(12) United States Patent (10) Patent No.: US 8,726,149 B2 Bendelac Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 8,726,149 B2 Bendelac Et Al USOO8726 1 49B2 (12) United States Patent (10) Patent No.: US 8,726,149 B2 Bendelac et al. (45) Date of Patent: May 13, 2014 (54) METHOD AND SYSTEM FOR PROVIDING 5,014,265 A 5/1991 Hahne et al. REDUCED-SIZE HYPERTEXT CONTENT TO 5,155,847 A 10, 1992 Kirouac et al. 5,224,099 A 6/1993 Corbalis et al. A LIMITED-DISPLAY CLIENT DEVICE 5,280,470 A 1/1994 Buhrke et al. (75) Inventors: Chaim Bendelac, Kfar-Saba (IL); Ran (Continued) M. Bittmann, Tel-Aviv (IL); Kobi Samburski, Herzliya (IL) FOREIGN PATENT DOCUMENTS (73) Assignee: Cisco Technology, Inc., San Jose, CA EP O 797 342 A1 9, 1997 (US) OTHER PUBLICATIONS (*) Notice: Subject to any disclaimer, the term of this “Hot Products & Solutions—IP Address Management: A White patent is extended or adjusted under 35 Paper.” Network Registrar, American Internet Corporation, Bedford, U.S.C. 154(b) by 1126 days. MA, printed from http://www.american.com/ip-mgmt.html, on Jul. 24, 1998. (21) Appl. No.: 12/506,062 (Continued) (22) Filed: Jul. 20, 2009 Primary Examiner — Laurie Ries (74) Attorney, Agent, or Firm — Novak Druce Connolly (65) Prior Publication Data Bove + Quigg LLP US 2009/0313535A1 Dec. 17, 2009 (57) ABSTRACT Related U.S. Application Data A computer system provides content to a client device such as a handheld wireless telephone by identifying the client device (63) Continuation of application No. 10/947,457, filed on as a limited-display client device, receiving a request from the Sep. 21, 2004, now Pat. No. 7,564,856, which is a client device for hypertext content (e.g. content in HTML continuation of application No. 08/948,534, filed on form), and generating a reduced-size version of the requested Oct. 9, 1997, now Pat. No. 6,845,102. hypertext content. Based on the identification of the client (51) Int. C. device as a limited-display client device and in response to the G06F I7/00 request, the reduced-size version of the hypertext content is (2006.01) returned to the client device. The reduced-size version of the (52) U.S. C. hypertext content may be generated by removing information USPC .......................................................... 71.5/238 from the hypertext content which is not relevant to the display (58) Field of Classification Search of the client device, and the reduced-size version of the hyper USPC .......................................... 715/238, 234, 242 text content may include page in a text-based hypertext See application file for complete search history. markup language such as HTML. A layout conversion may be used from a first hypertext layout to a second hypertext layout (56) References Cited of the reduced hypertext content, which may be more directly usable by a handheld wireless telephone than is the first U.S. PATENT DOCUMENTS hypertext layout. 4,922,486 A 5/1990 Lidinsky et al. 4,971.407 A 11, 1990 Hoffman 6 Claims, 5 Drawing Sheets E-MAIL REGISTRATIONAND SERVER ATHENTICATION 42 ZzaRADIUS EzzaGWIP 48 i...LOCALAREANETWORKETHERNET. a : 40 ROUTER INTERNET (ANDFIREWALL) B E-38 ISPMANAGEMENT E PROXY CENTER SERVER NETWORK MANAGEMENT LOCAL POP GW ADDITIONSTOANSPTOPOLOGY PROTOCOLS 12 SPBACKBONE CENTER (T3, DS3, ETC) 16 US 8,726,149 B2 Page 2 (56) References Cited 6,845,102 B1 1/2005 Bendelac et al. 7,564,856 B2 7/2009 Bendelac et al. U.S. PATENT DOCUMENTS 2005/0028090 A1 2/2005 Sweet et al. .................. 715,513 2005, 0138554 A1* 6/2005 Bell et al. ...................... 71.5/530 5,305,311 A 4/1994 Lyles 2006/0031759 A1 2/2006 Brown et al. ................. 715,514 5,541,957 A 7, 1996 Lau 2006/0114350 A1* 6/2006 Shimada et al. 348/423.1 5,592.470 A 1/1997 Rudrapatna et al. 2006/0143282 A1* 6/2006 Brown et al. ... TO9,217 5,610,910 A 3/1997 Focsaneanu et al. 2007,0005654 A1* 1/2007 Schachar et al. 707/104.1 5,717,604 A 2/1998 Wiggins 2008/0168544 A1* 7/2008 von Krogh ........................ T26/6 5,729,5464. A 3,336 1998 GuptaE. et al. OTHER PUBLICATIONS 5,761,280 A 6, 1998 Noonen et al. 5,761,662 A 6, 1998 Dasan IBM Introduces New Subscriber Management System for Internet 5,764,736 A * 6/1998 Shachar et al. ............ 379,93.09 Service Providers, Dec. 2, 1998, IBM Corporation, printed from 5,768,521 A 6, 1998 Dedrick http://www.ibm.com/News/1997/12/Is9712102.html. 5,778,182 A 7, 1998 Cathey et al. Rigney, et al., “Remote Authentication Dial in User Service 37623 A E. pSimoneet al. (RADIUS).” Network Working Group, RFC 2138, Apr. 1997, pp. - - 1-57. 3. A ck 38 Ey, et al. .......... TO9,224 Simpson, W., “The Point-to-Point Protocol (PPP).” Dec. 1993, Net 5,905,736 A 5, 1999 Ronen et al. work Working Group, Request for Comments: 1548, Obsoletes: RFC 5,960,409 A 9, 1999 Wexler 1331, Category: Standards Track. 5,970.477 A 10, 1999 Roden “Three Ways to Manage IP Addresses.” PC Magazine: IP Address 6,006,231 A 12/1999 Popa Management, printed from http://www.Zdnet.com.pcmag/features/ 6,018,619 A 1/2000 Allard et al. ipmanage/ip-s2.htm., on Sep. 10, 1998. 6,018,770 A 1/2000 Little et al. “Regain Confidence and Control Over Your IP Address Infrastruc 6,026,087 A 2/2000 Mirashrafi et al. ture.” Network Registrar, American Internet Corporation, Bedford, 835A 39 Still MA (c) 1998. 6,052,730W - - A ck 4, 2000 FelcianoroSSKey et et al.al. S.R., &S. & R Protocol.”s 1996, printed from http:// 6.421,429E. B1 7/2002S. MerrittE. et "...O.al. E. U.S.S. Appl.App? No. 08/948,534,10745, filed sep.Oct. 9,21, 1997. 2004. 6.421,733 B1* 7/2002 Tso et al. ...................... TO9,246 6,789,263 B1* 9/2004 Shimada et al. .............. 725,119 * cited by examiner U.S. Patent May 13, 2014 Sheet 2 of 5 US 8,726,149 B2 ?E)ELISSEM U.S. Patent May 13, 2014 Sheet 4 of 5 US 8,726,149 B2 58 56 BROWSER 30 50 4 SERVERGEAR HTTP/TCP-IP 60 DATALINKPHYSICAL THE INTERNET FIG. 5 CLIENT REQUESTS GW IDENTIFIES 100 INFORMATION CLIENTATTRIBUTES 105 GW NEGOTATES REQUEST WITH INTERNET 110 INFORMATION RETURNED TO GW 115 GW STRIPS IRRELEVANT INFORMATION 120 INFORMATION TRANSMITTED TO CLIENT 125 FIG. 6 U.S. Patent May 13, 2014 Sheet 5 of 5 US 8,726,149 B2 WEBSITE 51 HTML (REQD) 200 GATEWAY 42 HTML (CONVD) 202 CLIENT 30 Fig. 7 204 208 2O6 -> Fig. 8 US 8,726,149 B2 1. 2 METHOD AND SYSTEM FOR PROVIDING Point-to-point links are among the oldest methods of data REDUCED-SIZE HYPERTEXT CONTENT TO communications and almost every host Supports point-to A LIMITED-DISPLAY CLIENT DEVICE point connections. A long-distance point-to-point link is achieved by using a modem to establish a dial-up link BACKGROUND OF THE INVENTION between a display terminal. Such as a personal computer, and the other host, such as a host located on the ISP site. 1. Technical Field The communication over the serial point-to-point line is in The invention relates to data communication networks. the form of encapsulated (framed) TCP/IP datagrams (data More particularly, the invention relates to transmitting infor packets) using either Serial Line Internet Protocol (SLIP) or 10 Point-to-Point protocol (PPP) packet framing. mation from a faster network to a data terminal via a slow The SLIP protocol is described in IETF Network Working network connection. Group (J. Romkey), “A NONSTANDARD FOR TRANS 2. Description of the Prior Art MISSION OF IP DATAGRAMS OVER SERIAL LINES: Electronic commercial and academic computer networks SLIP Request for Comments: 1055-June 1988. The PPP have been in existence for many years. An example of a 15 protocol is described in IETF Network Working Group (D. commercial network is America On-Line. The largest and Perkins), “The Point-to-Point Protocol for the Transmission best-known electronic network is commonly known as the of Multi-Protocol Datagrams Over Point-to-Point Links.” Internet. The Internet is a world-wide “network of networks’ Request for Comments: 1171. SLIP transmits IP data packets that is composed of thousands of interconnected computers over any serial link, Such as a telephone line. It is generally and computer networks. used to provide Internet access to networks that support TCP/ The preferred protocol of communications on the Internet IP PPP is a more common data link protocol that provides is a set of standards and protocols, commonly referred to as dial-up access over serial lines. TCP/IP. These TCP/IP protocols provide the means to estab FIG. 2 is a diagram of a traditional Internet connection lish a connection between two nodes on the network, and to according to the prior art. To communicate on the Internet 26, Subsequently transfer messages and data between these 25 an appliance or terminal (the client) 18 establishes a logical nodes. TCP (Transmission Control Protocol) provides the connection with a content provider. This connection is typi logical connection to ensure delivery of an entire message or cally made using dial-up equipment, Such as a modem 46 to file, while IP (Internet Protocol) provides the routing mecha connect to the public telephone system 22. The information nism. transmitted over the telephone line is composed of PPP The majority of residential and commercial users of Such 30 wrapped TCP/IP data packets. Essentially, the ISP 10 is a computer networks (the clients) do not have a direct connec transparent channel through which the client directly com tion to the network.
Recommended publications
  • Mod Perl 1.0 API Table of Contents
    mod_perl 1.0 API Table of Contents: mod_perl 1.0 API Here is the documentation for the whole API provided with the mod_perl distribution, ie. of various Apache:: modules you will need to use. Last modified Sun Feb 16 01:33:53 2014 GMT 15 Feb 2014 1 Table of Contents: Part I: Access to the Apache API - 1. Apache - Perl interface to the Apache server API This module provides a Perl interface the Apache API. It is here mainly for mod_perl, but may be used for other Apache modules that wish to embed a Perl interpreter. We suggest that you also consult the description of the Apache C API at http://httpd.apache.org/docs/ . - 2. Apache::Constants - Constants defined in apache header files Server constants used by apache modules are defined in httpd.h and other header files, this module gives Perl access to those constants. - 3. Apache::Options - OPT_* defines from httpd_core.h The Apache::Options module will export the following bitmask constants: - 4. Apache::Table - Perl interface to the Apache table structure This module provides tied interfaces to Apache data structures. - 5. Apache::File - advanced functions for manipulating files at the server side Apache::File does two things: it provides an object-oriented interface to filehandles similar to Perl’s standard IO::File class. While the Apache::File module does not provide all the functionality of IO::File, its methods are approximately twice as fast as the equivalent IO::File methods. Secondly, when you use Apache::File, it adds several new methods to the Apache class which provide support for handling files under the HTTP/1.1 protocol.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • The Making of Netscape
    The Making of Netscape This case was written by Professor Rajeev Kohli, Graduate School of Business, Columbia University, for class discussion rather than to illustrate either effective or ineffective handling of an administrative situation. 1 The Making of Netscape Marc Andreessen started working on the Mosaic web browser in 1992. He was a computer science student at the University of Illinois, but he spent a lot more time at the NCSA, the University’s supercomputing center, than he did in the classroom. “Working at NCSA was fascinating,” says Andreessen. “The super-computing program in the mid-1980's originated because the government thought it was crucial that a powerful computing infrastructure be provided for scientists. An interesting thing happened around 1990: all the supercomputing centers essentially stopped running supercomputers. They shut down the Crays. They could no longer afford to keep them running, especially with the advent of more cost efficient microprocessors. Since it no longer made sense to run a supercomputer, what do you do? And so networking quickly became a very big part of NCSA, the theory being that the next stage would be to link together everything -- especially scientists and educators who up until that point had been using the Crays. Networking had arrived so fast, and everything was happening so rapidly, that people just hadn't yet gotten around to making it accessible.” The Internet phenomenon had been gaining momentum for a decade, but its use was still limited to a small group of skilled programmers. “People had also been talking about hypertext for a long time, and it finally happened at NCSA,” says Andreessen.
    [Show full text]
  • Kenneth Arnes Ryan Paul Jaca Network Software Applications History
    Kenneth Arnes Ryan Paul Jaca Network Software Applications Networks consist of hardware, such as servers, Ethernet cables and wireless routers, and networking software. Networking software differs from software applications in that the software does not perform tasks that end-users can see in the way word processors and spreadsheets do. Instead, networking software operates invisibly in the background, allowing the user to access network resources without the user even knowing the software is operating. History o Computer networks, and the networking software that enabled them, began to appear as early as the 1970s. Early networks consisted of computers connected to each other through telephone modems. As personal computers became more pervasive in homes and in the workplace in the late 1980s and early 1990s, networks to connect them became equally pervasive. Microsoft enabled usable and stable peer-to-peer networking with built-in networking software as early as 1995 in the Windows 95 operating system. Types y Different types of networks require different types of software. Peer-to-peer networks, where computers connect to each other directly, use networking software whose basic function is to enable file sharing and printer sharing. Client-server networks, where multiple end-user computers, the clients, connect to each other indirectly through a central computer, the server, require networking software solutions that have two parts. The server software part, running on the server computer, stores information in a central location that client computers can access and passes information to client software running on the individual computers. Application-server software work much as client-server software does, but allows the end-user client computers to access not just data but also software applications running on the central server.
    [Show full text]
  • Web Technologies
    DIGITAL NOTES ON R18A0517– WEB TECHNOLOGIES B.TECH III YEAR - I SEM (2021-22) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, INDIA. MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY III Year B.Tech. IT - I Sem L T/P/D C 3 -/-/- 3 (R18A0517)WEB TECHNOLOGIES UNIT I: Web Basics and Overview: Introduction to Internet, World Wide Web, Web Browsers, URL, MIME, HTTP, Web Programmers Tool box. HTML Common tags: List, Tables, images, forms, frames, Cascading Style Sheets (CSS) & its Types. Introduction to Java Script, Declaring variables, functions, Event handlers (onclick, onsubmit, etc.,) and Form Validation. UNIT II: Introduction to XML: Document type definition, XML Schemas, Presenting XML , Introduction to XHTML, Using XML Processors: DOM and SAX. PHP: Declaring Variables, Data types, Operators, Control structures, Functions. UNIT III: Web Servers and Servlets: Introduction to Servlets, Lifecycle of a Servlet, JSDK, Deploying Servlet, The Servlet API, The javax. Servlet Package, Reading Servlet parameters, Reading Initialization parameters. The javax.servlet HTTP package, Handling Http Request & Responses, Cookies and Session Tracking. UNIT IV: Database Access: Database Programming using JDBC, JDBC drivers, Studying Javax.sql.* package, Connecting to database in PHP, Execute Simple Queries, Accessing a Database from a Servlet. Introduction to struts frame works. UNIT V: JSP Application Development: The Anatomy of a JSP Page, JSP Processing. JSP Application Design and JSP Environment, JSP Declarations, Directives, Expressions, Scripting Elements, implicit objects.
    [Show full text]
  • A Study and Comparison of Multimedia Web Searching: 1997–2006
    A Study and Comparison of Multimedia Web Searching: 1997–2006 Dian Tjondronegoro and Amanda Spink Faculty of Information Technology, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland 4001, Australia. E-mail: {dian, ah.spink}@qut.edu.au Bernard J. Jansen College of Information Science and Technology, The Pennsylvania State University, State College, PA 16802. E-mail: [email protected] Searching for multimedia is an important activity for vast amounts of multimedia information, state-of-the-artWeb users of Web search engines. Studying user’s inter- searching systems need to effectively index the contents actions with Web search engine multimedia buttons, and select the most relevant documents to answer users’ including image, audio, and video, is important for the development of multimedia Web search systems. This queries that are based on the semantic or similarity percep- article provides results from a Weblog analysis study of tion. Content-based image, audio, and video search have been multimedia Web searching by Dogpile users in 2006. The given a lot of attention by researchers due to the grand chal- study analyzes the (a) duration, size, and structure of lenges in bridging the gaps between low-level audiovisual Web search queries and sessions; (b) user demograph- features and high-level semantics to support intuitive search- ics; (c) most popular multimedia Web searching terms; and (d) use of advancedWeb search techniques including ing (Lew, Sebe, Djeraba, & Jain, 2006;Yoshitaka& Ichikawa, Boolean and natural language. The current study find- 1999). ings are compared with results from previous multimedia However, despite promising research results, Web multi- Web searching studies.
    [Show full text]
  • GRÜN AUF! ALTENDORF Familien- Und Gartenfest Auf Der Altendorfer Straße
    09 2017 INFO-MAGAZIN FÜR WUPPERTAL, SOLINGEN, REMSCHEID AUCH ALS E-PAPER UND APP GRÜN AUF! ALTENDORF Familien- und Gartenfest auf der Altendorfer Straße SONNTAG, 17. September 11 bis 17 Uhr www.deingrüneswunder.de Eintauchen ins Weltall Mit vielen Freunden 27. Ausbildungsbörse Im Zeiss Planetarium in Bochum wird Sondaschule feiern 15-jähriges Bühnen- Jugendliche treffen Unternehmen – das der Sternenhimmel genau beleuchtet. jubiläum als großes Open-Air-Festival. Heft zur Wuppertaler Ausbildungsbörse. September 2017 AUCH ALS E-PAPER UND APP HEUTE 04 Startphase SCHON 12 Stadtplan Kurz mit Kröck – Pop-Up-Intendanz in Bochum WAS © LWL PLANETARIUM MÜNSTER PLANETARIUM LWL © 14 Eintauchen ins All – Das Zeiss Planetarium Bochum 16 GOP Varieté meets Folkwang Kammerorchester Essen VOR? 18 Konzerte AstronomieShow „Planeten“ Mark Forster im Westfalenpark Tito & Tarantula im LCB UFO im Musiktheater Piano Bear’s Den in der Zeche Bochum Eisbrecher in der Turbinenhalle BASTIAN HARTINGBASTIAN MC Fitti in der Zeche Carl Welshly Arms im Luxor ColdWaveDark Festival im Bahnhof Langendreer Phoenix im E-Werk Tori Amos im Colosseum Theater Sondaschule Maxïmo Park in der Live Music Hall Papa Roach + Callejon in der Turbinenhalle 20 Tipp des Monats: Sondaschule 22 Bewegungsmelder Die Veranstaltungstermine des Monats im Überblick MARCEL HARTMANN MARCEL 44 Impressum 46 Ausstellungsübersicht 48 Kleinanzeigen Kontakte, Reisen, Kunst und Kreatives, Dies und Das BESUCH‘ On the Milky Road 50 Kino „Als Paul über das Meer kam“ von Jakob Preuss UNS AUF „Jugend ohne Gott“ mit Jannis Niewöhner „The Circle“ mit Emma Watson, Tom Hanks FACEBOOK! „Immer noch eine unbequeme Wahrheit“ mit Al Gore „Das Löwenmädchen“ von Vibeke Idsøe „Porto“ mit Anton Yelchin, Lucie Lucas „Körper und Seele“ von Ildikó Enyedi © TOBIAS ZIELONY, KOW BERLIN AUSSCHNITT BERLIN KOW ZIELONY, TOBIAS © „Leanders letzte Reise“ mit Jürgen Prochnow Tobias Zielony 52 Tipp des Monats: „On the Milky Road“ 54 Ausstellungen „Art et Liberté“ in der K20 Kunstsammlung Alexander Kluge im Museum Folkwang 71.
    [Show full text]
  • Digital Notes
    WEB TECHNOLOGIES [R17A0519] LECTURE NOTES B.TECH III YEAR – II SEM(R17) (2019-20) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India III Year B. Tech. CSE –II Sem L T/P/D C 4 1/- / - 3 (R17A0519) WEB TECHNOLOGIES Objectives: Giving the students the insights of the Internet programming and how to design and implement complete applications over the web. It covers the notions of Web servers and Web Application Servers, Design Methodologies with concentration on Object-Oriented concepts, Client-Side Programming, Server-Side Programming, Active Server Pages, Database Connectivity to web applications, Adding Dynamic content to web applications, Programming Common Gateway Interfaces, Programming the User Interface for the web applications. UNIT I: Web Basics and Overview: Introduction to Internet, World Wide Web, Web Browsers, URL, MIME, HTTP, Web Programmers Tool box. HTML Common tags: List, Tables, images, forms, frames, Basics of CSS and types of CSS. Client-Side Programming (Java Script): Introduction to Java Script, declaring variables, functions, Event handlers (onclick, onsubmit, etc.,) and Form Validation. UNIT II: Server-Side Programming (PHP): Declaring Variables, Data types, Operators, Control structures, Functions, Reading data from web form controls like text buttons, radio buttons, list, etc., Handling File Uploads, Handling Sessions & Cookies. Introduction to XML: Document type definition, XML Schemas, Document Object model, Presenting XML , Introduction to XHTML, Using XML Processors: DOM and SAX.
    [Show full text]
  • Silence: Moving Into the Darkside
    September 2018 group-ib.com MOVING INTO THE DARKSIDE 1 Silence Moving into the darkside TABLE OF CONTENTS Introduction 4 Key findings 5 Silence is a new threat to banks 5 Language 5 Thefts 6 Geography 6 Tools 7 Initial steps 7 Phishing emails 7 Server infrastructure 8 Silence: the development of tools and types of attacks 9 Toolbox 10 Silence 10 Atmosphere 13 Undernet DDoS bot 16 Smoke bot 17 Infection 18 Emails 18 Mail servers 21 Lateral movement 23 Remote Access 25 Targets 26 AWS CBR 26 ATMs 28 Card processing 30 2 Hunting СHAPTER IS NOT AVAILABLE Mail servers — C&C servers — Technical description of the tools 32 Attachments 32 Silence Trojan 37 Silence.Downloader 38 Patched Kikothac 40 Silence.MainModule 45 Silence.SurveillanceModule 53 Silence.ProxyBot 54 Silence.ProxyBot.Net 57 Silence ATM pack 60 Atmosphere.Dropper 60 Atmosphere.Injector 62 Atmosphere 62 Other programs 73 Utilities 73 Perl IRC DDoS bot 76 Indicators 81 Hashes 81 E-mails 82 IPs 83 Domains 85 File system artifacts: 86 Suricata rules — YARA rules — 3 Silence Moving into the darkside INTRODUCTION SILENCE is a new and active criminal APT-group, who adapt quickly from their own mistakes and adopt TTPs of other groups. In August 2017, the National Bank of Ukraine warned state-owned and private banks across the country about a large-scale phishing attack. The threat actor used an exploit from the arsenal of the state-sponsored hacker group APT28. However, the tool, as Group-IB discovered, was modified to target banks. It also appeared that the authors of the phishing emails had in-depth knowledge of reverse engineering.
    [Show full text]
  • Werken Met Netscape Navigator 3 Gratis Epub, Ebook
    WERKEN MET NETSCAPE NAVIGATOR 3 GRATIS Auteur: Sybex Aantal pagina's: 354 pagina's Verschijningsdatum: none Uitgever: none EAN: 9789051609905 Taal: nl Link: Download hier Girl thing Ga direct naar de inhoud , het zoekveld of het hoofdmenu. Uitleg van het gebruik van dit programma waarmee het Internet verkend kan worden. Nederlands, pagina's, Instruct, Bodegraven, Nederlands, 71 pagina's, Bijleveld Press, Utrecht, Uitleg voor beginners van het programma waarmee Internet verkend kan worden. Nederlands, 52 bl, Instruct, Bodegraven, Nederlands, pagina's, Easy computing, Brussel, Nederlands, pagina's, Easy Computing, Brussel, Zoeken in de catalogus Zoeken binnen de site. Brenda Kienan, Daniel A. Tauber Netscape Uitleg van het gebruik van dit programma waarmee het Internet verkend kan worden. Als u reeds een ou​dere Netscape-ver​sie heeft moet u in uw Net​sca​pe-directory b. U dubbelklikt vervolgens vanuit de Windows 3. Bij Windows 95 zal de installatie dan onmiddellijk starten, terwijl bij Windows 3. Wie de bit versie gebruikt Windows 3. Setup vraagt dan of u de nieuwe versie in dezelfde directory als de vorige versie wilt installeren voor de bit versie vol​staat alleen deze stap om de bestaande in​stel​lin​gen over te nemen. U hebt dan de keuze in welke folder de nieuwe Net​scape-icoontjes zullen verschijnen. U kunt dan on​mid​del​‐ lijk het readme-bestand le​zen waarin nog wat in​for​matie wordt vermeld o. Tweedehands Nederlandstalige Boeken over Programmeren Netscape 3. Netscape 4 loste het probleem op dat Netscape Navigator werd gebruikt als zowel de naam van de suite als de browser erin, door de suite te hernoemen naar Netscape Communicator.
    [Show full text]
  • Ebook Download Udiwww Pdf Free Download
    UDIWWW PDF, EPUB, EBOOK Proteus Val Re Kresten | 124 pages | 31 Dec 2011 | Volutpress | 9786139299225 | English | United States Udiwww PDF Book When released on 8 June it was one of the first graphical web browsers, and the first to run on Windows: Windows 3. These take up a great deal of the server's time, too. It is a completely self-contained, stand-alone 1. Retrieved March 24, To restate the obvious, this page isn't best viewed with Ariadne, or anything else. The web browser has transformed many times in the past two decades, with little improvements here and there that have contributed to the overall experience we have today. One or two sessions with a professional can mean the difference between fighting the change and embarking on a journey of discovery. Our editorial content is not influenced by any commissions we receive. Comes with CompuServe subscription. Developed by Advanced Multimedia System Design in early WorldWideWeb Nexus. What Browsers Do Figure 2. Otherwise, people trying to access your Web site will often find that it just isn't there. Which one is best? Free and open-source web browser developed by the Mozilla Foundation and its subsidiary, Mozilla Corporation. From CompuServe. World Wide Web Consortium. It further provides for the capture or input of information which may be returned to the presenting system, then stored or processed as necessary. March 03, However, a plethora of new server programs has been introduced in the past year, and some of them are gaining market share quickly. Internet Explorer From Microsoft see fig.
    [Show full text]
  • Unlocking the Paradox of Christian Metal Music
    University of Kentucky UKnowledge Theses and Dissertations--Music Music 2013 Unlocking the Paradox of Christian Metal Music Eric S. Strother University of Kentucky, [email protected] Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Strother, Eric S., "Unlocking the Paradox of Christian Metal Music" (2013). Theses and Dissertations-- Music. 9. https://uknowledge.uky.edu/music_etds/9 This Doctoral Dissertation is brought to you for free and open access by the Music at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--Music by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my thesis or dissertation and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained and attached hereto needed written permission statements(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine). I hereby grant to The University of Kentucky and its agents the non-exclusive license to archive and make accessible my work in whole or in part in all forms of media, now or hereafter known. I agree that the document mentioned above may be made available immediately for worldwide access unless a preapproved embargo applies. I retain all other ownership rights to the copyright of my work.
    [Show full text]