{"id":424,"date":"2017-10-30T09:33:35","date_gmt":"2017-10-30T13:33:35","guid":{"rendered":"http:\/\/sites.nd.edu\/gregmadey\/?p=424"},"modified":"2017-11-01T15:14:19","modified_gmt":"2017-11-01T19:14:19","slug":"lecture-notes-oct-30th","status":"publish","type":"post","link":"https:\/\/sites.nd.edu\/gregmadey\/2017\/10\/30\/lecture-notes-oct-30th\/","title":{"rendered":"Lecture Notes \u2013 Oct 30th"},"content":{"rendered":"<p>Class Agenda<\/p>\n<ul>\n<li>News &#8211; Web Development security\n<ul>\n<li>Threats from IoT BotNets\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/a-gigantic-iot-botnet-has-grown-in-the-shadows-in-the-past-month\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/a-gigantic-iot-botnet-has-grown-in-the-shadows-in-the-past-month\/<\/a><\/li>\n<li><a href=\"https:\/\/research.checkpoint.com\/new-iot-botnet-storm-coming\/\">https:\/\/research.checkpoint.com\/new-iot-botnet-storm-coming\/<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\">https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)<\/a><\/li>\n<\/ul>\n<\/li>\n<li>RansonWare\n<ul>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\">WannaCry<\/a><\/li>\n<li><a href=\"http:\/\/www.zdnet.com\/article\/bad-rabbit-ten-things-you-need-to-know-about-the-latest-ransomware-outbreak\/\">BadRabbit<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/bad-rabbit-used-nsa-eternalromance-exploit-to-spread-researchers-say\/\">Bad Rabbit used NSA \u201cEternalRomance\u201d exploit<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Lightning talks for today\n<ul>\n<li>Daniel Jasek\n<ul>\n<li><a href=\"http:\/\/sites.nd.edu\/gregmadey\/files\/2017\/10\/Web-Apps-Lightning-Talk-Jasek.pdf\">Internship \u00a0at OneParish<\/a><\/li>\n<li><a href=\"http:\/\/oneparish.com\">OneParish.com<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Michael O&#8217;Malley\n<ul>\n<li><a href=\"http:\/\/sites.nd.edu\/gregmadey\/files\/2017\/10\/CICD-Web-Testing-Framework-OMalley.pdf\">Test automation and Continuous Integration \/ Continuous Deployment (CI-CD)<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Continuous_integration\">Continuous integration<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Continuous_testing\">Continuous testing<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Continuous_delivery\">Continuous delivery<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Volunteers for Wednesday?<\/li>\n<\/ul>\n<\/li>\n<li>Project review scheduling\n<ul>\n<li>https:\/\/doodle.com\/poll\/s63sngsuf6ew4t8y<\/li>\n<\/ul>\n<\/li>\n<li>Discussion of last week&#8217;s homework: <a href=\"http:\/\/sites.nd.edu\/gregmadey\/files\/2017\/10\/Thoughts-on-HW-9.pdf\">HW #9<\/a><\/li>\n<li>Discussion of this weeks homework: HW #10<\/li>\n<li><a href=\"http:\/\/sites.nd.edu\/gregmadey\/files\/2017\/10\/django.pdf\">Django:\u00a0Background and History<\/a><\/li>\n<li><a href=\"http:\/\/sites.nd.edu\/gregmadey\/files\/2017\/10\/Deep-Dive-2-Django-1.pdf\">Deep Dive 1: Django<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Class Agenda News &#8211; Web Development security Threats from IoT BotNets https:\/\/www.bleepingcomputer.com\/news\/security\/a-gigantic-iot-botnet-has-grown-in-the-shadows-in-the-past-month\/ https:\/\/research.checkpoint.com\/new-iot-botnet-storm-coming\/ https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware) RansonWare WannaCry BadRabbit Bad Rabbit used NSA \u201cEternalRomance\u201d exploit Lightning talks for today Daniel Jasek Internship \u00a0at OneParish OneParish.com Michael O&#8217;Malley Test automation and Continuous Integration \/ Continuous Deployment (CI-CD) Continuous integration Continuous testing Continuous delivery Volunteers for Wednesday? Project review [&hellip;]<\/p>\n","protected":false},"author":415,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-424","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/posts\/424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/users\/415"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/comments?post=424"}],"version-history":[{"count":21,"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/posts\/424\/revisions"}],"predecessor-version":[{"id":485,"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/posts\/424\/revisions\/485"}],"wp:attachment":[{"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/media?parent=424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/categories?post=424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.nd.edu\/gregmadey\/wp-json\/wp\/v2\/tags?post=424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}