Documentation.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Documentation.Pdf Tranalyzer2 Version 0.8.11, Beta, Tarantula Flow based forensic and network troubleshooting traffic analyzer Tranalyzer Development Team CONTENTS CONTENTS Contents 1 Introduction 1 1.1 Getting Tranalyzer..............................................1 1.2 Dependencies.................................................1 1.3 Compilation..................................................2 1.4 Installation..................................................3 1.5 Getting Started................................................3 1.6 Getting Help..................................................3 2 Tranalyzer2 5 2.1 Supported Link-Layer Header Types.....................................5 2.2 Enabling/Disabling Plugins..........................................5 2.3 Man Page...................................................7 2.4 Invoking Tranalyzer..............................................7 2.5 hashTable.h.................................................. 13 2.6 ioBuffer.h................................................... 13 2.7 loadPlugins.h................................................. 13 2.8 main.h..................................................... 13 2.9 networkHeaders.h............................................... 14 2.10 proto/capwap.h................................................ 15 2.11 proto/ethertype.h............................................... 15 2.12 proto/linktype.h................................................ 15 2.13 proto/lwapp.h................................................. 15 2.14 packetCapture.h................................................ 15 2.15 tranalyzer.h.................................................. 16 2.16 bin2txt.h.................................................... 26 2.17 gz2txt.h.................................................... 26 2.18 outputBuffer.h................................................. 26 2.19 rbTree.h.................................................... 27 2.20 subnetHL.h.................................................. 27 2.21 t2log.h..................................................... 27 2.22 Tranalyzer2 Output.............................................. 27 2.23 Final Report.................................................. 28 2.24 Monitoring Modes During Runtime..................................... 31 2.25 Cancellation of the Sniffing Process..................................... 36 3 arpDecode 37 3.1 Description.................................................. 37 3.2 Dependencies................................................. 37 3.3 Configuration Flags.............................................. 37 3.4 Flow File Output............................................... 37 3.5 Plugin Report Output............................................. 39 3.6 Packet File Output.............................................. 39 b Copyright © 2008–2021 by Tranalyzer Development Team CONTENTS CONTENTS 4 basicFlow 40 4.1 Description.................................................. 40 4.2 Configuration Flags.............................................. 40 4.3 Flow File Output............................................... 41 4.4 Packet File Output.............................................. 50 4.5 Post-Processing................................................ 50 5 basicStats 51 5.1 Description.................................................. 51 5.2 Configuration Flags.............................................. 51 5.3 Flow File Output............................................... 51 5.4 Packet File Output.............................................. 52 5.5 Plugin Report Output............................................. 52 6 bgpDecode 53 6.1 Description.................................................. 53 6.2 Dependencies................................................. 53 6.3 Configuration Flags.............................................. 53 6.4 Flow File Output............................................... 54 6.5 Additional Output............................................... 59 6.6 Plugin Report Output............................................. 60 6.7 Post-Processing................................................ 60 6.8 Anomalies................................................... 64 6.9 Examples................................................... 64 6.10 References................................................... 65 7 binSink 66 7.1 Description.................................................. 66 7.2 Dependencies................................................. 66 7.3 Configuration Flags.............................................. 66 7.4 Post-Processing................................................ 67 7.5 t2b2t...................................................... 67 7.6 Custom File Output.............................................. 67 8 cdpDecode 68 8.1 Description.................................................. 68 8.2 Dependencies................................................. 68 8.3 Configuration Flags.............................................. 68 8.4 Flow File Output............................................... 68 8.5 Packet File Output.............................................. 70 8.6 Plugin Report Output............................................. 70 9 connStat 72 9.1 Description.................................................. 72 9.2 Configuration Flags.............................................. 72 9.3 Flow File Output............................................... 72 9.4 Plugin Report Output............................................. 72 c Copyright © 2008–2021 by Tranalyzer Development Team CONTENTS CONTENTS 10 descriptiveStats 73 10.1 Description.................................................. 73 10.2 Dependencies................................................. 73 10.3 Configuration Flags.............................................. 73 10.4 Flow File Output............................................... 73 10.5 Known Bugs and Limitations......................................... 74 11 dhcpDecode 75 11.1 Description.................................................. 75 11.2 Configuration Flags.............................................. 75 11.3 Flow File Output............................................... 75 11.4 Packet File Output.............................................. 84 11.5 Plugin Report Output............................................. 85 11.6 TODO..................................................... 85 11.7 References................................................... 85 12 dnsDecode 86 12.1 Description.................................................. 86 12.2 Configuration Flags.............................................. 86 12.3 Flow File Output............................................... 86 12.4 Packet File Output.............................................. 93 12.5 Plugin Report Output............................................. 93 12.6 Example Output................................................ 94 12.7 TODO..................................................... 94 13 entropy 95 13.1 Description.................................................. 95 13.2 Configuration Flags.............................................. 95 13.3 Flow File Output............................................... 95 13.4 Plugin Report Output............................................. 95 14 findexer 96 14.1 Description.................................................. 96 14.2 Configuration Flags.............................................. 96 14.3 fextractor................................................... 96 14.4 Example scenario............................................... 97 14.5 Additional Output (findexer v2)....................................... 97 14.6 Limitations.................................................. 98 14.7 Old format (findexer v1)........................................... 98 15 fnameLabel 100 15.1 Description.................................................. 100 15.2 Configuration Flags.............................................. 100 15.3 Flow File Output............................................... 100 15.4 Packet File Output.............................................. 100 d Copyright © 2008–2021 by Tranalyzer Development Team CONTENTS CONTENTS 16 ftpDecode 101 16.1 Description.................................................. 101 16.2 Configuration Flags.............................................. 101 16.3 Flow File Output............................................... 101 16.4 Packet File Output.............................................. 104 16.5 Plugin Report Output............................................. 104 17 geoip 105 17.1 Description.................................................. 105 17.2 Dependencies................................................. 105 17.3 Configuration Flags.............................................. 105 17.4 Flow File Output............................................... 107 17.5 Post-Processing................................................ 109 18 gtpDecode 110 18.1 Description.................................................. 110 18.2 Flow File Output............................................... 110 18.3 Packet File Output.............................................. 110 18.4 Plugin Report Output............................................. 110 19 httpSniffer 111 19.1 Description.................................................. 111 19.2 Configuration Flags.............................................. 111 19.3 Flow File Output............................................... 113 19.4 Plugin Report Output............................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • List of Notable Handheld Game Consoles (Source
    List of notable handheld game consoles (source: http://en.wikipedia.org/wiki/Handheld_game_console#List_of_notable_handheld_game_consoles) * Milton Bradley Microvision (1979) * Epoch Game Pocket Computer - (1984) - Japanese only; not a success * Nintendo Game Boy (1989) - First internationally successful handheld game console * Atari Lynx (1989) - First backlit/color screen, first hardware capable of accelerated 3d drawing * NEC TurboExpress (1990, Japan; 1991, North America) - Played huCard (TurboGrafx-16/PC Engine) games, first console/handheld intercompatibility * Sega Game Gear (1991) - Architecturally similar to Sega Master System, notable accessory firsts include a TV tuner * Watara Supervision (1992) - first handheld with TV-OUT support; although the Super Game Boy was only a compatibility layer for the preceding game boy. * Sega Mega Jet (1992) - no screen, made for Japan Air Lines (first handheld without a screen) * Mega Duck/Cougar Boy (1993) - 4 level grayscale 2,7" LCD - Stereo sound - rare, sold in Europe and Brazil * Nintendo Virtual Boy (1994) - Monochromatic (red only) 3D goggle set, only semi-portable; first 3D portable * Sega Nomad (1995) - Played normal Sega Genesis cartridges, albeit at lower resolution * Neo Geo Pocket (1996) - Unrelated to Neo Geo consoles or arcade systems save for name * Game Boy Pocket (1996) - Slimmer redesign of Game Boy * Game Boy Pocket Light (1997) - Japanese only backlit version of the Game Boy Pocket * Tiger game.com (1997) - First touch screen, first Internet support (with use of sold-separately
    [Show full text]
  • Juegos En Plataformas Móviles
    Juegos en Plataformas M´oviles por Daniel Ricardo Rodr´ıguez Cuberos Asesor: Pablo Figueroa, PhD Propuesta de Trabajo de Tesis presentada al Departamento de Ingenier´ıade Sistemas y Computaci´on Para optar al t´ıtulode Ingeniero de Sistemas y Computaci´on Ingenier´ıade Sistemas y Computaci´on Universidad de Los Andes Junio 2006 0000 P´agina del Lector La Universidad de los Andes requiere la firma de todas las personas que utilicen o fotocopien esta tesis. Favor firmar dejando abajo Nombre y Direccion ii 0000 Declaro que soy el unico autor de la presente tesis. Autorizo a la Universidad de los Andes para que esta tesis sea prestada a otras instituciones o personas para prop´ositos de investigaci´onsolamente. Firma Tambi´enautorizo a la Universidad de los Andes para que este documento sea fotocopiado en su totalidad o en parte por otras instituciones o personas con fines de investigaci´osolamente. Firma iii 0000 Carta de Presentaci´on Bogot´a, Doctora, OLGA LUCIA GIRALDO Director Departamento de Ingenier´ıade Sistemas y Computaci´on Universidad de los Andes Estimada doctora Giraldo Por medio de la presente me permito poner en consideraci´on el proyecto de grado titulado : Juegos en Plataformas M´oviles como requisito parcial de grado del programa de Ingenier´ıade Sistemas y Computaci´on. Agradezco su amable atenci´on y me suscribo de Ud. Atentamente, Daniel Ricardo Rodr´ıguezCuberos i Juegos en Plataformas M´oviles Aprobado por: Pablo Figueroa, PhD, Asesor Fecha de Aprobaci´on 0000 ´Indice I. Juegos en Plataformas M´oviles 3 1.1. Justificaci´on . 3 1.2.
    [Show full text]
  • BIS Volume 21 Numero 1
    Boletim do Instituto de Saúde Volume 21 – n.0 1 – Julho 2020 ISSN 1518-1812 / On-line: 1809-7529 1 | Julho 2020 1 | Julho o Boletim do Instituto de Saúde | BIS | Volume 21 | n. Volume | BIS de Saúde Boletim do Instituto Valentina Massens, influenciadora digital. Comunicação em Saúde na Era Digital Instituto de Saúde Boletim do Instituto de Saúde – BIS Rua Santo Antônio, 590 – Bela Vista Volume 21 – n.0 1 – Julho 2020 São Paulo-SP – CEP 01314-000 ISSN 1518-1812 / On-line: 1809-7529 Tel: (11) 3116-8500 / Fax: (11) 3105-2772 Publicação semestral do Instituto de Saúde www.isaude.sp.gov.br [email protected] Tiragem: 2000 exemplares Rua Santo Antônio, 590 – Bela Vista Secretaria de Estado da Saúde de São Paulo São Paulo-SP – CEP 01314-000 Secretário de Estado da Saúde de São Paulo Tel: (11) 3116-8500 / Fax: (11) 3105-2772 Dr. José Henrique Germann Ferreira [email protected] Instituto de Saúde Diretora do Instituto de Saúde Instituto de Saúde – www.isaude.sp.gov.br Luiza Sterman Heimann Portal de Revistas da SES-SP – http://periodicos.ses.sp.bvs.br Vice-diretora do Instituto de Saúde Editor Sônia I. Venâncio Márcio Derbli Diretora do Centro de Pesquisa e Desenvolvimento para o SUS-SP Editores científicos Tereza Etsuko da Costa Rosa Maria Thereza Bonilha Dubugras (Instituto de Saúde); Peter Rembischevski (Agência Nacional de Vigilância Sanitária); Vidal Augusto Zapparoli Diretora do Centro de Tecnologias de Saúde para o SUS-SP Castro Melo (Escola Politécnica da Universidade de São Paulo); Rogerio Tereza Setsuko Toma Venturineli
    [Show full text]
  • Cultural Governance in Contemporary China: Popular Culture, Digital Technology, and the State
    ! ! ! ! CULTURAL GOVERNANCE IN CONTEMPORARY CHINA: POPULAR CULTURE, DIGITAL TECHNOLOGY, AND THE STATE BY LUZHOU LI DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Communications and Media in the Graduate College of the University of Illinois at Urbana-Champaign, 2015 Urbana, Illinois Doctoral Committee: Professor Emeritus John Nerone, Chair Assistant Professor Amanda Ciafone Professor Emeritus Dan Schiller Professor Kent Ono, University of Utah ii ABSTRACT This dissertation is a study of the historical formation and transformation of the Chinese online audiovisual industry under forces of strategic political calculations, expanding market relations, and growing social participation, and the cultural ramifications of this process, especially the kind of transformations digital technologies have wrought on the state-TV-station-centered mode of cultural production/distribution and regulatory apparatuses. Through this case, the project aims to theorize the changing mode of cultural governance of post-socialist regimes in the context of digital capitalism. Using mixed methods of documentary research, interviews with industry practitioners, participant observations of trade fairs/festivals, and critical discourse analyses of popular cultural texts, the study finds that the traditional broadcasting and the online video sectors are structured along two different political economic mechanisms. While the former is dominated by domestic capital and heavily regulated by state agencies, the latter is supported by transnational capital and less regulated. Digital technologies coupled with transnational capital thus generate new cultural flows, processes, and practices, which produces a heterogeneous and contested cultural sphere in the digital environment that substantially differs from the one created by traditional television.
    [Show full text]
  • 4.4 IT Infrastructure 4.4.1 Does the Institution Have a Comprehensive IT
    4.4 IT Infrastructure 4.4.1 Does the Institution have a comprehensive IT Policy with regard to: 1. IT Service Management ITS Centre for Dental Studies & Research is focused towards the applications of new technologies for easing up the day-to-day jobs and functions performed within and outside the campus. To achieve the same we at ITS CDSR are running many application to facilitate the routine works including the OPD & IPD, Resource management through ERP, and effective complaint handling and resolutions using Cloud Hosted Complaint Management System. Seamless 24*7 availability of Internet plays a vital role for effective use of the mentioned applications. A core IT staff team provides immediate resolutions to the user complaints and maintain the application uptime. 2. Information Security • Server Level Security: Quick Heal End Point Security Server Edition is installed on all the Servers to protect the Information from all Threats. • Client Level Security: All the desktop machines are installed with Quick Heal End Point Security to protect the client side Information from various Threats. • Network Level Security: The Campus Network is protected using UTM Device which protects the entire network from breaches and intrusion attacks from Internet. • Backups: o Server Side: Daily backups of all the Servers a taken by the Server Staff on External Hard Drives. o Client Side: Daily backups are taken by the staff members of their data on External Hard Drives. 3. Network Security • Installation of Unified Threat Management (UTM) Device: The campus wide network is protected from the Threats which propagate from Internet using the UTM device which offers following facilities: o Firewall o Gateway Level Anti-Virus o Gateway Level Anti-Spyware o Gateway Level Anti-Malware o Intrusion Detection/Prevention System o SSL and IPSec VPN’s Note: Please find detailed UTM Policy implementation for Authentication, Web & Application Filtration, Quota Management, QoS, and Data Transfer Limits in ANNEXURE I.
    [Show full text]
  • Año De La Salud Y Del Personal Sanitario Anexo Número: Referencia
    G O B I E R N O DE LA P R O V I N C I A DE B U E N O S A I R E S 2021 - Año de la Salud y del Personal Sanitario Anexo Número: Referencia: EX-2020-26076623-GDEBA-DDPRYMGEMSGP Anexo VI VI. SUPERINTENDENCIA DE INVESTIGACIONES DEL TRÁFICO DE DROGAS ILÍCITAS Y CRIMEN ORGANIZADO. VI.1) Curso Básico en tareas Operativas para la Lucha y Neutralización del Narcotráfico. 1. Nombre de la Capacitación: Curso Básico en tareas Operativas para la Lucha y Neutralización del Narcotráfico. Superintendencia o área responsable: Dirección de Prevención – Div. Capacitación. Superintendencia de Investigaciones del Tráfico de Drogas Ilícitas y Crimen Organizado, Ministerio de Seguridad de la Provincia de Buenos Aires. Modalidad: Semipresencial. Sin afectación del servicio. Carga Horaria: La propuesta demandará 32 horas reloj equivalente a 48 horas cátedras, las que se distribuirán en 4 encuentros presenciales de 8 horas reloj cada uno de: 9.00 a 17.00 hs. con un espacio de refrigerio. Duración: Se prevé llevar a cabo el presente entre los meses de marzo y abril del 2021. La presente capacitación tendrá una duración de 4 encuentros. Los cuáles serán distribuidos en una asistencia por semana. Coordinadores de la Capacitación: Comisario Inspector (Cdo) Benítez Edgar. Capitán (E.G.) Viviana Rivero. Teniente (E.G.) Fernández Marina. Tel (0221) 4231867/68 Int. 122. Mail de referencia: [email protected]; [email protected] 2. Nombre del Proyecto de Capacitación y Área Responsable del Proyecto: Curso Básico en tareas Operativas para la Lucha y Neutralización del Narcotráfico. Área Responsable del Proyecto: Dirección de Prevención – Div.
    [Show full text]
  • The Current State of Anonymous Filesharing
    The current state of anonymous file-sharing Bachelor Thesis Marc Seeger Studiengang Medieninformatik Hochschule der Medien Stuttgart July 24, 2008 I Abstract This thesis will discuss the current situation of anonymous file-sharing. An overview of the currently most popular file-sharing protocols and their properties concerning anonymity and scalability will be discussed. The new generation of "designed-for-anonymity" protocols, the patterns behind them and their current implementations will be covered as well as the usual attacks on anonymity in computer networks. II Declaration of originality I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Marc Seeger Stuttgart, July 24, 2008 III Contents 1 Different needs for anonymity 1 2 Basic concept of anonymity in file-sharing 2 2.1 What is there to know about me? . 2 2.2 The wrong place at the wrong time . 2 2.3 Motivation: Freedom of speech / Freedom of the press . 3 3 Technical Networking Background 3 3.1 Namespaces . 3 3.2 Routing . 4 3.3 Identification throughout the OSI layers . 5 4 Current popular file-sharing-protocols 7 4.1 A small history of file-sharing . 7 4.1.1 The beginning: Server Based . 7 4.1.2 The evolution: Centralized Peer-to-Peer . 8 4.1.3 The current state: Decentralized Peer-to-Peer . 8 4.1.4 The new kid on the block: Structured Peer-to-Peer networks .
    [Show full text]
  • FN1206: the Path to Operational Enlightenment
    Use this if there will be two speakers for your session. FN1206: © 2019 SPLUNK INC. The Path to Operational Enlightenment An Introduction to Wire Data Simon O’Brien Vinu Alazath Principal Sales Engineer | Splunk Software Engineer | Splunk © 2019 SPLUNK INC. During the course of this presentation, we may make forward‐looking statements Forward- regarding future events or plans of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us Looking and that actual events or results may differ materially. The forward-looking statements made in the this presentation are being made as of the time and date of its live Statements presentation. If reviewed after its live presentation, it may not contain current or accurate information. We do not assume any obligation to update any forward‐looking statements made herein. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only, and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionalities described or to include any such feature or functionality in a future release. Splunk, Splunk>, Turn Data Into Doing, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2019 Splunk Inc. All rights reserved. © 2019 SPLUNK INC. Agenda ​Challenges ​Product Overview ​Architecture and Deployment ​Demo ​Stream futures © 2019 SPLUNK INC.
    [Show full text]
  • Netbravo Mobile Raw Data Format
    netBravo netBravo Mobile Raw Data Format By CLEMENT Francis, FOLLONI Gianluca, LUZARDI Stefano, MANDA Costin Version 3.0.1 Date: 16 February 2016 netBravo Mobile Raw Data Format Within the “netBravo” mobile application the owner can save to an external file the measurements made by the device. The Android and iOS application can extract the “Broadband measurements” file. In addition, only the Android application can extract the “Cellular measurements” and the “Wi-Fi measurements” files. All file are CSV comma separated file with the first row containing the column name and this document explain the format and the meaning of each field. Text identifier is the character ‘”’. Android devices save the files on external storage directory under the subdirectory. /netbravo. The external storage directory name depends on the device brand, but usually is the directory shared when connected to the host computer. (Example: ‘/storage/sdcard0/netbravo). Android application show the extracted file names on the user interface. iOS devices save the CSV file into ‘Application Document’ directory, that is manageable only via iTunes. The file can be also shared directly inside the netBravo application using AirDrop or the tools available in the standard sharing panel. Broadband measurements file This file contains data from the “Broadband history” with detail about: - Date, time and duration of tests - Location in which the test was made - Network related information (IP network information, network type, etc.) - Mobile cell or Wi-Fi cell information The extracted file name is in the form: netbravo_broadband_yyyyMMddhhMMss.csv Next table show the file format. The application extract all the listed fields.
    [Show full text]
  • A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
    Article A Review of Cyber-Ranges and Test-Beds: Current and Future Trends Elochukwu Ukwandu 7 , Mohamed Amine Ben Farah 1 , Hanan Hindy 4 , David Brosset 2 , Dimitris Kavallieros 5,6 , Robert Atkinson 1 , Christos Tachtatzis 1 , Miroslav Bures 3 , Ivan Andonovic 1 , and Xavier Bellekens 1 1 Dept. of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, United Kingdom; mohamed.ben-farah,robert.atkinson,christos.tachtatzis,ivan.andonovic,[email protected] 2 Naval Academy Research Institute, Arts et Métiers Institute of Technology, France; [email protected] 3 Department of Computer Science, FEE, Czech Technical University in Prague; [email protected] 4 Department of Cyber-Security, Abertay University, United Kingdom ; [email protected] 5 The Center for Security Studies (KEMEA); 6 University of Peloponnese, Department of Informatics and Telecommunications; 7 Dept. of Computer Science, Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, Wales, United Kingdom; [email protected] * Correspondence: [email protected] Received: date; Accepted: date; Published: date Abstract: Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management. The rapid proliferation in the automation of cyber-attacks is reducing the gap between information and operational technologies and the need to review the current levels of robustness against new sophisticated cyber-attacks, trends, technologies and mitigation countermeasures has become pressing.
    [Show full text]
  • Quick Take Changing Ecom Landscap
    C quick take The Changing face of global e-com: The rise of gloChina balSept.21.2014 September 21, 2014 Quick Take: The Changing Face of Global E-Commerce — The Rise of China "Amazon and eBay are e-commerce companies, and Alibaba is not an e- commerce company. Alibaba helps others to do e-commerce. We do not sell things." Alibaba co-founder – Jack Ma Introduction Starting September 19, Chinese e-commerce giant Alibaba is listed under the symbol BABA on the NYSE. A day before that, Alibaba priced its IPO at $68 a share, the top end of the expected range, raising a record-breaking $21.8 billion. The company closed the first day of trading at $93.89 a share, up 38% from its IPO price. With a market cap of 231 billion (as of the close of September 19), Alibaba overtakes Amazon.com and Facebook and trails only Google, Apple, and Microsoft in size among technology companies listed in the U.S.. Alibaba is now a familiar name to the Americans, and the company will use the IPO proceeds to expand in the U.S., notably with the launch of local e-commerce platform 11 Main. It has also acquired stakes in companies including Uber, Lyft and search engine app Quixey. During the IPO roadshow, Alibaba’s co-founder and Executive Chairman Jack Ma has reiterated the company’s intent to internationalize aggressively after the listing. Investors are no strangers to the best of the Chinese Internet companies, as many of them are listed in the U.S.
    [Show full text]