Thứ Năm, 4 tháng 5, 2017

Waching daily May 4 2017

Warning.

If the topic of psychological manipulation and emotional enslavement of women offends

you, I want you to stop watching this video.

And if you want to continue, you must agree never to use this knowledge to hurt women.

Deal?

Great.

Let's start!

So, you have the phone number of a girl you'd like to attract.

You went to a tonne of effort to get her to exchange numbers with you.

What should you do next then?

You might be staring at an empty text screen, not having any idea what to say to her.

You might be worried you're going to undo your hard work, or that she'll tell you she's

not interested.

These are both completely normal fears, and ones I've experienced many times.

However, what if I told you there's a Mind Control technique which will make her fall

head over heels for you?

With just a few simple lines, you can get her to the point that she'l become emotionally

addicted to you?

And the good news?

Yes, it works via text message too.

Before I share with you how to use Mind Control over text, do me a favour.

Click on the LIKE button below because, well, you're liking what you see so far, and you'd

like to see more of these videos in the future.

Go do that.

I can wait!

Alright, let me first tell you a story.

My life totally changed a few years ago when I discovered a book entitled the Shogun Method

written by a man named Derek Rake.

In the Shogun Method, I learned of a little trick which has sky-rocketed my success rate

with women to incredible levels.

What we're going to do is use a technique I learnt in the Shogun Method which allows

us access to a woman's subconscious.

First, let me tell you about a certain vulnerability inside a woman's mind.

You see, a woman may or may not believe what you say to her.

However, she will never, ever doubt the conclusions that she arrives to on her own.

This means that if we can bypass a woman's rational thought-process and appeal directly

to her subconscious, she will believe the information we're feeding her to be her own

thoughts.

Therefore, to seduce a woman, you'll need to "guide" her to come to the conclusions

that benefit you.

To do this, you'll use a Mind Control technique called Implanted Commands.

So what's an Implanted Command then?

Very simply, an Implanted Command is a phrase which forms the part of a sentence, which,

if spoken on its own, would be a direct command.

For example, try sending her this text:

"Sure, I can tell you that that by replying to this text and agreeing to meet me for dinner

will change your life for the better, but I' rather you experience it for yourself."

Or:

"You'll never know if by simply replying to this text, you'll be telling your grandkids

about our first date one day."

The phrases which surround the Implanted Command in each sentence will hide the command so

that it goes undetected by her conscious mind.

So, in the examples above, the subconscious messages are "agree to meet me for dinner"

and "telling your grandkids about our first date."

These messages are accepted by her mind without questioning because as Derek Rake says: "what

a woman can't detect, she can't resist".

See why these works like gangbusters?

Excellent!

Implanted Commands are ideal for texting to women because the manipulator doesn't need

to worry about delivery or body language.

They can simply be delivered word for word!

And guess what, these are only 2 of the 44 Implanted Commands found inside the Shogun

Method.

These can be copied directly or adapted to whatever your needs might be.

What works even better is a combination of another Mind Control technique called Fractionation

with Implanted Commands which will pretty much guarantee that she will fall in love

with you in a snap.

If you're familiar with Fractionation, you should already know how powerful it is on

its own.

When used correctly, Fractionation can get a woman under your control, enslave her and

make her fall in love with you far quicker than the usual "Pickup Artist" tricks.

I have to warn you though that it is not possible to "undo" the effects of Fractionation.

Once you have enslaved a woman using this technique, dumping her will cause irreparable

damage to her psychology.

Therefore, please use this technique responsibly and ethically.

To learn how you can use Shogun Method and Fractionation to manipulate a woman's mind

and enslave her to you emotionally, go to FractionationHypnosis.com or click on this

link right now.

For more infomation >> How To Text Her (With Deadly ♠ MIND CONTROL ♠ Lines) - Duration: 5:17.

-------------------------------------------

How To 🌟 Dominate 🌟 A Woman (By Messing With Her Mind) - Duration: 5:26.

Warning.

If the topic of psychological manipulation and emotional enslavement of women offends

you, I want you to stop watching this video.

And if you want to continue, you must agree never to use this knowledge to hurt women.

Deal?

Great.

Let's start!

You've probably heard people say that it's the guy's job to chase a woman, and it's

her job to just sit back and enjoy the perks of being chased, and to decide to accept the

guy or not.

We see this situation all the time in movies, TV and even in "Pickup Artist" advice

books.

Well, I've got this to say: fuck that shit.

I've had incredible success with a technique which not only disproves this point entirely,

but forces a woman's mind into such a state that she can't help but become addicted

to you.. so that she chases you instead!

Before I tell you how I came to discover this awesome technique, please click LIKE because

it will encourage me to create more of these free videos for you.

Do it because you're a cool dude.

Alright?

Done clicking LIKE?

Great!

Here we go!

Even though I devoured all of the trashy "Pickup Artist" literature I could find, I noticed

my success rate with women had gone from moderately good to complete shit.

I realised that none of the advice handed to me was backed by any kind of authority.

That was when I discovered a mysterious manuscript entitled the Shogun Method by a man named

Derek Rake.

The Shogun Method basically implored me to do the opposite of what I had been doing for

so long.

I decided to give it a try.

The results changed my life forever.

Seriously, I'm not exaggerating.

They changed the way I acted around women, the way I talked to them, and my success rate

sky-rocketed!

What's the secret?

I used a little-known technique known as ENTICE / REPEL.

Think about this; don't we all crave exactly what we can't have?

It's the "forbidden fruit" phenomena.

When we're told that we can't have something, it makes us want it even more.

So why wouldn't this be true in the dating world?

After thinking about it, I realised how obvious it was, and not only is it obvious, but it's

also a principle of dark psychology which Derek Rake has adapted into a seduction technique.

It exploits a flaw in the female psyche which states that women have a natural tendency

to chase whatever is running away from them.

After creating enough attraction with a woman, you simply need to REPEL her in order to create

"space" for her to chase you.

This will deepen her attraction to you, intensifying her emotional connection to you.

Derek Rake explains the multiple ways to ENTICE and REPEL in detail inside Module 7 of the

Shogun Method, but I will share one REPEL strategy here:

To repel a woman, you must use DEVALIDATION.

For example, this is a Mixed Signal DEVALIDATION verbal script:

"Wow, I'm impressed.

So far, I mean.

In the next five minutes you may say something silly and completely ruin it."

The negative part of the sentence will act as a comforting technique as she believes

that you have stopped trying to get her into bed.

She will consciously shut down her defence mechanisms, allowing you to take advantage

of her vulnerable emotional state.

As you've seen, this technique works like gangbusters because it's based on hardcore

female psychology and Mind Control, and not some lightweight "Pickup Artist" mumbo

jumbo.

Now once you've spiked a woman's attraction to you using the Devalidation technique, then

it's time to seal the deal and make her your emotional slave forever.

You can do this with a fairly advanced Mind Control technique called Fractionation.

Known as the grand-daddy of all Mind Control seduction techniques, Fractionation can be

used to transform a woman who is attracted to you into someone who is as subservient

to you as a slave.

It exploits a particular vulnerability in a woman's mind to "brute-force" her

to surrender to your dominance for as long as you want.

Pretty powerful stuff!

When used correctly, Fractionation can get a woman under your control, enslave her and

make her fall in love with you far quicker than the usual "Pickup Artist" tricks.

I have to warn you though that it is not possible to "undo" the effects of Fractionation.

Once you have enslaved a woman using this technique, dumping her will cause irreparable

damage to her psychology.

Therefore, please use this technique responsibly and ethically.

To learn how you can use Shogun Method and Fractionation to manipulate a woman's mind

and enslave her to you emotionally, go to FractionationHypnosis.com or click on this

link right now.

For more infomation >> How To 🌟 Dominate 🌟 A Woman (By Messing With Her Mind) - Duration: 5:26.

-------------------------------------------

SING Movie Buster Moon Funny Moment Jigsaw Puzzle For Kids - Duration: 2:01.

SING Movie Buster Moon Funny Moment Jigsaw Puzzle For Kids

For more infomation >> SING Movie Buster Moon Funny Moment Jigsaw Puzzle For Kids - Duration: 2:01.

-------------------------------------------

simple and easy rangoli designs for diwali | easy free hand rangoli designs, easy rangoli,easy kolam - Duration: 3:43.

latest and easy rangoli design

For more infomation >> simple and easy rangoli designs for diwali | easy free hand rangoli designs, easy rangoli,easy kolam - Duration: 3:43.

-------------------------------------------

Lily Tomlin Has Advice for First-Time Puppy Owner Taylor Schilling - Duration: 1:34.

TAYLOR, THERE IS EXCITING NEWS.

>> EXCITING NEWS HAPPENING IN YOUR LIFE.

>> PLEASE TELL ME WHAT IS IT.

>> James: YOU ARE ABOUT TO ADOPT YOUR FIRST PUPPY.

NOW THIS IS A BIG COMMITMENT.

THIS IS A BIG DEAL, ARE YOU NERVOUS ABOUT THIS?

>> VERY MUCH SO.

>> James: WHAT KIND OF DOG IS IT.

>> I'M TERRIFIED.

>> WHY ARE YOU TERRIFIED?

>> WELL, BECAUSE, I DON'T QUITE KNOW HOW TO DO IT.

I'VE NEVER DONE IT BEFORE.

I DON'T KNOW WHAT KIND OF TRAINING TO DO OR WHAT, YOU

KNOW.

I JUST DON'T.

I MEAN HAVE YOU DONE IT BEFORE?

>> MANY TIMES.

>> REALLY?

SWRZ YOUR DOG IS HERE, RIGHT.

>> YES.

>> James: UP IN THE DRESSING, VERY WELL BEHAVED.

COULD YOU LEARN.

>> VERY SPOILED.

>> I'M GOING-- .

>> James: IS IT A VERY SPOILED DOG.

>> I THINK WHY NOT, THOUGH.

I KNOW HE'S GOING TO BE EIGHT WEEKS OLD ON MAY 19th.

>> EIGHT WEEKS, YOU'RE NOT GETTING HIM TO EIGHT WEEKS.

>> THAT'S TOO LATE.

>> IS IT TOO EARLY.

>> TEN WEEKS.

>> OH, ACTUALLY I'M WAITING TILL TEN WEEKS.

IT IS NOT UNTIL JUNE 7th.

>> IT IS A LITTLE FRENCH BULL DOG.

>> James: SHUT UP.

>> JAMES.

>> WHY DID YOU CHOOSE A FRENCH BULL DOG.

>> I MET ONE THAT I REALLY LUKEDMENT AND SO THEN I

DECIDED.

>> I MARRIED ONE, AND I'M TELLING YOU-- YOU OUGHT TO BE

CAREFUL.

I DON'T FOA IF I'M GOING TO GIVE YOU ANY ADVICE.

>> James: WHY SHOULD YOU BE CAREFUL WITH A FRENCH BULL DOG.

>> YOU DON'T KNOW, ANYTHING FRENCH, YOU HAVE TO BE, YOU

KNOW.

For more infomation >> Lily Tomlin Has Advice for First-Time Puppy Owner Taylor Schilling - Duration: 1:34.

-------------------------------------------

Funny Cartoons for Kids T-Rex Vs Dinosaurs Videos for kids Funny Dinosaurs Cartoons for Children - Duration: 59:27.

Funny Cartoons for Kids T-Rex Vs Dinosaurs Videos for kids Funny Dinosaurs Cartoons for Children

For more infomation >> Funny Cartoons for Kids T-Rex Vs Dinosaurs Videos for kids Funny Dinosaurs Cartoons for Children - Duration: 59:27.

-------------------------------------------

Lions Vs Tigers Finger Family Rhymes For Kids 3D Animation Nursery Rhymes Dinasour Fight Epic Battle - Duration: 10:59.

Lions Vs Tigers Finger Family Rhymes For Kids 3D Animation Nursery Rhymes Dinasour Figth Epic Battle

For more infomation >> Lions Vs Tigers Finger Family Rhymes For Kids 3D Animation Nursery Rhymes Dinasour Fight Epic Battle - Duration: 10:59.

-------------------------------------------

ABC Songs For Children 3D Dinosaurs Cartoons For Children ABC Phonics Songs ABC Rhymes For Kids - Duration: 12:18.

ABC Songs For Children 3D Dinosaurs Cartoons For Children ABC Phonics Songs ABC Rhymes For Kids

For more infomation >> ABC Songs For Children 3D Dinosaurs Cartoons For Children ABC Phonics Songs ABC Rhymes For Kids - Duration: 12:18.

-------------------------------------------

DEF CON 24 - Kai Zhong - 411: A framework for managing security alerts - Duration: 41:24.

>>Ah so today we're here to talk about 411 a framework for managing security alerts ah

which we will be open sourcing after Defcon [cheering] so before we get started let's do

introductions. My name is Kai, oh Kai Zhong and I am a product security engineer at Etsy so I'm

responsible for um helping developers with running secure code and maintaining some of the

um internal applications that we use on the security team like 411 and on occasion I've been

known to wear many hats like you see in that photo and uh after this presentation um I'll be

tweeting out links to the slides on my twitter so follow me please gotta get those followers

alright oh heh sorry I'm supposed to make a really really bad pun here um hopefully you

won't find our presentation to be unbearable yes you groaned >>Thanks Kai my name's Ken Lee

I'm a senior product security engineer at Etsy I'm glad to be back at Defcon I was here three

years ago for a presentation on content security policy and two important facts about me, one my

twitter handle is KennySan and two I really love funny cat gifs so I've managed to sneak one

into the slide deck >>Nice! >>For those that don't know this adorable cat is Maru so let me

go and start by explaining what Etsy is, Etsy is a marketplace for handmade and vintage goods

the security team at Etsy is responsible for keeping private member's personal information

such as credit card details, their addresses, etcetera oh in addition the Etsy security team

has been successfully running our own bug bounty program for the past four years as well

[applause] I'm going to go into some more detail about what we're covering in today's

presentation. First we're going to start by talking a little bit about the history of our

transition to using ELK we're going to go delve into some of the problems that we encountered

during this transition process and we're going to talk more about our solution which we call

411 then we're going to dive into a how we at Etsy do alert management using 411 we're going

to show you some additional more involved examples and we're going to finish things off with

a non live demo I know I really wanted the live demo but I I never trust the demo gods to get

it right um first we're going to go over some terminology for some of you this must be old

news but we're going to try to get over this as quickly as possible. So for those that

don't know this is a log file logs are typically interesting messages generated by web server

that's stored in a log file this is the ELK stack the ELK stack is consisting of three different

technologies, Elasticsearch, Logstash, and Kibana and I'm going to quickly go over what

each of these different applications do. The first as represented by our friendly

mustachioed log over here is called Logstash. Logstash is our data processor and log shipper

tool, we primarily use it as a way to identify interesting fields that we would want to

perform searches on in the future. In addition we also use Logstash to ship logs into

Elasticsearch proper, what is Elastic Search? Great question me! Elasticsearch is the

distributed real time search engine created by Elastic dot CO. It allows for storing

complex nested documents but in this case we primarily use Elasticsearch for storing log

files parsed by Logstash in addition Elasticsearch allows the generation of statistics of

your data so you can run interesting aggregations over the information that you have

stored in Elasticsearch which lends itself very well to analysis of the data that you

have. Finally the la- the K in ELK stands for Kibana and that's the data visualization web

application front end for Elasticsearch. Kibana allows for log discover and more

importantly debugging of problems in your application and in addition Kibana provides for

some interesting visualization options. Unfortunately this was the best stock image that I

could find of Kibana to show you what it does um you can do interesting pie charts, graphs,

eccetera, using Kibana as a front end. So now let's talk a little bit more about the

history of how we transitioned into using ELK so Etsy switched to using the ELK stack back in

mid 2014 from Splunk and the work took about a year and throughout this process we both

learned a lot of good lessons from the migration process and we got a bunch of great tools

out of it including 411 but it wasn't a super easy rode to go down we were aware of the fact

that we were going to run into issues when we started to transition to using ELK and we

had to deal with our fair share of really annoying performance impacting bugs with our ELK

cluster. In addition the security team was concerned about the usability of the ELK

as a solution for being able to do some of our alerting and monitoring. So to give an

example of one of these bugs here we have two Anitech articles, ones from September of

2014 and the other from April of 2015 that's a span of about six or so months basically this

article illustrates the discovery of uh a bug with Samsung's line of solid state

hard drives and the fix acknowledge is coming out about six months plus later so

unfortunately for us our ELK our ELK cluster used these SSDs to power the um ELK cluster and so

we were affected by this reperformance bug for more than six months in addition this is

just a small snippet from an email we had a small issue with a kernel level bug affecting how

it was handling NSF mounds this caused a lot of instability with our ELK cluster and

unfortunately some additional outage uh downtime as well. So to say the least you know these

are just two example bugs that we had to encounter at times it felt like we were riding the

struggle bus with regards to all of the bugs and issues that we had to deal with with regards to

ELK but that aside, Kai is now going to talk to you about um some of the actual problems, not

just bugs that we encountered, when migrating to Elk >>Thank you Ken, so um like most

security organizations alerting is a major part of how the security team at Etsy knows what

is going on on the site um and some mechanisms that we use for alerting are um Splunk, or used

to use our Splunk, StatsD and Graphite and unfortunately um when we first started this

migration um there we were making use of Splunk safe searches to automatically

schedule queries on some sort of periodic interval and Elasticsearch didn't offer like

equivalent functionality at that time and additionally, Elasticsearch also didn't offer

some sort of web UI for managing those um queries that we were writing which is pretty useful

when say it's like the middle of the weekend and you're getting spammed with alerts and you need

to make a change to one of the queries but doing so would require a could push and you

don't want to like break something with some sort of web UI where everything is handled

for you you could just go in there, change the query and then update it and you're good to go.

Now the second problem was that um we were just not familiar with the new query language that

we were um faced with um our old queries were built using SPL which is the language that

Splunk uses and um so the some of the functionality that we needed in order to write our

queries simply wasn't available um in Elasticsearch's Lucene shorthand. Additionally there

were some things that weren't obvious coming from um Splunk like especially with how

Elasticsearch indexes documents um it has an affect on like whether or not and how you can

query um the actual fields that you are searching on. So this came as a surprise to us at

certain points and because of these issues the road to ELK integration was a long one in

order to successfully um complete the migration we essentially needed three things,

firstly we needed a query language that would allow us to build complex queries preferably

without having to write any code, uh we also needed a mechanism to actually run these

queries and like email us with those results and finally we would like to have all of this

ready before we turned off Splunk because then we're then dark otherwise and that would be

really bad. Alright so as it turns out the first half of the solution was provided to us by

um the data engineering team at Etsy and that solution is called ESQuery and what it is is it's a

superset of the standard Lucene shorthand and um it's intactictly pretty similar to

SPL so it's got like a bunch of pipelines everywhere that you can then like take data from the

first one and transfer it to the second one. I'll provide an example in in a bit but more

importantly it supports all of the functionality that we need. So here's a quick summary of all

of the syntax um when you define a um Elasticsearch query you do it via this large json DSL and

we provided the ability to like in line all of these directly into the query so you can see it

over here you can specify say like size or how you're sorting the results that come back or

just what fields are coming back. Additionally you can do an emulated join so you can results

from one query and then like insert them into a subsequent query and all the irrigation

functionality that is available in Elasticsearch is also available in ESQuery but in

line. And finally you can also um define variables within ESQuery um and you configure

them in 411 and then have those queries get substituted into uh sorry those variables get

substituted into your queries at one time so like you can have a list of values that you can

update independently of these queries so here's an example SPL query. Um what this is doing is

it's finding all um failed login attempts and then giving you the top ten IP addresses that made

attempts this is the same query but um when using uh Lost Searches um DSL and finally this

is the same query but when using ESQuery so you can see it's pretty similar to how you would

write it using SPL and way shorter as well and the two are actually similar enough that um

someone at Etsy was able to write a simple query translator which we made use of during our

migration so what we did was we would just plug it in, um test it out, and make changes if

necessary and then stick them into 411. Speaking of which next up let's talk about what 411 is

so 411 is an alert management interface or application and what it does is it allows you to

write queries that get automatically executed on some sort of schedule then you can

configure it to email you with like email you alerts whenever those data sources that you're

querying return any results and additionally you can manage the alerts that our generated

through the web interface. Before we dive into 411 let's um talk briefly about how

scheduling works within um the system. So whenever a search job is run it executes um a query

against a data source and then generates a a an alert for every single result that comes back

you can then configure a series of filters on those alerts to re- like reduce or modify the

stream somehow and then finally um specify a list of targets that you can send uh the

remaining alerts to. So an example of one target that is pretty neat is the Jira target

which allows you to like generate a a ticket for every single alert that goes through

the pipeline. Alright wait oh sorry additionally if we um take a step back what happens is

there's a scheduler that runs periodically and generates those search jobs which then get fed

off to a bunch of workers that actually execute them. And now we're ready to get into 411. So

the first thing you'll see when you log on is the dashboard which is this thing over here

it's pretty simple but you see there's some um userful information about the current

status of 411 there's a breakdown of alerts that are currently active as well as a

histogram of just like alerts that have come in over the last few days. Alright moving on um

one of the most important things you'll want to do in 411 is manage the queries that you are

like schedule to execute and you do that via the search management page which you can

see here the center you've got all the searches listed out with like some categorization

information and on the right you'll you can see the health of that particular search, whether

or not it's been running correctly, and whether or not it's been able to execute. Now

if you want to modify an individual search you'll get taken to this page over here

which has a whole like slew of options that you can configure um there's a title which is not

too exciting but more importantly there are all of these fields so let's go through

all of these briefly. At the top here is the query which is quite simply the query that you're

sending off to whatever data source in this case this is a Logstash source so we're sending

this to an ElasticSearch cluster with a Logstash index um you can also configure we can also

configure a results type so whether or not you want the actual contents of the log

inside um match the query or whether you just want like a simple count or even an

indication that there's like no results and finally you can filter you can apply thresholds

on like how many results that you want to get back next up you can you can also provide a

description that um gets included whenever an alert gets sent to you so you should

preferably put some information that allows you allows whoevers um assigned to the alert to

resolve it and there are a few categorization options at the bottom as well for the alerts

that are generated much better alright next up is the frequency which is how often you want to

run this search and the time range which is how how far back of a like time window you want

to search most of the time you're gonna want both of these to be the same value but if you

want say like better granularity you might want to specify a frequency of one minute and a

time range of ten minutes and finally we've got the status bun which lets you toggle this

search. Cool that's all for the basic tab next up let's talk about uh notifications. So in

411 you can configure uh you can configure email notifications whenever um it generates any

alerts and those notifications can be sent out as soon as the alerts are generated or included

in a hourly or daily roll out. You can also assign you also have to assign um these alerts

to an assignee which is the person or the group of people that are responsible for

actually resolving and taking a look at those alerts and finally the owner field is just um for

bookkeeping so you can keep track of who is responsible for maintaining that particular

search. And here's the AppSec group that we're currently using here you see it's got a list of

all the users that are currently on the security AppSec team and uh whenever 411 generates an

alert for this particular um search they'll email all of these people. Alright moving on

to the final tab the here we've got some more advanced functionality that's less

commonly used like auto close which allows you to automatically close alerts that

haven't seen any activity after a while so they're probably stale and we've also got um the

actual configuration for filters and targets here as well so again recall that filters

allowed you to reduce the list of alerts that get passed through um 411 and eventually

get generated and here is a list of filter that are currently available so I'll just highlight

a few of them. Dedupe allows you to just like dedupe alerts that are the same and you can

throttle um the alerts that are generated to like some threshold for the purposes of this

presentation let's talk about the regular expression one because that's relatively

complicated uh you can configure this particular filter to um have some sort of key like what

keys you want to match on within the alert as well as a regular expression to match on and then

you can specify whether or not you want matching alerts to be included or excluded from the

like final list of alerts. Similarly on the other side we've got the list of targets

that you can configure and we're going to cover the Jira target which allows you to specify a

Jira instance and a a project a type and a and a assignee and then any alerts that make it to

this target get turned into Jira tickets so that's useful if you want to use Jira as your alert

management workflow cool so that's about it as far as managing searches go next up

we're going to get into actually managing the alerts that are generated by 411. So here it is

the main alert management interface you'll notice at the top there's a search bar for

filtering the list of alerts that are visible and this 411 actually indexes all of its

alerts into Elasticsearch so all of your standard like Lucene or hand queries are valid here um

in the center you'll see all of the actual alerts that matched the current filter and you can

select um individual alerts and apply actions to them using the search um action bar at the

bottom. Now if you want to drill down into a individual alert you can so this is the view for

viewing just like a single alert and you can see at the center there's all of the information

that was available before but also a change log for viewing all actions that have been taken

on this one's alert. Additionally you'll see there is the same action bar that's

available at the bottom and let's say thank you let's say we were to investigate investigate

this alert like we took a look at IP address and then we've determined that it's just a

scanner so nothing to worry about we can then hit resolve on that action bar which will pop

up this little dialog where we can select a resolution status in this case not an issue and a

description of exactly what actions we took to resolve this alert and then once you hit

resolve there you'll see the change log has been updated with this um additional action. 411

also offers a um alert feed so what you can do is just keep this open and whatever new

alerts come in um it'll just hop up on this list and you can also leave it running in the

background because it's got desktop notifications so you'll see that nice little chrome pop

up uh whenever there are new alerts cool alright next up >>Thanks Kai I'm gonna talk to

us talk to you more about how we do alert management at Etsy using 411. So here we have a

sample email generated by 411 I'm going to go into some more depth and explain to you what's

going on so the subject line of this email says login service five hundreds ah the description

says login five hundreds investigate for people that aren't very familiar with it log

in is just basically a process to essentially log you into a website, five hundreds is

basically a a message that says oh something bad is happening and usually this is pretty bad

to the extent where you would want to create an alert for it and be notified about it and we

can see from the time range that this alert is taken place over the past five minutes and we

have buttons on the bottom to both view the alert in 411 as well as to be able to view this

link in Kibana as well we also get a short snippet including the PHP error that was thrown

and as you can see from this sort of short email snippet people are sort of taking action

based on this alert. But let's take a step back a little bit and think more about what we do

to actually crea- create high quality alerts and at Etsy the secret is we create alerts that

have a high degree of sensitivity. What do I mean when I say high sensitivity well

let's say that we have an alert that fires one hundred times over the course of a day and out

of those hundred times that alert correctly predicts an event actually happening ninety

times so what that means is out of a hundred times that alert only improperly fires ten times

so there's a one in ten chance that that alert is misfiring so ninety percent of the time that

alert is responding correctly to an event so we say that that that particular has a

sensitivity of ninety percent that's a pretty high sensitivity that we would you know find to

be useful for alerts that aren't as important we still create them as searches and alerts in

411 but what we do is we end up not generating email notifications out of them and

I'll go into more detail as to why in just a moment for more important alerts we still

generate alerts off of them but what we do is we set them up as um rollups so every hour or

every day we have this alert go off and it'll email us the results and one reason why we

really like doing this is because it gives us the option of being able to monitor a

particular search over a period of time for anomalies. So one of the reasons why we take this

sort of tiered approach to alerting is because attackers hitting your website will often

generate a lot of noise and in the process of doing so they'll set off a bunch of different

alerts that you have set up. So one thing that we often have to answer when we see an alert on

our phone at three in the morning is is this something that I really need to respond to

at three in the morning? Do I Can I Can I just continue sleeping? Do I have to you know

can I just answer this tomorrow or even after the weekend? Well one way in which we make that

determination is by seeing and looking at the other alerts that have gone off in the same period

of time so we look at the high alerts the low alerts the medium alerts that have gone off over

this period of time an example uh a good example of this would be let's say there is a very

high number of failed login attempts that an alert a high alert that has gone off recently

well maybe if we also have a lower alert that indicates that we have a low quality uh series

of bots trying to scan us at the same time maybe that's indicative that actually this

isn't like a really concentrated attack that we need to worry about so we can go back to

sleep. So in addition to creating alerts one thing that we also have to be vigilant

about is maintaining our alerts sometimes we create alerts that overfit on a particular attacker

and as a result of that the alerts become less useful over time one way in which this

happens is the alert simply generates too much noise we've sometimes we've created this

search and it turns out we're the IP address for example might be shared by some legitimate

users as well um and that can create a bunch of false positives so in those cases we

sometimes have to finetune our alerts and one way in which we do that is we look at other

fields so another example is sometimes say an attacker might accidentally be using a static

but very easily identifiable user agent when attacking our website one way in which so we

can create a search off of that to easily identify that attacker but perhaps they become a little

savvier and realize that they're making this terrible mistake in the first place and they make an

att- they make an effort to randomize the user agent and by doing this what they essentially

do is they're forcing us to have to use other fields to identify the attacker may be looking at

what data center it's coming from or IP or other IP addresses that they're coming from for

example so let's take a step back we've sort of sold 411 as a tool for security teams but it's

also a very useful team um a very useful tool for the average developer as well and one way in

which 411 can be useful for a developer is creating alerts based off of potential error

conditions in your code so a good example of this would be when you want to know potential

exception conditions say for example code wrapped in a tri catch statement for example you

generally don't want your application to be running into too many exceptions so generally

by entering in a log line and creating an alert based off that log line you'll get a

notification when something bad happens in your application. Another condition under which

you'd want to create an alert is when you're getting a large amount of unwanted traffic to an

endpoint that you uh consider sensitive. A good example of this would be uh an attack for

example trying to hit a gift card redemption endpoint or a credit card number re- uh

entering endpoint you know those endpoints are probably already rate limited in the first place

so it's only natural to add basically an additional alert on top of that just so you know

that someone's trying to intentionally brute force this particular endpoint and finally

the last instance under which you might want to consider creating an alert is when you're

deprecating old code. So at Etsy we have what's called a feature flag system that allows us to

very easily flag on and off particular bits of code but sometimes we need to evaluate

how often a particular code branch is being exercised before we can move it entirely from the

code base one way in which we do that is we sometimes just like to add a log line and create an

alert just to I with a rollup to see how many times this particular code branch has been

exercised throughout the course of a day or even a week and by doing that once we have

confidence in knowing yes this code is not really being used that often we can go ahead and

actually remove the code in question. So at Etsy we actually have a couple different

instances of 411 set up and I'll explain what they are. Our main instance that the application

security and risk engineering teams used is called Sec411 in this instance it's primarily

used for monitoring issues that happened on Etsy dot com itself. The network security team has

it's own instance of 411 called appropriately netsec411 and this instance is set up primarily to

aid in monitoring laptops and our servers and finally for those compliance loving folks we

have an instance of 411 setup called Sox411 which is primarily uh used for sox related

compliance issues. Now I'm going to go into some more examples of uh some functionality that we

have present in 411 that we're going to be making available to you when we open source the tool

a lot of this additional functionality was made av- was made at the request of

developers at Etsy and we found it useful enough to include in the open source version of 411

as well. So Kai mentioned earlier that 411 has the ability to incorporate lists into

queries here we have a search functionality that looks for suspicious duo activity coming

from known TOR exit nodes so this query looks fairly straightforward but let's take a

look let's take a deeper look so we're looking at logs of the type duo login and we're looking

for the IP address that matches this TOR exits variable well if we take a look at what the list

functionality is we can see that TOR exits is defined as a URL that just enumerates a list of

IP addresses so what 411 is actually doing behind the scenes is it's taking this TOR exits

node variable and expanding the query out to include all of those IP addresses in that TOR

exits node list so essentially when you get when you get any hit in a log line that contains

a TOR exit node IP address it matches with the search and generates an alert. Now I'm

gonna talk more about some of the additional functionality that we offer beyond just the

ELK stack with 411. We offer a searcher for graphite which is basically a way of storing and

viewing time series data this is what graphites front end interface looks like as you can

it's a very nice way of easily generating graphs, this particular graph shows an

overlay of potential cross site scripting over potential scanners um it's just a really

nice way of being able to determine when you are when there are anomalies happening

and so the graphite searcher gives you a really easy way to do simple threshold style

alerting uh and because the graphite searcher basically directly sends the query to

Graphite itself all of graphite's data transform functions are available for you

to be able to use for the searcher so as an example of some of the things you can do

you can essentially write a query to say please fire off an alert when you see a high rate

of change for failed logins. Now I'm gonna talk a little bit about the HTTPS searcher that

we're also making available. This is a fairly straightforward searcher what it does is you

provide an HTTP endpoint and if you receive an unexpected response code it creates an

alert based off of that. It's very useful for web services when you want to know if a

particular service is for example down or even up and for those in the devops community

this is very similar in functionality to the tool called NAGIOS. Now I'm gonna go to the

non live demo portion let's hope this works [laughter] okay I'll be narrating this so for this

demo we set up a very simple wordpress blog instance called Demo All The Things and we have

a we have a plugin installed called WP Audit Log which logs everything that happens in this

wordpress instance. In addition we are forwarding the logs to our own ELK stack so that we can

index the log files um here I'm just showing off this one nice blog post that we have uh red is

apparently the best color. Now we're going into Kibana proper to actually look at some of the

log files from this wordpress instance and we can see here there's an interesting log line

user deactivated a wordpress plugin okay that's kind of interesting maybe we can make an

alert off of that particular phrase that we can use for the future. So what we're going to

go and do now is we're going to go into 411 proper we're going to go into the searches tab

we're going to go and hit the create button and create a new searcher of the Logstash type

and we're basically just going to create a new search to look for this particular message

we're going to call this search disabled wordpress plugin and the query is going to look for

anything in the message field that contains the phrase user deactivated a wordpress plugin

and we're going to provide a little description in the search to let others that use 411 know

what this search is about in case they have to deal with an alert generated by it in the

future. We're going to look back in the past fifteen minutes and we're gonna test this alert and

we can see here that 411 has successfully grabbed data from um from logstash so we're going

to go ahead and create the search and to actually generate a real alert we're going to go

ahead and hit the execute button which will cre- which will not just test the alert it will

actually create a real alert for us in the alert page we can see here we get the same results

back that we just got from hitting the test button so now we're going to go into alerts

we're going to click on view to take a look at our particular the alert that was just

generated and we can see here that in the in the plugin file information we can see that the

duo wordpress plugin was disabled well that's not good so now that we've gotten the

relevant information from this particular plugin we're going to go ahead and remediate this

issue we're gonna go into the wordpress back end we're going to go into the plugins page oh

and what do you know? Duo two factor off plugin the plugin is disabled so we're gonna go ahead

and re enable it and now that we've taken care of that issue we're gonna go ahead and hit

resolve and we're gonna just say that we've taken action to re enable this plugin and we've

taken care of the alert by doing that. That concludes the live demo, not live demo [applause].

>>Cool and that also happens to conclude the presentation as well um once again 411s gonna be

open sourced after uh Defcon and we will take questions now um there's a mic over there and

over there so if you've got a question please line up [movement in the room] >>if

you're leaving you have to leave out these doors in the back >>when deciding to move away

from Splunk um how did you guys scale ELK versus going with Splunk like so ELK has a problem

when it gets really big it gets really expensive so was it a cost decision moving from

Splunk? >>ah the the question was why did we switch from Splunk um it was basically a

decision made by our operations team >>Okay, one last question, what are you guys using as your

send mail function? Are you guys using like mail chimp? Um we've just got everything setup

correctly already so it's whatever um you provide to PHP >>The question was what do we

use to send mail in 411? >>So um yeah I have a question so you're open sourcing 411 after this

talk or that's the first part and the second part is do you have an a is this built on a AWS

architecture such as using a simple email service is it using elasticsearch what is it using

as far as your infrastructure that you can talk about? >>Um we're going to be open sourcing

this after Defcon and as far as Gmail um sorry what was the second question, email right?

>>No is it AWS architecture, so do you have an AWS architecture to go with it? >>Uh no it's just

um whatever email like >>No no no I meant in general the entire because like elasticsearch are

you using like lando functions or is it all pretty much like uh uh internal to itself instances

as far as >>Everything's inside like our data centers >>Okay got it thanks >>questions? >>Hey um

I have a question about the configuration you showed us, the beautiful UOI but how is the

configuration actually stored and uh yes there is a change log on individual pages but would it

be easy to version control the configuration somehow? >>so the question was about change log

and version controlling of alerts uh >>There is no version controlling of alerts but there

is a change log of all of the things that have been taken on the alert so could you also

speak louder because I think the mic isn't that great. >>oh okay So the initial question was how

is the configuration stored? Is it like is it stored in some text format that you can review

is it xml is it, can we version control it? >>All of it's stored in MySql so we're using MySql as

a database. >>Hello Hello Hey uh so at this point you guys are probably definitely aware of

Watcher Allasa Searches own alerting service um what's the motivation between using their

own uh plugin built in straight to the you know cluster? >>So uh at the time when we started um

working on this I don't think Watcher existed yet >>Yeah it's super new >>So that's' why we

ended up writing this >>Right um so is there any point to using it now as opposed to just

running the plugin? I don't want to be like that guy I'm just >>Um I don't know you're kind of

putting me on the spot uh there's also so it's not just elasticsearch like you can also

plug in other data searches into 411 for like querying those data sources >>Okay, thank you. >>Hi

um my questi- I have like two questions one of them is what was your motivation to move away

from Splunk and build your own your motivation to move away from Splunk and build your own

uh >>So that was a decision made by our Sys Ops team. >>Okay >>So I didn't really have any like

much input on that >>Uh but any security concerns they had or? Was it I mean did they have any

security concerns at all or yeah >>I don't think so I think there at one point like uh the

scripting functionality in ELK was enabled by default and there were some like serious security

issues with that so that's as far as I can remember >>Okay and um just one last question um

does ELK also help like you know doing log analysis across multiple servers and senses?

>>Uh >>Or is it like dedicated to just like one group of >>Yeah you can setup multiple instances

and have them like connect to the same database and that would just work >>Oh okay thanks

>>Okay >>Uh are ya'll open sourcing that ESQuery as well? Because Query DSL sucks >>Uh

yeah it's built in >>Oh it's already up >>Huh? >>Oh it's already up? Oh it's built in?

Okay >>MMhmm >>My questions on uh Jira integration in your demo you showed that you resolved uh

the issue with the user turning off the the feature in wordpress does that end up um closing a

jira ticket? >>Um no it doesn't so uh the Jira like target is pretty much separate you just

send that data off to Jira and then like 411 forgets about it >>Okay thank you >>Mmhmm >>K so

my question is a little bit two fold >>Okay >>Uh we saw a lot of web UI about this but uh there

wasn't any real uh uh focus on any API around it so uh like consider the use case where

there might be something where uh the same type of alert happens frequently but self

resolves uh would it have the possibility to either escalate the same type of alert due to

it's frequency or in contrast if it somehow self resolves all of the history of those alerts get

resolved as well? >>Um that's not currently built in but that's because like it hasn't

been asked for yet so um like once this is open sourced you could create an issue and then

we could consider it >>Okay thank you >>Cool, guess that's it [applause]

For more infomation >> DEF CON 24 - Kai Zhong - 411: A framework for managing security alerts - Duration: 41:24.

-------------------------------------------

Dianosures Elephant Cartoon For Children 3D Dinosaurus Kartun Elephant Movie Funny Elephant Attacks - Duration: 15:22.

Dianosures Elephant Cartoon For Children 3D Dinosaurus Kartun Elephant Movie Funny Elephant Attacks

For more infomation >> Dianosures Elephant Cartoon For Children 3D Dinosaurus Kartun Elephant Movie Funny Elephant Attacks - Duration: 15:22.

-------------------------------------------

hand embroidery designs, hand embroidery designs for beginners,peacock embroidery designs for blouse - Duration: 2:14.

maggam work blouse designs peacock

For more infomation >> hand embroidery designs, hand embroidery designs for beginners,peacock embroidery designs for blouse - Duration: 2:14.

-------------------------------------------

Learn Colors Balls for Children, Toddlers and Babies | Colors for Children Learn with Farm Animals - Duration: 11:36.

Learn Colors Balls for Children, Toddlers and Babies | Colors for Children Learn with Farm Animals

For more infomation >> Learn Colors Balls for Children, Toddlers and Babies | Colors for Children Learn with Farm Animals - Duration: 11:36.

-------------------------------------------

Princess Coloring Page l Coloring Book Learn Colors For Children - Duration: 3:11.

Hi Kids

My Other Games

For more infomation >> Princess Coloring Page l Coloring Book Learn Colors For Children - Duration: 3:11.

-------------------------------------------

Lion King Cheetah Tiger 3D Animation Cartoon Short Movie For Children Learn Wild Animasl For Kids - Duration: 13:37.

Lion King Cheetah Tiger 3D Animation Cartoon Short Movie For Children Learn Wild Animasl For Kids

For more infomation >> Lion King Cheetah Tiger 3D Animation Cartoon Short Movie For Children Learn Wild Animasl For Kids - Duration: 13:37.

-------------------------------------------

Learn Colors with Dinosaurs Animals for Children | Learning Video for Toddlers - Duration: 16:09.

Learn Colors with Dinosaurs Animals for Children | Learning Video for Toddlers

For more infomation >> Learn Colors with Dinosaurs Animals for Children | Learning Video for Toddlers - Duration: 16:09.

-------------------------------------------

🎮 Fun Animal Pet Care Kids Games - Cute Cat Kitty Meow Meow Bath Time & Makeover | Games For Kids - Duration: 13:58.

Fun Animal Pet Care Kids Games - Cute Cat Kitty Meow Meow Bath Time & Makeover | Games For Kids.

For more infomation >> 🎮 Fun Animal Pet Care Kids Games - Cute Cat Kitty Meow Meow Bath Time & Makeover | Games For Kids - Duration: 13:58.

-------------------------------------------

Versatile and mobile – the new device for cleaning processing machinery - Duration: 1:32.

The industrial production of Chicken Nuggets.

Most of the food we eat today is produced by machine.

After they're breaded, the nuggets go in the oven which is heated to X degrees Celsius.

Keeping this production process running smoothly is a challenge not only for the engineers,

but also for those cleaning the machinery.

The cleaning results have a direct impact on hygiene, which in turn effects food safety.

And those results heavily depend on the people doing the cleaning.

Even if the work is done with care, manual cleaning is hard to duplicate and validation is difficult.

That's why Fraunhofer IVV Dresden has developed a cleaning robot.

It's equipped with seven nozzles that spray with up to six bar of pressure.

It employs a variety of cleaning chemicals depending on the degree of soilage.

For more infomation >> Versatile and mobile – the new device for cleaning processing machinery - Duration: 1:32.

-------------------------------------------

7 Tips for a PROFESSIONAL looking Resume - Duration: 7:11.

I like this one this I don't want to

read this what kind of font is this this

stuff is just garbage so many of you out

there may be looking for a job or

changing jobs and you need to write a

resume but you might have been out of

the game for a while or you just don't

know how to do one well I'm going to

give you seven tips that you need to

know so check it out

hello and welcome to hindsight 101 or

you're learning about things that will

help you in everyday life now I'm going

to tell you the 7 tips that you need to

know in writing a good resume

the first one is readability you better

please two people first the machine

that's scanning it and the person that's

actually looking at it and what I mean

about a machine scanning it you want to

make it readable you don't want to use

any crazy fonts or any quirky style you

want to keep it very basic and easy to

read so what you want to do is outline

kind of how you want it to go you want

to bold your titles your name make the

bear font a little bit bigger than the

rest so the scanner can decipher what

would it need to look at but then on the

other hand you want to make it readable

for a person and that person may only

have a few seconds - only a few minutes

look at your resume so you need to wow

them very quickly if you want to put the

important stuff that you need to sell

yourself on at the beginning you want to

make it with readable thoughts not too

small not too big not crazy like comics

and number two what you want to do is

update your resume what I mean by that

is updated often so know don't update it

when you're applying for a job that

could be 20 years that could be five

years you never know you want to update

it

once a year because you never know

what's going to happen you never know

what opportunity is going to come or you

never know what pitfalls are going to

face you with downsizing layoffs

anything so you always want to be

prepared and you always want to have

your resume up to date and ready so

you're not scrambling or wondering how

do I need to write this it's been so

long I don't know what to do be prepared

number three you're going to want to

write down your accomplishments not your

duties no one wants to know that you

know I scheduled I kept the books I did

that people want to know I ran a two

billion dollar company

I'm edge thirty people I save the

company a hundred thousand dollars tell

your future employer about your

accomplishments not about your job

duties no one cares about that they want

to know how you're going to be a win for

their company number four make sure you

get a copy of the job description and

take out key words what you want to do

is take some of those key words and put

them into your resume that will really

impress an employer and that'll give

them the chance to relate what you do to

what they want you to do so it kind of

gives them a visual of how can I picture

this person at our company so keep that

in mind

pick up key words whatever it is try to

take out key words that they're looking

for say there's certain skill sets or

different things that you need take

those out if you have them or you've

done them and put them into your resume

that'll make you stand out from the rest

of the people who probably didn't do it

now number five just keep it simple

I like to say go back to basics so I've

mentioned it before use basic phones

don't do anything too crazy or fancy I

know you may want to be creative and

there's other ways you can be creative

you still have to make it readable for

someone to want to look at it my biggest

pet peeve of resumes that I've seen come

through my desk were emails now hot

girls sexy 99 may be great for you when

you email your friends but a for a

future employer get rid of it you can go

to any site Yahoo Gmail Microsoft they

all give out free email

so it's not going to cost you anything

and get something simple you could

either do if your name is Bob Smith B

Smith Smith B just do something simple

so if someone wants to email you it's

easily remembered and it correlates with

your resume because it's part of your

name you want to take out the technical

jargon no one's going to understand

except for the people that you worked

with you might have to change your title

from something crazy that you had was

project superstar which no one knows

what that means

but in actuality you are project manager

so put that down but make sure whatever

general title you use closely relates to

what you're doing number six I can't say

this enough check for errors double

check run it through your spell checker

send it to a friend actually send it to

a couple of friends read it put it down

come back to an hour later you'll never

know how many errors that you whiz past

because you know your resume and you

skip past certain words because you

assume they're correct when they're not

it happened to everyone so always have a

second pair of eyes to look at it

because sometimes spell checker doesn't

always catch a word if it's spelled

right but it just me maybe the totally

wrong word so always have friends

families also we have a communications

department at my job so a lot of times I

may have a friend or coworker take a

look at it you can hire somebody there's

tons of people English majors anybody

that will take a look at your resume a

future employer will think if you can't

pay attention to detail for something as

simple as a resume I'm not going to give

you a job here managing people

or handling billions of dollars lastly

number seven this one's kind of a

special one to me always make sure your

resume is on hand you never know when an

opportunity is going to strike a lot of

you carry a cellphone you can save it to

your cell phone so you can easily email

it to someone if you need to I like to

keep it in Dropbox because I can email

it or if I desktop I can email it from

there I can edit it on my phone I can

edit on the desktop so I'm a big fan of

saving an updated copy of my resume and

outbox and you never know someone says

shoot me your resume I just send it to

them

so and then I don't have to remember

later oh I have to send some of my

resume or oh like I said if you keep it

updated you can just shoot it off on

hand and not send someone a couple days

later because you need to review it

check some facts have somebody look over

it you already have it ready people will

be impressed that you took a little time

beforehand and you got it to them

quickly please hit that like button if

you enjoyed this if you want to see more

of this kind of content hit subscribe

Không có nhận xét nào:

Đăng nhận xét