Saturday, March 21, 2015

History of HTTP - HTTP/2: Is it the next HTTP?

The Hypertext Transfer Protocol(HTTP) is the underlying request-response protocol used by theWorld Wide Web. The first documented version of HTTP, HTTP/0.9, appeared in 1991. Then, 1996 saw the introduction of HTTP/1.0, quickly followed byHTTP/1.1 in January 1997. Further improvements and updates were released in 1999; this is the version of HTTP most commonly used today.

A big difference between HTTP/1.0 and HTTP/1.1 is that the latter can reuse a connection multiple times to download page content, making load times a lot quicker, as there is no need to establish a new connection for each page resource. The need for ever-quicker content delivery times in today's connected, bandwidth-intensive, mobile world, though, means HTTP/1.1 is no longer deemed fast nor efficient enough.

The Internet Engineering Task Force is responsible for developing and promoting voluntary Internet standards, and it is close to finalizing and making HTTP/2 a formal Internet specification. HTTP/2 is primarily focused on improving the time it takes to render a page; it allows servers to send all the different elements of a requested webpage at once, eliminating the serial sets of messages that still have to be sent back and forth with HTTP/1.1. It also allows the server and the browser to compress HTTP content, reducing the volume of data that needs to be sent, and reducing the number of network roundtrips required to render a page.

HTTP/2 is based largely on the SPDY protocol developed by Google, which can reduce the time it takes to deliver a webpage by 50% or more. High-volume sites such as Google, Facebook and Twitter already use the SPDY protocol. Google's ads are also served from SPDY-enabled servers, but it is currently only used by 1% of all websites, according to W3techs. Chrome, Safari, Firefox, Opera, Amazon Silk and Internet Explorer browsers already support SPDY.

HTTP/2 is not a ground-up rewrite of the protocol, so it supports the same semantics as HTTP/1.1. This means the code of enterprise Web applications won't need updating to benefit from the new protocol, only client and server software will. However, note that servers will be fielding many more requests, as clients can send requests more quickly, so caching and load-balancing services may need upgrading due to the need to commit more resources to each connection.

HTTP/2 provides an effective compression algorithm that is tailored to HTTP and avoids many of the security issues with using general purpose compression algorithms over TLS connections. Some concerns have been raised about a possible distributed denial-of-service attack vector because attackers could find ways to abuse the new method for handling header content if browser and software vendors fail to interpret and implement the protocol correctly. However, note that there are implementation risks with any new protocol. Web security gateways may need their rules and filters updated to handle the larger amount of data that will be within the headers received when users on the internal network request content from a website.

Those organizations that run highly visible websites should start trialing Google's SPYD module for Apache so that they can assess the likely effects of HTTP/2 on their own infrastructure once it's officially formalized later this month. As with any new technology or protocol, IT teams should follow the relevant security forums to stay abreast of any developments, as well as pick up tips of how others are integrating it into their environment.


Friday, March 20, 2015

أجمل عرس شيشاني و شركسي فعلا رأيته جداً راقي و معبّر - #مكة #أمينة

File sent from WD My Cloud™
WDMyCloud

IconЭлина Муртазова_ Рамзан и Амина -Нохчийн Ловзар- 2014 [360p].mp421.6 MBDownload
Learn More Personal Cloud Storage
Save Everything. Access Anywhere.

Copyright © 2015 Western Digital Technologies, Inc.
All Rights Reserved. Trademarks |  Privacy |  Contact WD
Twitter Facebook LinkedIn
Absolutely


Sent from my iPadc

Tell me Why, We have to be like this!

File sent from WD My Cloud™
WDMyCloud

Iconالطفل الذي ابكى العالم.mp47.9 MBDownload
Learn More Personal Cloud Storage
Save Everything. Access Anywhere.

Copyright © 2015 Western Digital Technologies, Inc.
All Rights Reserved. Trademarks |  Privacy |  Contact WD
Twitter Facebook LinkedIn
Absolutely


Sent from my iPadc

Thursday, March 19, 2015

UAE is top-two victim of regional cyber attacks




The UAE is the second most attacked country online in the Middle East, according to study by Kaspersky Lab.
Speaking today at a conference to announce the launch of Kaspersky Total Security - multi-device, Mohammad Amin Hasbini, senior security researcher, Global Research and Analysis Team (GReAT), Kaspersky Lab Middle East, Turkey and Africa, highlighted the issue of cybercrime and bullying and added that the UAE is the 15th most attacked country worldwide.
According to the study conducted by Kaspersky lab and B2B international in the UAE, 40% of parents said they are worried about cyberbullying, and 48% reported to have intervened to protect their child from being cyberbullied. Another study called "children online" found that more than half of young users in the UAE encountered adult content; over 22% landed on websites dedicated to gambling; and every sixth user stumbled across sites featuring weapons.
Dr. Samineh Shaheem, Assistant Professor of Psychology and founder of "Bolt down on bullying" campaign, said: "Our children are exposed to so much content online, the internet has many wonderful benefits but there are issues and concerns which we can't turn a blind eye to. Previously when we didn't have the internet we thought our children we safe at home but now with a device in their hand they have access to an entire world that might be dangerous." 

The recent research shows an average household now has more than five connected devices and it is not just children who are at risk. Early this year, Kaspersky Lab experts alerted users about malware delivered through politically-oriented news or social networking forums using social engineering tactics to gain full access and control over the victim's devices and files.
Users should also be aware of threats aimed at exploiting mobile gamers, for instance, the popular "Gomal Trojan" was known to be camouflaged as an innocent game of tic-tac-toe. The game carried within it spyware functionality to record sounds, process calls and steal SMS information. With 92% of users in the UAE reported to trust their computers and smartphones to store both corporate, personal and financial data, the malware could easily lead to financial or identity theft.
Ovanes Mikhailov, managing director, Kaspersky Lab Middle East said: "Families today need mutli-platform solutions that integrate a full range of features and tools that allow them to provide comprehensive protection from all these vulnerabilities without the hassle of managing and operating disparate, individual consoles. Kaspersky Total Security - multi-device can help protect not just their information but also safeguard their children.
"The solution enables comprehensive, multi layered protection across a range of devices allowing real time protection and monitoring of the cyber landscape and related cyber activity. To help parents better protect their children the solution comes with a parental control feature that can limit the number of hours children spend online in addition to monitoring activity online and on social media platforms,"