital y que me han sido de gran ayuda para poder aprender a aplicar en la práctica todos estos conocimientos. Mis amigos, mi familia que han estado a mi lado y me han animado y empujado para que avanzara en el proyecto. Me he sentido muy cómodo y realizado trabajando con este proyecto, que espero que sirva de ayuda para cualquier emprendedor o empresario que se quiera iniciar en redes sociales. 1 Tabla de contenido 1. Introducción. Objetivos del PFC ........................................................................................ 3 2. Metodología y Herramientas ............................................................................................ 5 2.1 El 2.0 .................................................................................................................................... 5 2.1.1 ¿Qué es? ......................................................................................................................
    [Show full text]
  • 2Nd USENIX Conference on Web Application Development (Webapps ’11)
    conference proceedings Proceedings of the 2nd USENIX Conference Application on Web Development 2nd USENIX Conference on Web Application Development (WebApps ’11) Portland, OR, USA Portland, OR, USA June 15–16, 2011 Sponsored by June 15–16, 2011 © 2011 by The USENIX Association All Rights Reserved This volume is published as a collective work. Rights to individual papers remain with the author or the author’s employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. Permission is granted to print, primarily for one person’s exclusive use, a single copy of these Proceedings. USENIX acknowledges all trademarks herein. ISBN 978-931971-86-7 USENIX Association Proceedings of the 2nd USENIX Conference on Web Application Development June 15–16, 2011 Portland, OR, USA Conference Organizers Program Chair Armando Fox, University of California, Berkeley Program Committee Adam Barth, Google Inc. Abdur Chowdhury, Twitter Jon Howell, Microsoft Research Collin Jackson, Carnegie Mellon University Bobby Johnson, Facebook Emre Kıcıman, Microsoft Research Michael E. Maximilien, IBM Research Owen O’Malley, Yahoo! Research John Ousterhout, Stanford University Swami Sivasubramanian, Amazon Web Services Geoffrey M. Voelker, University of California, San Diego Nickolai Zeldovich, Massachusetts Institute of Technology The USENIX Association Staff WebApps ’11: 2nd USENIX Conference on Web Application Development June 15–16, 2011 Portland, OR, USA Message from the Program Chair . v Wednesday, June 15 10:30–Noon GuardRails: A Data-Centric Web Application Security Framework . 1 Jonathan Burket, Patrick Mutchler, Michael Weaver, Muzzammil Zaveri, and David Evans, University of Virginia PHP Aspis: Using Partial Taint Tracking to Protect Against Injection Attacks .
    [Show full text]
  • Publicidad Display
    Universidad Politécnica de Valencia Escuela Técnica Superior de Ingeniería Informática Publicidad en internet. Situación 2005- 2010 Para optar a la titulación de: Ingeniería Informática Presentado por: Yulia Reznichenko Dirigido por: Juan Vicente Oltra Gutiérrez Junio, 2011 Contenido: Contenido: ............................................................................................................................................ 2 Introducción ......................................................................................................................................... 6 La publicidad en Internet. .................................................................................................................... 7 Ventajas de publicidad en Internet ............................................................................................... 8 Desventajas .................................................................................................................................. 9 Buscadores ......................................................................................................................................... 10 Ventajas de ser visible en buscadores ........................................................................................ 10 ¿Cómo funcionan los buscadores? ............................................................................................. 10 Las áreas en las que se puede enfocar ........................................................................................ 12 Resultados
    [Show full text]
  • On the Security of Single Sign-On
    On the Security of Single Sign-On Vladislav Mladenov (Place of birth: Pleven/Bulgaria) [email protected] 30th June 2017 Ruhr-University Bochum Horst G¨ortz Institute for IT-Security Chair for Network and Data Security Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨atf¨urElektrotechnik und Informationstechnik an der Ruhr-Universit¨atBochum First Supervisor: Prof. Dr. rer. nat. J¨org Schwenk Second Supervisor: Prof. Dr.-Ing. Felix Freiling www.nds.rub.de Abstract Single Sign-On (SSO) is a concept of delegated authentication, where an End- User authenticates only once at a central entity called Identity Provider (IdP) and afterwards logs in at multiple Service Providers (SPs) without reauthenti- cation. For this purpose, the IdP issues an authentication token, which is sent to the SP and must be verified. There exist different SSO protocols, which are implemented as open source libraries or integrated in commercial products. Google, Facebook, Microsoft and PayPal belong to the most popular SSO IdPs. This thesis provides a comprehensive security evaluation of the most popular and widely deployed SSO protocols: OpenID Connect, OpenID, and SAML. A starting point for this research is the development of a new concept called malicious IdP, where a maliciously acting IdP is used to attack SSO. Generic attack classes are developed and categorized according to the requirements, goals, and impact. These attack classes are adapted to different SSO proto- cols, which lead to the discovery of security critical vulnerabilities in Software- as-a-Service Cloud Providers, eCommerce products, web-based news portals, Content-Management systems, and open source implementations.
    [Show full text]