Website protection Convert page source to a human- unreadable code.

Slides:



Advertisements
Similar presentations
1 Cryptosystems When defining a cryptosystem, details must be given of: The alphabets M and C the keyspace K and how keys are to be chosen The encryption.
Advertisements

Introduction to JavaScript
A-Level Computing#BristolMet Session Objectives#8 express numbers in binary, octal and hexadecimal explain the use of code to represent a character set.
MSc. Publishing on WWW JavaScript. What is JavaScript? A scripting language devised by Netscape Adds functionality to web pages by: Embedding code into.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Tutorial 10 Programming with JavaScript
Tutorial 14 Working with Forms and Regular Expressions.
PHP Form Processing. Using Forms in PHP  Two steps to process  Display the form  Process the submitted data.
CS 177 Programming with Multimedia Objects Recitation.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
© BYU 02 NUMBERS Page 1 ECEn 224 Binary Number Systems and Codes.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
COMT 222 Tools for a Digital World. Digital? What makes information Digital? If it helps:  When is information not analog? Answer:  A finite number.
WEB DESIGN AND PROGRAMMING Introduction to Javascript.
Regular Expressions Week 07 TCNJ Web 2 Jean Chu. Regular Expressions Regular Expressions are a powerful way to validate and format text strings that may.
Tutorial 14 Working with Forms and Regular Expressions.
Representing text Each of different symbol on the text (alphabet letter) is assigned a unique bit patterns the text is then representing as.
Chapter 6 Text and Multimedia Languages and Properties
Writing Web Pages By Shyam Gurram. Agenda Writing Web Pages Delimiting PHP Program Units. Displaying Output to Web Pages Putting Comments in PHP Programs.
Images in HTML PowerPoint How images are used in HTML.
Integrating JavaScript and HTML5 HTML5 & CSS 7 th Edition.
EX_01.1/46 Numeric Systems. EX_01.2/46 Overview Numeric systems – general, Binary numbers, Octal numbers, Hexadecimal system, Data units, ASCII code,
2. 2 Presentation layer 2. 3 The presentation layer is responsible for translation, compression, and encryption.
Representing Data. Representing data u The basic unit of memory is the bit  A transistor that can hold either high or low voltage  Conceptually, a tiny.
Creating Webpage Using HTML
Tutorial 10 Programming with JavaScript. XP Objectives Learn the history of JavaScript Create a script element Understand basic JavaScript syntax Write.
Tutorial 10 Programming with JavaScript
Regular Expression (continue) and Cookies. Quick Review What letter values would be included for the following variable, which will be used for validation.
Variables and Math in Code. Variables A variable is a storage block for information in your program “A” “A” Computer Program Memory Computer Program.
Working with Forms and Regular Expressions Validating a Web Form with JavaScript.
Web Page Design Introduction. The ________________ is a large collection of pages stored on computers, or ______________ around the world. Hypertext ________.
HTML and JS Escaping HowTo. What is escaping ? Escaping is a way to differentiate between characters used as part of syntax of a language and data. Eg:
The Teacher Computing HTML HyperText Markup Language.
CSC318 – DYNAMIC WEB APPLICATION DEVELOPMENT BY: SITI NURBAYA ISMAIL FACULTY of COMPUTER and MATHEMATICAL SCIENCES.
Chap 14 Presentation Layer Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
CAP Cryptographic Analysis Program General Help Presentation Press Enter or click on your mouse button to continue.
Starting to Use the Internet for Work Search strings: Boolean + Key terms e.g Hysterectomy AND subtotal Hysterectomy + subtotal = key terms AND = Boolean.
HTML JAVASCRIPT. CONTENTS Javascript Example NOSCRIPT Tag Advantages Summary Exercise.
Session and Presentation Layers Honolulu Community College Cisco Academy Training Center Semester 1 Version
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
1 Server versus Client-Side Programming Server-SideClient-Side.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Data Representation. What is data? Data is information that has been translated into a form that is more convenient to process As information take different.
8421 Binary Hexadecimal Seven segment display 8421 Binary Hexadecimal Seven segment display 0000.
Cryptography.
Tutorial 10 Programming with JavaScript. 2New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition Objectives Learn the history of JavaScript.
Algorithms. Algorithm (1) Read 8-digit integers from a file to an array Verify which of these numbers are real dates, which are not Don’t forget leap.
Computer Security coursework 3 Dr Alexei Vernitski.
CompSci 314 S2 C Modern Data Communications Revision of lectures #2 to #11 Clark Thomborson 12 August 2010.
Tutorial 10 Programming with JavaScript. 2New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition Objectives Learn the history of JavaScript.
Layer 6 Presentation Layer. Overview Now that you have learned about Layer 5 of the OSI model, it is time to look at Layer 6, the presentation layer.
HTML HTML stands for Hyper Text Markup Language. HTML is used in making the base of a Website You can just use an online website maker like weebly.com.
Comp 335 – File Structures Hexadecimal Dumps Interpreting File Contents.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
Maninda Edirisooriya. Introduction Extension for Google Chrome. Privacy protection system for online chat. Encrypts chat text using 128 bit AES. Decrypts.
Regular Expressions In Javascript cosc What Do They Do? Does pattern matching on text We use the term “string” to indicate the text that the regular.
Hello Educational presentation.
Process of Converting “PSD to HTML”
Scope, Objects, Strings, Numbers
4.2 Number Bases in Positional Systems
Website URL
CSS Colors, JavaScript Variables, Conditionals and Basic Methods
Final Exam.
HELLO THERE. THIS IS A TEST SLIDE SLIDE NUMBER 1.
Simple Encryption- Lesson 5
Learning Intention I will learn how computers store text.
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
If the person is married and has more than 5 dependents MOVE MSG-1 TO MSG-PR, if the person is married and does not have more than 5 dependents MOVE MSG-2.
Homework #2 J. H. Wang Oct. 18, 2018.
Murach's JavaScript and jQuery (3rd Ed.)
Presentation transcript:

Website protection Convert page source to a human- unreadable code

Different approaches Using HTML Using Javascript – Using hexadecimal values – Using “escape/unescape” – Using an algorithm

Using HTML only In HTML, all symbols can be expressed using ASCII. E.g. – ‘a’ = a

Using Javascript Using hexadecimal values Using “escape/unescape” Using an algorithm

1. Converting text into hexadec. Convert into hexadecimal. ‘Hello World!’= ‘%48%65%6c%6c%6f%20%57%6f%72%6c%64% 21’

1. Display text in hexadec. Display the hexadecimal values using unescape

2. Using escape/unescape Convert text into url friendly string using escape Result: Hello World = Hello%20World%21 Convert it back using unescape

3. Using an algorithm In this algorithm we are using XOR cipher. 5 xor 6 = 3 5 xor 3 = 6 3 xor 6 = 5 Given two numbers, we will always get third.

3. Using an algorithm To either encrypt or decrypt, use the same method

3. Using an algorithm

See this code in action: –

Thank you This presentation is based on an article written by Artem Los. See the article –