Home
Search results “Generate secret token rails”
Using Google Developer Console to get OAuth2 Client ID and Client Secret
 
13:39
After long resisting it, I'm finally cool with embedding a Google Developer Console ClientID and ClientSecret directly into the Github Repo. Unlike the original Pipulate, there's no actual server in the picture — just Jupyter Notebook running on your local machine. And so now, witness the power of this fully operational Github project.
Views: 21334 Mike Levin, SEO in NYC
Testing OAuth2 Authorization Flow with Postman (Authorization Code Grant)
 
07:54
💥 💥💥 Want to learn more about Postman? Check my Postman online course. ▸▸▸ Get it for only $10.99 (limited supply, almost 75% OFF): https://www.udemy.com/postman-the-complete-guide/?couponCode=YOUTUBE11 --- This tutorial shows you how you can test the OAuth 2.0 Authorization Code Grant using Postman. VIDEO UPDATE (November 2018): The callback URL has changed and needs to be: https://app.getpostman.com/oauth2/callback
Views: 38571 Valentin Despa
Spotify web api with access token
 
06:24
Accessing spotify web api with a create-react-app application using the access token method. Blog: http://www.angular-city.com/2017/07/spotify-web-api-access.html github code: https://github.com/angularcity/spotifyexample Feel free to buzz back if there is a better solution than this.
Views: 21459 Harikrishnan KayKay
How to send and capture API requests using Postman
 
04:32
Learn how to send and capture API requests using Postman REST Client. More about Postman at https://getpostman.com
Views: 192966 Postman
Implementing TOTP Two Factor Authentication for Google Authenticator with PHP & AJAX
 
15:08
What is TOTP? TOTP is a short form for Time-based One-time Password (usually called Token) which is password that can only be used once and is only valid to be used in a defined time range. Usually TOTP generators generate new passwords every defined number of seconds or minutes. What is Google Authenticator? Google Authenticator is a TOTP/HOTP generator you can freely use for your software, app or website authentication. How does it work? A simplified explanation would be, both google authenticator app and your authentication program know the same secret key and can compute the same token for a certain range in time based on this secret key. A more technical explanation can be read here: https://security.stackexchange.com/questions/35157/how-does-google-authenticator-work Getting Started To get started you will have to download the Google Authenticator app to your smartphone or tablet etc. In this implementation example I will be using a PHP Framework by Michael Kliewe (PHPGangsta). From my point of view the framework is lightweight and just perfect for this example. I will not be changing the author’s initial code. The author has stored the Framework on his github repo. Feel free to download in order to follow along. https://github.com/PHPGangsta/GoogleAuthenticator #Website Website: http://hazardedit.com/ #Social Twitter: http://twitter.com/hazardedit Facebook: http://facebook.com/hazardedit #Messenger Skype: hazardedit Email: [email protected]
Views: 3321 HazardEdit
Shopify | Get Token | Node.js App
 
09:45
Source code: https://github.com/cafeasp/shopifyappnodejs How to make this work: 1) Get your app credentials 2) Clone this github project 3) Run npm install 4) Run it 5) Go to localhost:3000/shopify/install?shop=your store name.myshopify.com 6) Login to your store 7) Accept install 8) In the console you will see the token if everything went fine On the next video we will pull the store products. Let me know if you have questions and I will do my best to help.
Views: 1988 CAFE ASP
Tokens, OAuth2 and JWT in a Spring API (RWS - Module 6 - Lesson 3)
 
09:31
Learn how to move from a basic Spring Security OAuth2 config to use JSON Web Tokens and how to work with JWT when consuming the API. This lesson is part of "REST With Spring" - Module 6 (Advanced API Security) - Lesson 3: http://youtube.restwithspring.com For the entire "REST With Spring" series: https://www.youtube.com/playlist?list=PLjXUjSTUHs0QaXI9xrioHpvsJ9Hs_r0_0 ## Lesson Notes # Token Implementations *SAML (or the WS* space)* - XML based - many encryption and signing options - expressive but you need a pretty advanced XML stack *Simple Web Token* - joint venture between Microsoft, Google, Yahoo - created as a direct reaction to making a much simpler version of SAML - to simple, not enough cryptographic options (just symetric) *JWT (JSON Web Tokens)* - the idea is that you are representing the token using JSON (widely supported) - symmetric and asymmetric signatures and encryption - less options/flexibility than SAML but more than SWT - JWT hit the sweet spot and became widely adopted pretty quickly - JWT - an emerging protocol (very close to standardization) # JWT structure A JWT token has 2 parts: - Header: metadata + info about algos / keys used - Claims: Reserved Claims (issuer , audience, issued at, expiration, subject, etc) + Application specific Claims # JWT with Spring Security OAuth *For the Authorization Server:* - we’re defining the JwtAccessTokenConverter bean and the JwtTokenStore - we’re also configuring the endpoint to use the new converter Note that we're using symmetric signing - with a shared signing key. *For the Resource Server:* - we should define the converter here as well, using the same signing key Note that here, we don’t have to because we’re actually sharing the same Spring context in this case. If the Authorization Server would have been a separate app - then we would have needed this converter, configured exactly the same as in the Resource Server. To learn more about REST Security and how to properly implement OAUth2 and JWT within a Spring API, check out the full course: http://youtube.restwithspring.com Enjoy.
Views: 122071 Baeldung
Generating a refresh token for YouTube API calls using the OAuth playground
 
04:02
This tutorial demonstrates the steps it takes to generate a long-lived refresh token for your client ID/client secret pair using the OAuth 2.0 playground. This technique is useful for testing or for uncommon scenarios where you may need to generate a long-lived refresh token without having to include the 3-legged OAuth flow into your own applications.
Views: 66131 Google Developers
Build a Shopify Web App - Part 2 Get Token
 
33:22
To follow this tutorial, create a shopify partner account(free) Create a test store (installing the app here) Create a app and set some basic info to get the install url. Code: https://github.com/cafeasp/shopifytutorial
Views: 6271 CAFE ASP
Authentication With Refresh Tokens Implementation
 
16:11
I show you an implementation of a authentication workflow that uses refresh tokens. The server is written with Node.js, Express, and uses GraphQL. The frontend is written in React. This uses JWT tokens. Server code: https://github.com/benawad/graphql-express-template/tree/22_advanced_jwt_auth Frontend code: https://github.com/benawad/gello-world/tree/7_advanced_jwt_auth ---- Video Suggestions: Trello: https://trello.com/b/mErpLVj7/todo Join the Trello board: https://trello.com/invite/b/mErpLVj7/99020cac2d3397287640d7d86cb3c09a/todo ---- Follow Me Online Here: Instagram: http://instagram.com/benawad97 Twitter: https://twitter.com/benawad97 Patreon: https://www.patreon.com/benawad ---- Join the Discord: https://discord.gg/Vehs99V
Views: 17713 Ben Awad
11) Cisociall -  Odnoklassniki Api Key and Secret Key
 
03:03
Cisociall - Codeigniter Social Login Management https://codecanyon.net/item/cisociall-codeigniter-social-login-management/20202121 Cisociall is the best solution for user authentication with Social Network Accounts. It is built with CodeIgniter 3.1.5 and HybridAuth 2.9.5 If you have previously authenticated, you cant login with another social account at the same session. When login completed, system, automatically save user datas into the database. User datas can be different for Social Network Providers api policies! ------------------------------------------------------------------------------------------------- In this video we will learn how can we register our application in Odnoklassniki. Then how can we take api key and secret key. After we setup in cisociall and test it.
Storing JWT tokens localStorage vs. Cookies
 
06:54
I talk about some of the pros and cons of storing JWT tokens in localStorage and in Cookies. ---- Watch me live: https://www.twitch.tv/benawad ---- Video Suggestions: Trello: https://trello.com/b/mErpLVj7/todo Join the Trello board: https://trello.com/invite/b/mErpLVj7/99020cac2d3397287640d7d86cb3c09a/todo ---- Follow Me Online Here: Instagram: http://instagram.com/benawad97 Twitter: https://twitter.com/benawad97 Patreon: https://www.patreon.com/benawad ---- Join the Discord: https://discord.gg/Vehs99V
Views: 12692 Ben Awad
RailsConf 2018: The Evolution of Rails Security by Justin Collins
 
37:08
RailsConf 2018: The Evolution of Rails Security by Justin Collins Rails has a reputation for being secure by default, but how deserved is that reputation? Let's take a look back at some of the low points in Rails security history: from the first Rails CVE, to the controversial GitHub mass assignment, the 2013 Rails apocalypse, and more recent remote code execution issues. Then we'll cheer ourselves up with the many cool security features Rails has added over the years! We'll cover auto-escaping, strong parameters, default security headers, secret storage, and less well-known features like per-form CSRF tokens and upcoming Content Security Policy support.
Views: 798 Confreaks
Can You Change the Payload of a JWT Token?
 
04:16
I explain why you can't change the payload of a JWT token. https://jwt.io/ ---- Watch me live: https://www.twitch.tv/benawad ---- Video Suggestions: Trello: https://trello.com/b/mErpLVj7/todo Join the Trello board: https://trello.com/invite/b/mErpLVj7/99020cac2d3397287640d7d86cb3c09a/todo ---- Follow Me Online Here: Instagram: http://instagram.com/benawad97 Twitter: https://twitter.com/benawad97 Patreon: https://www.patreon.com/benawad ---- Join the Discord: https://discord.gg/Vehs99V
Views: 1369 Ben Awad
How to Generate Instagram User ID and Access Token
 
05:34
In this video, you will learn how to generate Instagram User Id and Access Token. This is useful for adding Instagram Image Feed on your blog. Step 1 - Finding Instagram User ID. Step 2 - Creating Instagram Image Feed App. Step 3 - Generating Instagram Access Token. Step 4 - Adding Instagram Widget to Blogger. Step 5 - Setting up Instagram Widget. More Information Available Here - http://support.robinsingh.in/2017/01/instagram-widget.html Please Save the Following content in Text File in order to Generate Instagram User ID and Access Token. --------------------------- Please Fill Up the Following Details After Watching the Above Mentioned Video. 1. Go to - https://codeofaninja.com/tools/find-instagram-user-id Your User ID - 2. Go to - https://www.instagram.com/developer/ Your Blog URL - Your Redirect URI - Your Client ID - 3. Replace [CLIENT_ID_HERE] with Your Client ID and http://localhost with Your Redirect URI https://instagram.com/oauth/authorize/?client_id=[CLIENT_ID_HERE]&redirect_uri=http://localhost&response_type=token 4. Your Access Code - Text File Content Ends here. ----------------------------------------- Thanks for Watching Video and Do not Forget to Subscribe to Our Channel.
Views: 9825 TheBlogCrafter
JSON Web Token (JWT) API Authentication
 
07:31
How to authenticate using a JSON Web Token (JWT) and then using that token to interact with an API. This particular example is interacting with a Laravel application using the excellent Dingo API package. Visit bakerstreetsystems.com for more tutorials on programming, linux servers, information systems tips, and more.
Views: 37507 Jason Jensen
Retrofit Tutorial — OAuth Authentication with GitHub
 
23:00
In this video you'll learn about OAuth authentication and how to implement it a GitHub app with Retrofit. Tip: turn on subtitles to deal with my accent. Find the tutorial for an easy read here: ►https://futurestud.io/tutorials/oauth-2-on-android-with-retrofit ►Retrofit Basic Authentication Video: https://www.youtube.com/watch?v=2n1Q1VYFCrM ►Retrofit Token Authentication Video: https://www.youtube.com/watch?v=by-pChg9_A4 ►Retrofit Form-Urlencoded Video: https://www.youtube.com/watch?v=fHB0yqUEMP4 Watch 20+ Retrofit videos in our playlist here: ►https://www.youtube.com/playlist?list=PLpUMhvC6l7APq7y_FFfK-GEHvcUKqo6SC ---------------------------------------- Our book on Retrofit is also available on leanpub: ►https://leanpub.com/retrofit-love-working-with-apis-on-android ---------------------------------------- Future Studio is helping 5,000+ users daily to solve Android and Node.js problems with 320+ written tutorials and videos. We’re on a mission to provide new in-depth content every week. Checkout 320+ technical in-depth tutorials: ►https://futurestud.io Subscribe for two new videos every week: ►https://www.youtube.com/c/FutureStudio?sub_confirmation=1 ---------------------------------------- Follow us on social media to get updates on new content: ►https://twitter.com/futurestud_io ►https://www.facebook.com/FutureStudioUniversity ►https://plus.google.com/+FutureStudioUniversity ----------------------------------------
Views: 16543 Future Studio
Integrate with GitHub: build after each commit (Get started with Jenkins, part 13)
 
07:35
Integrate Jenkins with GitHub and trigger a build every time you make a commit to GitHub. This is essential for starting to use continuous integration within your project or team! Looking for a cheap server to host your Jenkins installation on? Signup for DigitalOcean and receive $10 free credit: https://m.do.co/c/5ce33a60cf22 Want to learn more? Check out the rest of the Jenkins videos: https://goo.gl/2uE4J5 ► About me 🐦 Follow me on Twitter: https://twitter.com/savjee ✏️ Check out my blog: https://www.savjee.be ✉️ Subscribe to newsletter: https://goo.gl/nueDfz 👍🏻 Like my Facebook page: https://www.facebook.com/savjee
How to Execute Azure REST APIs with Postman
 
07:44
UPDATED: 2 MIN VERSION OF THIS VIDEO HERE: https://youtu.be/fh37VQ3_exk Step-by-step walkthrough that shows you everything you need to do to generate the Azure Active Directory (AAD) Bearer Token needed to call the Azure REST APIs. NOTE: Select "Web app / API" app when creating a new AAD app. The video tells you to select "Native" but that no longer works. Blog: http://blog.jongallant.com/2017/03/azure-active-directory-access-tokens-postman/ Azure REST APIs: https://docs.microsoft.com/en-us/rest/api/ Postman: http://getpostman.com -- Music Credit: Candlepower by Chris Zabriskie is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/...) Source: http://chriszabriskie.com/divider/ Artist: http://chriszabriskie.com/
Views: 27535 Jon Gallant
Web API Kit: OAuth - Connecting to LinkedIn - Part 1
 
13:20
Web API Kit: OAuth - Connecting to LinkedIn - Part 1
Views: 3116 haptixgames
How To Generate and Use API Keys for OneDrive
 
02:19
Get Plugin- http://bit.ly/2QULlF9 This video will tell you how to generate and use OneDrive client ID and drive client secret for 'Backup Restore your Wordpress via OneDrive' configuration page. This is an all-in-one solution on backup restore, clone for your WordPress via OneDrive. It is a complete solution for backup, restore and cloning. This plugin helps to handle in a secured, easy and reliable way to scheduled or on-demand basis. As you may know, cloning can be useful for configuring WordPress, installing themes, multiple plugins and many more. This also satisfies with OneDrive is safe for storing data which you simply don’t want to get misplaced. You can surely, access to files which are offline also via OneDrive. How does it work? 1. For better and safe backup restore, clone for WordPress via OneDrive, you need to first go to WordPress Site for backup. 2. There you will find two peripherals like local server and OneDrive. 3. You can now easily create the backup of the WordPress from the address you had installed. 4. From there, you can restore the information/file/folder for future use. For Documentation- http://bit.ly/2QXdZ8S
Views: 1457 MakeWebBetter
How to get Azure API credentials - Client ID, Client Secret, Tenant ID and Subscription ID
 
02:40
Inkoop is a web development consultancy company based in bangalore, please visit our website https://www.inkoop.in for more information. We like to work on challenging backend problems!
QuickBooks API & OAuth2
 
11:34
http://minimul.com/access-the-quickbooks-online-api-with-oauth2.html
Views: 4787 Christian Pelczarski
RailsConf 2017: The Secret Life of SQL: How to Optimize Database Performance by Bryana Knight
 
25:02
RailsConf 2017: The Secret Life of SQL: How to Optimize Database Performance by Bryana Knight There are a lot of database index and query best practices that sometimes aren't best practices at all. Need all users created this year? No problem! Slap an index over created_at! What about this year's active OR pending users, sorted by username? Are we still covered index-wise? Is the query as fast with 20 million users? Common rules of thumb for indexing and query crafting aren’t black and white. We'll discuss how to track down these exceptional cases and walk through some real examples. You'll leave so well equipped to improve performance, you won't be able to optimize fast enough!
Views: 2692 Confreaks
Obtaining a developer key for the YouTube Data API v3 and the Analytics API
 
03:35
This tutorial demonstrates how to create a project in the Google API console and enable the YouTube Data and Analytics APIs for use with the YouTube API sample code. This tutorial covers both creating a Simple API key as well as an OAuth 2.0 client ID and client secret.
Views: 332838 Google Developers
Vault in the Real World: Let’s Encrypt, Chef Vault and More
 
25:09
Grant Joy, Senior DevOps Engineer at Distill Networks Distil Network’s Vault cluster design decisions and implementation tactics including: Vault integration with Chef and Chef-Vault for bootstrapping machines. Generating and saving Let’s Encrypt certificates to Vault and tokens with Rails integration and a CLI tool. Building a highly available Vault cluster with Consul behind HAProxy.
Views: 1329 HashiCorp
Get Dribbble API V2 Token Super Easy!
 
03:48
Here is to generate Dribbble token for API V2 By https://mahathemes.com
Views: 60 Maha Themes
RailsConf 2018: Operating Rails in Kubernetes by Kir Shatrov
 
31:56
RailsConf 2018: Operating Rails in Kubernetes by Kir Shatrov Moving from operations powered by scripts like Capistrano to containers orchestrated by Kubernetes requires a shift in practices. We'll talk about things beyond "Getting started with Kubernetes" guides, and cover such aspects of operations as gradual deployments, capacity planning, job workers and their safety, and how cloud environments like Kubernetes drastically change how we solve them. This presentation is about the lessons we learned while migrating hundreds of Rails apps within the organization to Kubernetes.
Views: 1851 Confreaks
Rails and the Facebook API @ Noisebridge by Miša Mаkaröv
 
01:14:16
Facebook API: building an app that likes all your friends posts and share most popular posts that they make Using ruby to build an app that likes all your friends posts and do some simple actions that make your friends feel more attention We will use koala gem and facebook graph api to parse your friends' posts and like them. As well as share some of their popular posts by different criteria. We can teach the app to comment on the posts as well if we have time. If you have fun ideas send them to me.
Views: Spokenvote
Deck the Halls - Demo
 
01:57
Prepare for this year’s holiday season by making a wish list and sharing it with friends. Generate a Secret Santa for all the party attendees and send out invitations too! + Employed Rails API and PostgreSQL database to implement the product search function and friendship association + Applied JSON Web Tokens and RESTful API to build user authentication + Implemented the catalog search function with shop.com's API + Used React/Redux based client application styled with Semantic UI and hand illustrated the background on Photoshop
Views: 67 Yura Choi
Generate google client Id and client secret for accessing various google api services
 
03:59
This video shows how to generate google client Id and client secret for accessing various google api services. Creating ClientId and Slient secret--- https://console.developers.google.com
Views: 4448 Venugopal Ramamurthy
RailsConf 2017: Rails to Phoenix: How Elixir can level-you-up in Rails by Christian Koch
 
31:39
RailsConf 2017: Rails to Phoenix: How Elixir can level-you-up in Rails by Christian Koch Elixir has rapidly developed into a mature language with an ever-growing library of packages that excels at running web apps. And because both Elixir and Phoenix were developed by Ruby / Rails programmers, the ease with which you can learn Elixir as a Ruby developer, is much greater than many other languages. With numerous code examples, this talk will discuss how learning a functional approach to handling web requests can improve what we do every day with Rails. This talk is aimed at people who have some familiarity with Rails but no experience with Elixir is necessary.
Views: 2440 Confreaks
Cross Site Request Forgery - Computerphile
 
09:20
If you don't secure your web forms, one mistaken click could be all it takes for your users to delete their own accounts. Tom Scott explains. http://www.facebook.com/computerphile https://twitter.com/computer_phile More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott Hacking Websites with SQL Injection: http://www.youtube.com/watch?v=_jKylhJtPmI Cracking Websites with Cross Site Scripting: http://www.youtube.com/watch?v=L5l9lSnNMxg This video was filmed and edited by Sean Riley. Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 411515 Computerphile
Generate google Refresh Token for accessing youtube video upload api
 
01:28
This video shows how to generate google Refresh Token for accessing Youtube data api to upload video. Obtaining Refresh Token --------- https://developers.google.com/oauthplayground/
Views: 1554 Venugopal Ramamurthy
How to create Instagram App and get access token
 
01:15
How to create Instagram App and use Client ID and Client Secret to get your followers .. This tutorial is for Adams WordPress Theme http://themeforest.net/item/adams-responsive-retina-wordpress-news-magazine-blog/5736863 .. The Instagram Redirect URL: YOUR_WEBSITE.com/wp-admin/themes.php?page=optionsframework Thanks for Watching
Views: 2186 Oxibug
RailsConf 2018: Automating Empathy: Test Your Docs with Swagger and Apivore by Ariel Caplan
 
41:53
RailsConf 2018: Automating Empathy: Test Your Docs with Swagger and Apivore by Ariel Caplan Ugh, documentation. It's the afterthought of every system, scrambled together in the final days before launch, updated sparingly, generally out of date. What if we could programmatically verify that our API documentation was accurate? What if this helped us build more intuitive APIs by putting our users first? What if documentation came first, and helped us write our code? With Swagger and Apivore as our weapons of choice, we'll write documentation that will make your APIs better, your clients more satisfied, and you happier.
Views: 336 Confreaks
Ruby on Rails 5 - BDD, RSpec and Capybara : Install RSpec and Capybara
 
06:36
http://ytwizard.com/r/5rBfj3 http://ytwizard.com/r/5rBfj3 Ruby on Rails 5 - BDD, RSpec and Capybara Learn behavior-driven development by developing realtime Rails applications
Views: 24 Everything Gaming
RailsConf 2017: Portable Sessions with JSON Web Tokens by Lance Ivy
 
31:50
RailsConf 2017: Portable Sessions with JSON Web Tokens by Lance Ivy Ever wonder why applications use sessions and APIs use tokens? Must there really be a difference? JSON Web Tokens are an emerging standard for portable secure messages. We'll talk briefly about how they're built and how they earn your trust, then dig into some practical examples you can take back and apply to your own majestic monolith or serious services.
Views: 934 Confreaks
easy mass OTP token deployment with privacyIDEA using registration code
 
06:17
In this video you can see, how you can use the registration token to have the user enroll his own token in a secure way, without knowing the administrator any deatils. https://privacyidea.readthedocs.org/en/latest/configuration/tokens/registration.html
Views: 475 privacyIDEA
Mashinky Ep 9: WILD WESTERN RAILWAY - 4th Era HARD MODE! - Let's Play, Gameplay
 
31:57
4th Era has been released! Come along as I explore all the new and wonderful QoL things that have been added, and drive forth into a new era! Join me as I play Mashinky, a transport game inspired by Transport Tycoon and Railroad Tycoon 2, in the making for 7 years! Beautiful graphics, seamless transition between building and "live" mode; it's a challenging and super fun simulation game with TRAINS! Please note: this is the ALPHA version. There may be bugs, and not all content is in the game yet. Buy on Humble (purchase supports me directly!): https://www.humblebundle.com/store/mashinky?partner=katherineofsky Mashinky Discord: https://discord.gg/yEaqkrn A huge thank you to Jan Zeleny for providing me with a game key and creating this wonderful game! Playlist: https://www.youtube.com/playlist?list=PL4o6UvJIdPNpFbKifAjPwnbjecRS8bG7W Support Katherine on Patreon: https://www.patreon.com/katherineofsky PayPal: https://www.paypal.me/katherineofsky Chrono.gg: https://chrono.gg/KatherineOfSky Humble: https://www.humblebundle.com/?partner=katherineofsky Amazon: https://amzn.to/2qvGS08 Discord: https://discord.gg/ybyyaSE Twitter: https://twitter.com/KatherineOfSky Facebook: https://www.facebook.com/katherineofsky/ Check out these other fun series: Factorio Darkstar (MP with Caledorn & Aven!): https://www.youtube.com/watch?v=fMsp7fSLi4I&list=PL4o6UvJIdPNpdw_kpva8-KEf_WCU_VHmG Railway Empire - Crossing the Andes DLC!: https://www.youtube.com/playlist?list=PL4o6UvJIdPNozfnHJRoi6Hjlmt91UFoCR ----------------------------------------------------------- About Mashinky: Mashinky is a brand new transport strategy game from Czech developer Jan Zeleny. Zooming through gorgeous landscapes, utilising a traditional isometric construction mode and mastering a unique board game-like gameplay, you'll find yourself immersed in the task of building your own transport empire. The goal is to create your own transport empire on a procedurally generated map. You must lay tracks on difficult terrain, research and buy new vehicles, manage routes and compete against economic rules to make as much profit as possible by transporting passengers and various cargos. The isometric construction mode is a grid based map where every change of traffic layout is a rewarding puzzle. You can build simple tracks connecting just two stations, or design sophisticated networks using junctions and signals to maximize efficiency and performance. Upgrade industry buildings, stations and depots in various ways, and improve your trains using new engines and special wagons. Each upgrade offers a unique bonus; greater capacity, new processing rules and new cargo types. With the innovative viewing modes, you can ride one of your trains or watch the operation of the network you have built. You can exit construction mode at any time to dive back into the beautiful landscapes and detailing of the 3D world. As EA progresses, we will introduce more eras so in the future, you’ll progress from the Age of Steam through the modern world and into the future. You’ll encounter new industries and vehicles in each era. Villages will grow to become cities, new infrastructure and upgrades will become available. It is up to you how you use these new features to build your transport empire. From humble beginnings, you’ll build a vast transport network using everything from steam power while moving cargo like coal and wood to - will be introduced to the game in the future - maglev supertrains delivering futuristic electronics. Buy on Steam: http://store.steampowered.com/app/598960/Mashinky/ Website: http://mashinky.com/ Twitter: https://twitter.com/JanZeleny85 Facebook: http://www.facebook.com/mashinky/ YouTube: https://www.youtube.com/channel/UCwwrDbF-U21EF3hm4TAb26A #Mashinky
Views: 2406 KatherineOfSky
RailsConf 2016 - The State of Web Security by Mike Milner
 
33:59
Join me for a wild ride through the dizzying highs and terrifying lows of web security in 2015. Take a look at some major breaches of the year, from Top Secret clearances, to medical records, all the way to free beer. We’ll look at how attack trends have changed over the past year and new ways websites are being compromised. We’ve pulled together data from all the sites we protect to show you insights on types and patterns of attacks, and sophistication and origin of the attackers. After the bad, we’ll look at the good - new technologies like U2F and RASP that are helping secure the web.
Views: 554 Confreaks
Your Scripts In My Page - What Could Possibly Go Wrong?
 
28:43
by Ben Stock & Martin Johns & Sebastian Lekies When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages. In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion. Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name & address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages. To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.
Views: 2395 Black Hat
RailsConf 2018: Warden: the building block behind Devise by Leonardo Tegon
 
24:20
RailsConf 2018: Warden: the building block behind Devise by Leonardo Tegon Authentication is one of the most common features of web applications, so it makes sense to have libraries that provide solutions for this problem. You've probably heard of or maybe used Devise: all you have to do is add it to your Gemfile and run a generator, and you have a robust authentication system. Behind the scenes, Devise uses Warden to handle authentication. In this talk, I'll explain what Warden is, why it's useful and how Devise takes advantage of it to build the most popular authentication gem for Rails.
Views: 619 Confreaks
Twilio for Salesforce - SIGNAL 2018
 
22:49
The Twilio for Salesforce app allows you to start sending SMS from Salesforce in less than 10 minutes. Start with pre-built Lightning components and then get the full customizability of Twilio APIs using the REST helper library. Learn how you can use 1:1 messaging, campaigns, and process builder to send personalized communications that connect with the people important to your business.
Views: 273 Twilio
Global Hardware One Time Password (OTP) Token Authentication Market 2014-2018 Size, Trends, Industry
 
00:36
Global Hardware One Time Password (OTP) Token Authentication Market - Trends, Demand, Research, product price, profit, Capacity, Production, Classifications, Applications, Opportunities, Segmentation and Forecast 2014-2018 Complete Report At: http://www.researchbeam.com/global-hardware-one-time-password-otp-token-authentication-2014-2018-market Report Overview: About Hardware One-time Password Token Authentication Hardware OTP authentication is a two-factor authentication solution that enables secure remote network access and digital signature functionality with the help of a physical hardware authenticator or a secure token. Hardware OTP utilizes a separate device or a security token issued to a user to generate a password that acts as a second factor for authentication. There are different types of tokens such as OTP tokens, USB tokens, SIM tokens, and mini tokens. These are required for added security in critical infrastructures and in companies that witness a high level of online activity. Since hardware OTP tokens provide a second layer of secure authentication, it becomes difficult for attackers to hack into a user's system. Even in cases of identity theft, attackers will not be able to cause any harm unless they have access to the secure hardware token. Analysts forecast the Global Hardware One-time Password Token (OTP) Authentication market will grow at a CAGR of 9.96 percent during the period 2014-2018. Covered in this Report This report covers the present scenario and the growth prospects of the Global Hardware OTP Token Authentication market for the period 2014-2018. To calculate the market size, the report considers revenue generated from sales of hardware OTP tokens. It also presents the vendor landscape and a corresponding detailed analysis of the top four vendors in the market. In addition, the report discusses the major drivers that influence the growth of the Global Hardware OTP Token Authentication market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends that are emerging in the market. Key Regions • Americas • EMEA • APAC Key Vendors • Gemanlto N.V. • RSA Security Inc. • SafeNet Inc. • VASCO Data Security International Inc. Other Prominent Vendors • ActivIdentity Corp. • Deepnet Security Ltd. • Entrust Inc. • Gemalto N.V. • ID Control • RSA Security Inc. • SafeNet Technology Ltd. • Symantec Corp. • VASCO Data Security International Inc. • Yubico AB Key Market Driver • Increased Dependence on the Internet for Transactions. • For a full, detailed list, view our report.
Views: 69 Mark Holman
Deploying an OpenFaaS API with Docker Swarm (v1)
 
05:35
This video looks at how to deploy a Serverless API to Digital Ocean with OpenFaaS and Docker Swarm. Repo - https://github.com/testdrivenio/openfass-node-restful-api/tree/v1 Digital Ocean signup - https://m.do.co/c/d8f211a4b4c2 Digital Ocean Access Token - https://www.digitalocean.com/community/tutorials/how-to-use-the-digitalocean-api-v2
Views: 1384 Michael Herman
2FA Implementation Best Practices - SIGNAL 2018
 
36:16
Twilio’s two-factor authentication API, Authy, was launched in 2012 and is now used by Twitch, Gemini, Indeed, SendGrid, Pinterest, VMWare, NameCheap and Transferwise. We’ve learned a lot about how 2FA works in the real world and in this session we will go through our best practices on implementing 2FA into your applications. Do you make 2FA opt-in or mandatory? How do you easily enable 2FA for users? What method is the best? SMS, voice, TOTP, push? How to failover to another method? All these questions and more will be answered.
Views: 477 Twilio
RailsConf 2016 - ...But Doesn't Rails Take Care of Security for Me? by Justin Collins
 
43:17
Rails comes with protection against SQL injection, cross site scripting, and cross site request forgery. It provides strong parameters and encrypted session cookies out of the box. What else is there to worry about? Unfortunately, security does not stop at the well-known vulnerabilities and even the most secure web framework cannot save you from everything. Let's take a deep dive into real world examples of security gone wrong!
Views: 3464 Confreaks