1. Webinar Potrwa 45 Minut + Pytania 2. Tu Mnie Widać 3. a Tu Można Zadawać Pytania 4

Total Page:16

File Type:pdf, Size:1020Kb

1. Webinar Potrwa 45 Minut + Pytania 2. Tu Mnie Widać 3. a Tu Można Zadawać Pytania 4 Technologia webinarów 5 kwietnia – godz. 16:00 1. Webinar potrwa 45 minut + pytania 2. Tu mnie widać 3. A tu można zadawać pytania 4. Pytania zadajemy na bieżąco, ale… 5. Ja też będę pytał! 6. Webinar jest rejestrowany wideo film webcast webinar e-learning mobile •Jak oglądamy webinar? •Co musisz powiedzieć uczestnikowi? 45 •Przygotuj swoje stanowisko pracy! minut •Wybierz oprogramowanie dla siebie •Pytania… Trener Prezentacja treści Uczestnicy Czat Materiały https://panel.clickmeeting.com/popup_tester.html http://www.transmisjeonline.pl/tester/ http://na1cps.adobeconnect.com/common/help/en/support/meeting_test.htm 1.Flash Player i JavaScript 2.Rozdzielczość 3.Przeglądarka 4.Porty 5.Prędkość pobierania danych, prędkość pobierania strumienia, opóźnienie połączenia 6.Głośniki Flash Player i JavaScript Rozdzielczość Amaya , AOL Explorer , Arora , Avant , Camino , Przeglądarka Chromium, Comodo Dragon,Dillo , Dooble , ELinks , Flock , Galeon , Google Chrome, iCab, Internet Explorer , K-Meleon , Konqueror , Links , Lunascape, Lynx , Maxthon , Midori, Mosaic , Mozilla, Mozilla Firefox , Netscape , Netscape Browser , Netscape Navigator, NetSurf, OmniWeb, Opera, Qupzilla, Safari, SeaMonkey, Shiira, Sleipnir, Torch Browser, Web, WorldWideWeb, w3m Przeglądarka Internet Firefox Chrome Safari Opera Explorer Świat 13.5 % 29.6 % 50.0 % 4.1 % 1.8 % My % % % % % http://www.w3schools.com/browsers/browsers_stats.asp http://blogs.technet.com/b/drrez/p/lync_2010_workloads.aspx download Prędkość pobierania 10 Mb/s upload danych, prędkość 2 Mb/s pobierania strumienia, opóźnienie połączenia Opóźnienie do kilkudziesięciu milisekund audio Ze złączem mini jack Ze złączem USB W jednym czasie może być używany tylko jeden mikrofon i tylko dla jednej aplikacji!! Upewnij się, że wybrany został właściwy mikrofon (np. ten w słuchawkach, a nie obudowie laptopa czy kamery), oraz że w tle nie działają aplikacje korzystające z mikrofonu (np. Skype). 1) Warunki akustyczne 2) Ustawienia karty dźwiękowej/sterownika 3) Kontrola pracy ze sprzętem 4) Odsłuch na żywo Większość kamer USB Kamerka będzie działała Ale nie zwykłe kamery wideo z możliwością podłączenia do komputera 640x360/15fps to obecnie więcej niż standard Urządzenia analogowe podłączysz przez kartę wideo. http://demotywatory.pl/2882909 Jak stopniować plany przy komputerze? Wybierz oprogramowanie dla siebie Wybierz oprogramowanie dla siebie Ilu uczestników jednocześnie obsługuje aplikacja? Ilu prowadzących jednocześnie obsługuje aplikacja? Czy w ramach licencji można prowadzić więcej webinarów w jednym czasie? Jakie funkcjonalności obsługuje aplikacja i jakie są naprawdę potrzebne? Jak bardzo chcemy zintegrować aplikację z naszym systemem? Czy aplikacja może być rozbudowywana o dodatkowe moduły lub czy jest możliwość komunikowania się z nią? W jaki sposób działa wsparcie techniczne? Czy po wdrożeniu nasi współpracownicy będą w stanie samodzielnie administrować aplikacją? Jakie będą warunki wykorzystania? Pytania? Dziękuję za uwagę i zapraszam do kontaktu: Piotr Maczuga [email protected] | 22 314 14 94 .
Recommended publications
  • Cache Files Detect and Eliminate Privacy Threats
    Award-Winning Privacy Software for OS X Every time you surf the web or use your computer, bits of Recover Disk Space data containing sensitive information are left behind that Over time, the files generated by web browsers can start could compromise your privacy. PrivacyScan provides to take up a large amount of space on your hard drive, protection by scanning for these threats and offers negatively impacting your computer’s performance. multiple removal options to securely erase them from PrivacyScan can locate and removes these space hogs, your system. freeing up valuable disk space and giving your system a speed boost in the process. PrivacyScan can seek and destroy internet files used for tracking your online whereabouts, including browsing history, cache files, cookies, search history, and more. Secure File Shredding Additionally, PrivacyScan can eliminate Flash Cookies, PrivacyScan utilizes advanced secure delete algorithms which are normally hidden away on your system. that meet and exceed US Department of Defense recommendations to ensure complete removal of Privacy Threat: Cookies sensitive data. Cookies can be used to track your usage of websites, determining which pages you visited and the length Intuitive Interface of time you spent on each page. Advertisers can use PrivacyScan’s award-winning design makes it easy to cookies to track you across multiple sites, building up track down privacy threats that exist on your system and a “profile” of who you are based on your web browsing quickly eliminate them. An integrated setup assistant and habits. tip system provide help every step of the way to make file cleaning a breeze.
    [Show full text]
  • 12 Browser Alternativi Dalle Alte Prestazioni
    12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 E' molto probabile che per leggere queste righe stiate utilizzando un browser come Firefox, oppure Internet Explorer, o Google Chrome. Questa considerazione nasce dalla constatazione che questi tre browser assieme coprono circa il 90% del mercato. Il fatto che questi 3 programmi abbiano una così vasta popolarità non comporta che si tratti delle soluzioni migliori, vista l'abbondanza di alternative presenti. {loadposition user7} Ecco, a titolo di esempio, una serie di ben 12 browser disponibili gratuitamente, che potrebbero in realtà corrispondere alle vostre esigenze in maniera migliore rispetto ai nomi più conosciuti. Maxthon Si tratta del progetto nato come MyIE2. Nel corso degli anni è diventato un potente browser a schede adatto per tutti gli utenti. Oltre alle funzionalità di navigazione di base, Maxthon Browser fornisce un ricco set di funzionalità per migliorarei vostri percorsi di navigazione 1 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Sistema Operativo: Windows Arora Arora è un leggero browser web. È dotato di rendering veloce, potente motore JavaScript e supporta plug-in Netscape. Sistema Operativo: Windows, Mac OS X, Linux Amaya 2 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 SistemaAmayaperfettamente non Operativo: è solo integrata un Windows, browser con l'editing, Macweb, OS ma tanto X,è ancheUnix da renderloplatforms un editor un web. prezioso La modalità strumento di visualizzazionecollaborativo. è Flock 3 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Flock è un browser con un focus sui social media.
    [Show full text]
  • Name Synopsis Description Arguments Options
    W3M(1) General Commands Manual W3M(1) NAME w3m − a text based web browser and pager SYNOPSIS w3m [OPTION]... [ file | URL ]... DESCRIPTION w3m is a text based browser which can display local or remote web pages as well as other documents. It is able to process HTML tables and frames but it ignores JavaScript and Cascading Style Sheets. w3m can also serveasapager for text files named as arguments or passed on standard input, and as a general purpose directory browser. w3m organizes its content in buffers or tabs, allowing easy navigation between them. With the w3m-img extension installed, w3m can display inline graphics in web pages. And whenever w3m’s HTML rendering capabilities do not meet your needs, the target URL can be handed overtoagraphical browser with a single command. Forhelp with runtime options, press “H” while running w3m. ARGUMENTS When givenone or more command line arguments, w3m will handle targets according to content type. For web, w3m gets this information from HTTP headers; for relative orabsolute file system paths, it relies on filenames. With no argument, w3m expects data from standard input and assumes “text/plain” unless another MIME type is givenbythe user. If provided with no target and no fallback target (see for instance option −v below), w3m will exit with us- age information. OPTIONS Command line options are introduced with a single “−” character and may takeanargument. General options −B with no other target defined, use the bookmark page for startup −M monochrome display −no-mouse deactivate mouse support −num display each line’snumber −N distribute multiple command line arguments to tabs.
    [Show full text]
  • Using Replicated Execution for a More Secure and Reliable Web Browser
    Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run.
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Apple Has Built a Solution Into Every Mac
    Overview Mac OS X iPhone iPod + iTunes Resources Vision Mac OS X solutions VoiceOver from third parties. Browse the wide variety of To make it easier for the blind and those with low-vision to use a accessibility solutions supported computer, Apple has built a solution into every Mac. Called VoiceOver, by Mac OS X. Learn more it’s reliable, simple to learn, and enjoyable to use. In Depth Device Support Application Support Downloads VoiceOver Application Support VoiceOver. A unique solution for the vision-impaired. Every new Mac comes with Mac OS X and VoiceOver installed and includes a variety of accessible More than 50 reasons to use applications. You can also purchase additional Apple and third-party applications to use with VoiceOver. VoiceOver. Learn more While this page lists a few of the most popular applications, many more are available. If you use an application with VoiceOver that’s not on this list, and you would like to have it added, send email to [email protected]. Unlike traditional screen readers, VoiceOver is integrated into the operating system, so you can start using new accessible applications right away. You don’t need to buy an update to VoiceOver, install a new copy, or add the application to a “white list.” Moreover, VoiceOver commands work the same way in every application, so once you learn how to use them, you’ll be able to apply what you know to any accessible application. Apple provides developers with a Cocoa framework that contains common, reusable application components (such as menus, text fields, buttons, and sliders), so developers don’t have to re-create these elements each time they write a new application.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Browser for Mac 10.4.11 Download Mac OS X 10.4.11 Combo Update (PPC) Meet the World’S Most Advanced Operating System
    browser for mac 10.4.11 download Mac OS X 10.4.11 Combo Update (PPC) Meet the world’s most advanced operating system. Again. Instantly find what you’re looking for. Get information in an instant with a single click. Mac OS X Tiger delivers 200+ new features which make it easier than ever to find, access and enjoy everything on your computer. Learn more about Mac OS X. What’s New in this Version. The 10.4.11 Update is recommended for all users running Mac OS X Tiger and includes general operating system fixes that enhance the stability, compatibility and security of your Mac. This update also includes Safari 3, the latest version of Apple's web browser. Mac OS X 10.4.11 Combo Update (PPC) SHA-1 Digest: For explanation of what a SHA-1 digest is, please visit this website: Mac OS X: How to verify a SHA-1 digest. For detailed information on this update, please visit this website: About the Mac OS X 10.4.11 Update. For detailed information on security updates, please visit this website: Apple security updates. The Best Browsers for Older Macs Running Tiger. Last week fellow Low End Mac columnist Simon Royal posted a feature comparing nine Web browsers in the context of use on G3 and older G4 Macs. That’s a space I inhabit. While I no longer have any G3 machines in active service, my wife is still using a 700 MHz iBook G3 running Mac OS X 10.4.11 Tiger, and I have two old Pismo PowerBooks in production and road warrior service, both with 550 MHz G4 processor upgrades and also running 10.4.11.
    [Show full text]
  • MC-1200 Series Linux Software User's Manual
    MC-1200 Series Linux Software User’s Manual Version 1.0, November 2020 www.moxa.com/product © 2020 Moxa Inc. All rights reserved. MC-1200 Series Linux Software User’s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice © 2020 Moxa Inc. All rights reserved. Trademarks The MOXA logo is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Moxa China (Shanghai office) Toll-free: 1-888-669-2872 Toll-free: 800-820-5036 Tel: +1-714-528-6777 Tel: +86-21-5258-9955 Fax: +1-714-528-6778 Fax: +86-21-5258-5505 Moxa Europe Moxa Asia-Pacific Tel: +49-89-3 70 03 99-0 Tel: +886-2-8919-1230 Fax: +49-89-3 70 03 99-99 Fax: +886-2-8919-1231 Moxa India Tel: +91-80-4172-9088 Fax: +91-80-4132-1045 Table of Contents 1.
    [Show full text]
  • Forensic Study and Analysis of Different Artifacts of Web Browsers in Private Browsing Mode
    || Volume 5 || Issue 6 || June 2020 || ISSN (Online) 2456-0774 INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH AND ENGINEERING TRENDS FORENSIC STUDY AND ANALYSIS OF DIFFERENT ARTIFACTS OF WEB BROWSERS IN PRIVATE BROWSING MODE Rinchon Sanghkroo1, Dr. Deepak Raj Rao G.2 and Kumarshankar Raychaudhuri3 M.Sc. (Forensic Science) Final Semester Student, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India 1 Assistant Professor, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India2 Junior Research Fellow, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India3 [email protected], [email protected], [email protected] ------------------------------------------------------ ***-------------------------------------------------- Abstract: - Web browsers today have become one of the most commonly used applications in digital devices, storing and maintaining huge information on user activities. The privacy mode has been introduced to combat the privacy issues related with browsers. This feature keeps the browsing activities of a user private by not storing or removing the traces of artifacts related to the browsing session on the system. In this study, we test the effectiveness of this claim and to ensure ways in which a forensic investigation may be done in such cases. The private modes of different browsers have been tested in Windows and MAC OS by performing pre-defined browsing activities in each of the browsers in both the operating systems. Moreover, the default locations of normal web browser artifacts are also examined to find whether artifacts of private browsing activities are stored in such locations or not. Keywords: - Private Browsing, Windows, MAC, Safari, Microsoft Edge, Brave Browser ------------------------------------------------------ ***-------------------------------------------------- I INTRODUCTON artifacts related to it on the end device.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]