Hito-Shura Milestone 4 presentation Harlan Broughton Stephen Link.

Slides:



Advertisements
Similar presentations
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Advertisements

By the end of this section, you will know and understand the hardware and software involved in making a LAN!
 RAID stands for Redundant Array of Independent Disks  A system of arranging multiple disks for redundancy (or performance)  Term first coined in 1987.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Prime Why use it?. Dynamic Customizable Since Prime is a tools, you can customized it according to your SOP Since Prime is a tools, you can customized.
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Copyright © Mountain Home Training & Consulting, Inc. i MHTC VirtualOFFICE 3.0.
Remote Access Network Management Kelly Given Allison Traina.
Front and Back End: Webpage and Database Management Prepared by Nailya Galimzyanova and Brian J Kapala Supervisor: Prof. Adriano Cavalcanti, PhD College.
Milestone 5 presentation Harlan Broughton Stephen Link.
Remote Unit Testing Brian Pruitt-Goddard Alex Riordan.
CSE 4939 Hito-Shura Project Manager Harlan Broughton Stephen Link.
Hito-Shura Milestone 2 presentation Harlan Broughton Stephen Link.
Uconn Marching Band Information Management System Status Report Harlan Broughton Stephen Link March 2, 2010.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Part or all of this lesson was adapted from the University of Washington’s “Web Design & Development I” Course materials.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Mr C Johnston ICT Teacher
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Smart Printing Solutions LTD. The system is an innovative product, designed for organizations who need better control over their printing array. The system.
Stephen Slawter. What is WHS 1 ?  Digital memories and media stored and organized in a central location  Home computers backed up daily, automatically.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
.Net and Web Services Security CS795. Web Services A web application Does not have a user interface (as a traditional web application); instead, it exposes.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Options OReS Online Registration System. System Features Event Registration: User profile management Custom defined registration fields Transportation.
Two Rivers Chapter Website Navigating through …. Visit
Introducing HingX now with Capacity Development Network.
Using the Supplier Portal Updated September 12, 2011 Using the Supplier Portal.
Edmodo Made Easy By: Susan O’Day.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Mrs. Knopp Library Media Specialist.  The term wiki comes from the phrase Wiki- Wiki which is the Hawaiian word for quick.  A wiki is a website that.
Software. A web site is a collection of web pages on a particular topic. A web page is a document written in HTML code. Web pages are linked together.
GOAL User Interactive Web Interface Update Pages by Club Officers Two Level of Authentication.
A Day of technology Improving upon your technology skills Giving every child the opportunity to learn in a robust digital environment everyday. making.
Web Application for Mobile access to students exam Information.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Customer Hub Protect Your Content. What We’ll Be Talking About Customer Hub is a powerful content management system that is fully integrated with Infusionsoft.
Implementing and Using the SIRWEB Interface Setup of the CGI script and web procfile Connecting to your database using HTML Retrieving data using the CGI.
Leading firms through the next generation of change™
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
ASSIGNMENT 2 Salim Malakouti. Ticketing Website  User submits tickets  Admins answer tickets or take appropriate actions.
CSU Extension Webpage Template Session 4 February 2010.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
PhotoBytes Burt Bielicki. Overview What is PhotoBytes? Who Will Use PhotoBytes? System Requirements System and Software Architecture Lifecycle Plan Feasibility.
Understanding Web-Based Digital Media Production Methods, Software, and Hardware Objective
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
COOKIES AND SESSIONS.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
1 Example security systems n Kerberos n Secure shell.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
WEB TESTING
SFS-HTTP: Securing the Web with Self-Certifying URLs
PowerPoint presentation
INTERCEPTION APPLICATION
Web Development Web Servers.
Technology Vocabulary Words
Uses Of Encryption Algorithms
Topic 5: Communication and the Internet
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Cookies and sessions Saturday, February 23, 2019Saturday, February 23,
Unit 8 Network Security.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Presentation transcript:

Hito-Shura Milestone 4 presentation Harlan Broughton Stephen Link

What is it? Web based management system created by Gregory Newell, Karl Schwirz, and Boleslaw Pawlowicz who are 2009 Uconn Alumni. It will actually be used by the marching band to help keep synchrony among members.

Time Line Setting up an Apache server which can be accessed through most internet browsers. ◦ Done, but our vm(virtual machine) crashed. ◦ Rebuilding and recreating database set us back a little bit.

Time Line Encryption of private data ◦ This includes passwords and s being sent to or from the server ◦ Have ideas coded out, but we are balancing speed versus security.  Simple XOR key(s) approach  EFS style key approach  Encrypting file system  System creates a random key and xors it against your data, then gives you a public key and encrypts the random key with your public key, then stores in into the file.

Time Line Timeout feature ◦ Goes along with the encryption security idea ◦ If the user is logged in and idle for a specific amount of time, they are automatically logged out. ◦ Since users may be typing and navigating in ways which don’t require message sending to the server, this will be handled on the user side. ◦ Currently on track for a 4/9 complete security competition

Time Line Media section ◦ Currently not hosting or playing the media correctly ◦ Get it working properly and add features  Video poster comments  User comments  Allow certain media to be downloaded

Time Line Integrate File maker to make the database easier to manipulate. ◦ Requires reworking of many innerworkings ◦ This will make everything look more professional and neat.

Time Line Polishing ◦ Remade help section to help navigate ◦ Custom colors ◦ More intuitive interface

Questions?