Web Application Security | Report
VerifiedAdded on 2022/09/09
|56
|2314
|9
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/6d9a7fc2-19ab-43d4-99f1-d94cdb4f32cf-page-1.webp)
Web Application Security
[Type the document subtitle]
[Pick the date]
[Type the company name]
[Type the document subtitle]
[Pick the date]
[Type the company name]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/3eedb8cf-9876-403b-8706-312046e23b51-page-2.webp)
Setup
WampServer
In this assignment, we set up the wamp server. In the above, we can see the installation of a wamp
server.
2 | P a g e
WampServer
In this assignment, we set up the wamp server. In the above, we can see the installation of a wamp
server.
2 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/1b24c247-9296-4db1-a1e3-7dee6aa4f955-page-3.webp)
Choose I accept the agreement option and then click next
3 | P a g e
3 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/23380b8e-659f-4c58-b5b2-a5b46b5da1d6-page-4.webp)
Click on next option
4 | P a g e
4 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/4fbb6fed-c09b-45cb-aa46-1488866076ee-page-5.webp)
Click on allow access button
Click on the install button
5 | P a g e
Click on the install button
5 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/80e79491-a8c2-4cd7-9ec9-05e2b93a2a05-page-6.webp)
Click on next button, we can see sever name localhost
6 | P a g e
6 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/fc66e1af-2f36-4729-b098-2e577e1bdb6f-page-7.webp)
Click on the finish button
7 | P a g e
7 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/cda04627-d1af-4698-84f2-eb246232b995-page-8.webp)
After install wamp, we can see testing of wamp server
8 | P a g e
8 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/00311df3-b5c4-49cd-b5ee-b37facd90bc9-page-9.webp)
MySql
In above, we can see the installation of MySQL database
9 | P a g e
In above, we can see the installation of MySQL database
9 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/2abb9802-eebe-4798-a735-eaf3763cf1ef-page-10.webp)
Select the default option and click on next button
10 | P a g e
10 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/6545a4dc-eceb-4013-92b6-ba4b1c9cb41a-page-11.webp)
Click on the install button
11 | P a g e
11 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/9fd60dab-5503-4a36-973d-52bfaedbf384-page-12.webp)
Click on next button
12 | P a g e
12 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/c9e2cab5-431f-4c16-8662-e2796d9f2791-page-13.webp)
Click on the finish button
13 | P a g e
13 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/b872c2ff-54be-4ce5-bd6d-d9eed11cd567-page-14.webp)
Click on next button
14 | P a g e
14 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/e9b19f0e-a8d2-4a52-b567-64d96c3fa18c-page-15.webp)
Keep default option and click on next button
15 | P a g e
15 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/2d561be0-30d7-4d03-bf16-99c2651cd320-page-16.webp)
Keep default option and click on next button
16 | P a g e
16 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/b6cb4154-d414-4e8b-9ec3-183007faf54b-page-17.webp)
Keep default option and click on next button
17 | P a g e
17 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/24c40b3e-adf2-4081-9ad5-81a64a63207b-page-18.webp)
Keep default option and click on next button
18 | P a g e
18 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/e9cd831f-753e-4ac7-ac6d-f49d631780fd-page-19.webp)
Keep default option and click on next button
19 | P a g e
19 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/c450d625-cf9f-4d30-93a7-8edc27211f5b-page-20.webp)
Keep default option and click on next button
20 | P a g e
20 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/294c7bbd-3d26-4e20-890b-0583b572cee6-page-21.webp)
I have updated port here
21 | P a g e
21 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/0a5c5974-cbb8-4458-9918-886c1253e0de-page-22.webp)
Keep default option and click on next button
22 | P a g e
22 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/074591c3-f2ac-46ad-be8e-3e0e0524eb35-page-23.webp)
Keep default option and click on next button
23 | P a g e
23 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/9e0de6a8-7d06-4685-bd77-4657bb808816-page-24.webp)
Enter the password and click on next
24 | P a g e
24 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/9bfd67d5-67dd-4bdc-a98b-daea67a4a0c2-page-25.webp)
Click on execute button
25 | P a g e
25 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/53a8069d-e853-4f69-b15a-4e2642668cf9-page-26.webp)
After complete click on the finish button
26 | P a g e
26 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/bb9ab046-d029-4ff8-b473-6d8ba6fc2e70-page-27.webp)
Test MySQL database
Install a GUI tool
27 | P a g e
Install a GUI tool
27 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/d5b1af03-7cca-45b7-bae3-f4c941e28e1c-page-28.webp)
Click on next button
28 | P a g e
28 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/7c32ee12-1f86-450d-ae4b-0cc12af58c2b-page-29.webp)
Keep default option and click on next button
29 | P a g e
29 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/7066c876-f3e0-4f34-9671-b9fa66eb7130-page-30.webp)
Keep default option and click on next button
30 | P a g e
30 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/c6a0934e-782f-43cd-84a1-7dda71a620bc-page-31.webp)
Keep default option and click on next button
31 | P a g e
31 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/ce974843-6d89-46b5-8886-6b4c0f71dca7-page-32.webp)
32 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/ca082f5a-b19c-4d47-b750-73a4c3739c92-page-33.webp)
OWASP MUTILIDAE
Here we can see the software folder of mutillidae
33 | P a g e
Here we can see the software folder of mutillidae
33 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/0a005791-dd76-4a33-b414-b00995d452ec-page-34.webp)
After running PHP and run mutillidae
34 | P a g e
34 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/f4d83777-348c-44c3-a1b9-68e91a5720f1-page-35.webp)
(Jeremy Druin 2013)
35 | P a g e
35 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/847a979b-2137-42d4-a302-cf74493fefe4-page-36.webp)
Nmap
In above, we can see the port scanning by Nmap
36 | P a g e
In above, we can see the port scanning by Nmap
36 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/33d7864e-2e0b-47e5-ba65-dd9f855abaf9-page-37.webp)
Wireshark
In above, we can see packet tracer for mutillidae using Wireshark(Fischer Werner 2017)
37 | P a g e
In above, we can see packet tracer for mutillidae using Wireshark(Fischer Werner 2017)
37 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/f259bcc3-b0c4-4a0d-8368-38281bdea939-page-38.webp)
In above, we can see the IO graph which shows the graph again all input and output
38 | P a g e
38 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/dd93770c-4e6a-4ea1-8197-c5dc9df35070-page-39.webp)
Throughput
Here, we can see the throughput or bandwidth
39 | P a g e
Here, we can see the throughput or bandwidth
39 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/fdc87a23-b8e4-4933-b23a-4fcf396340dd-page-40.webp)
Window scaling
Windows scaling shows the size vs time. It helps to determine the bandwidth of the site
40 | P a g e
Windows scaling shows the size vs time. It helps to determine the bandwidth of the site
40 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/08fe7300-9865-4547-93af-4d8e3ca65d6e-page-41.webp)
SQL Injection
41 | P a g e
41 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/5aedc333-2ae5-44c5-ae4d-bc698e572a71-page-42.webp)
42 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/7d2c2f61-9250-4559-9a6e-6df8036a3ba0-page-43.webp)
43 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/37edab64-b7cc-4fa3-aa18-28ed9ade3fb5-page-44.webp)
44 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/e38b4761-8a12-48bd-be53-d1ece285833c-page-45.webp)
45 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/07eb90ab-46a0-4f07-8e79-b4cc4733b315-page-46.webp)
46 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/49029644-ea69-4126-9e63-38ee73049cae-page-47.webp)
sqlmap Injection
47 | P a g e
47 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/6fc06450-6912-48f1-9e62-5328cf9a7523-page-48.webp)
Perform again
48 | P a g e
48 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/557607a8-58fb-4fb1-a7f3-21d0e75dcb9e-page-49.webp)
49 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/2be64b63-ce6d-42b7-aadb-787c0456d4a4-page-50.webp)
50 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/cc165485-f151-4638-9cac-f63155cf4051-page-51.webp)
51 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/804f59ee-faa7-428c-a004-0039afdb3cda-page-52.webp)
(Xiao L. 2016)
52 | P a g e
52 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/ae3ac7a6-497d-4f54-8a11-a56abde59b05-page-53.webp)
Web Application Security Model
Firewall
A firewall is one of the security systems used to restrict unauthorized users to use the private network.
Firewall we can set in the form of software as well hardware form or we can make the combination of
both. This system restricts unauthorized users especially from using the intranet (Smriti Er 2014). The
entire message transferring in the intranet will go via the firewall. It checked all the messages against
the security criteria and pass if and only if it passes all the criteria.
Following are some types of firewalls:
1. Packet Filtering: data transmission is done in the form of packets. Every packet is examined by
this packet filtering.
2. Circuit-level gateway implementation: By establishing a TCP or UDP connection, this process
applies security mechanisms.
3. Acting as a proxy server: for hiding the true network address we use a proxy server. By
connecting to the internet this proxy server requests for pages. It also established a connection
with the servers. It also receives the data for the computers which are hidden behind this
computer. This proxy server only allowed the specific type of traffic to pass through it like HTTP
files or web pages etc. If we use this proxy server then it slows down the performance of the
network which is the drawback of the proxy server.
IDS and IPS System:
IPS and IDS both are the unbreakable part of the infrastructure of the network. Both are used as the
security system. The IDS is the abbreviation used for the Intrusion detection system and IPS is the
abbreviation used for the Intrusion prevention system (Daş R 2017). IPS System is used to restrict the
traffic of the network depending on the security profile. This security system helps in detecting various
risks that can damage our system.
53 | P a g e
Firewall
A firewall is one of the security systems used to restrict unauthorized users to use the private network.
Firewall we can set in the form of software as well hardware form or we can make the combination of
both. This system restricts unauthorized users especially from using the intranet (Smriti Er 2014). The
entire message transferring in the intranet will go via the firewall. It checked all the messages against
the security criteria and pass if and only if it passes all the criteria.
Following are some types of firewalls:
1. Packet Filtering: data transmission is done in the form of packets. Every packet is examined by
this packet filtering.
2. Circuit-level gateway implementation: By establishing a TCP or UDP connection, this process
applies security mechanisms.
3. Acting as a proxy server: for hiding the true network address we use a proxy server. By
connecting to the internet this proxy server requests for pages. It also established a connection
with the servers. It also receives the data for the computers which are hidden behind this
computer. This proxy server only allowed the specific type of traffic to pass through it like HTTP
files or web pages etc. If we use this proxy server then it slows down the performance of the
network which is the drawback of the proxy server.
IDS and IPS System:
IPS and IDS both are the unbreakable part of the infrastructure of the network. Both are used as the
security system. The IDS is the abbreviation used for the Intrusion detection system and IPS is the
abbreviation used for the Intrusion prevention system (Daş R 2017). IPS System is used to restrict the
traffic of the network depending on the security profile. This security system helps in detecting various
risks that can damage our system.
53 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/075a34e9-1f7d-41b2-b12e-5476b0bbd0f8-page-54.webp)
Intrusion Detection Systems (IDS):
This system is used for monitoring and analyzing our network from the cyber threats that can steal your
data from the network. For securing our system from different threats this system uses different polices
like post scanners (Corona IAriu 2009). Intrusion Prevention Systems (IPS): this is the same system is
used in the firewall.
Encryption
Encryption is nothing but the conversion of data into the coding language is known as Encryption
(Mirtalebi Arezoo 2016). This is an excellent way to secure or application. For accessing the
encrypted file we require passwords and keys for decrypting the file. Only After decrypting the file
we can access it (Andreolini 2007).
54 | P a g e
This system is used for monitoring and analyzing our network from the cyber threats that can steal your
data from the network. For securing our system from different threats this system uses different polices
like post scanners (Corona IAriu 2009). Intrusion Prevention Systems (IPS): this is the same system is
used in the firewall.
Encryption
Encryption is nothing but the conversion of data into the coding language is known as Encryption
(Mirtalebi Arezoo 2016). This is an excellent way to secure or application. For accessing the
encrypted file we require passwords and keys for decrypting the file. Only After decrypting the file
we can access it (Andreolini 2007).
54 | P a g e
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/aa8269c1-d694-4271-b03b-dbc55cdbe05d-page-55.webp)
Introduction
The internet is dangerous! We pay particular attention to websites that refuse to attack or display
information. (Often harmful) In other cases on their website, email, passwords & credit card details will
appear in the public domain, making web users uncomfortable and financially secure. The main goal of
website security is to protect the site from kind of attack (anywhere) and protects a website from being
accessed, used, changed, broken or stopped (Singh A. K. 2012). Successful website security requires
website design efforts: your application, website server optimization, and strategy for updating &
creating passwords and client IDs. It's all good. Of course, if a server-side communication platform is
used, it is a powerful and reliable protection mechanism for common attacks, and other attacks can be
mitigated by updating the web server (e.g. via HTTPS) and eventually installing a scanner.
Critical evolution
Today, the Web app is a popular platform for website data and services. Websites become more popular
and invasive once they become familiar with the use of important services. Although many technologies
have been developed to increase the efficiency of web applications and reduce attacks, very little work
has been done to create links between technologies & to create large images of security investigations
(Daş R. 2015). First, we want to introduce an aspect of development that poses the challenge of
developing applications with security. We will discuss the three types of transactions commonly used in
web applications: poor access control, poor session management, logic detection, and the simplicity that
leads to these errors. Through these two levels, we use existing technologies: the risks they face &
security risks. These steps include creating a new web application, analyzing/testing the security of the
old application, and traditional web publishing security.
55 | P a g e
The internet is dangerous! We pay particular attention to websites that refuse to attack or display
information. (Often harmful) In other cases on their website, email, passwords & credit card details will
appear in the public domain, making web users uncomfortable and financially secure. The main goal of
website security is to protect the site from kind of attack (anywhere) and protects a website from being
accessed, used, changed, broken or stopped (Singh A. K. 2012). Successful website security requires
website design efforts: your application, website server optimization, and strategy for updating &
creating passwords and client IDs. It's all good. Of course, if a server-side communication platform is
used, it is a powerful and reliable protection mechanism for common attacks, and other attacks can be
mitigated by updating the web server (e.g. via HTTPS) and eventually installing a scanner.
Critical evolution
Today, the Web app is a popular platform for website data and services. Websites become more popular
and invasive once they become familiar with the use of important services. Although many technologies
have been developed to increase the efficiency of web applications and reduce attacks, very little work
has been done to create links between technologies & to create large images of security investigations
(Daş R. 2015). First, we want to introduce an aspect of development that poses the challenge of
developing applications with security. We will discuss the three types of transactions commonly used in
web applications: poor access control, poor session management, logic detection, and the simplicity that
leads to these errors. Through these two levels, we use existing technologies: the risks they face &
security risks. These steps include creating a new web application, analyzing/testing the security of the
old application, and traditional web publishing security.
55 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/web-application-security-report/2024/09/28/25e2f7a3-db1d-490a-9eca-94d60c91111d-page-56.webp)
Comparison Critical evaluation and comparison
Critical evaluation includes design and usability of the website and also includes creating a new web
application, analyzing/testing the security of the old application, and traditional web publishing security.
The account must have the necessary privileges required to operate: do not link to database MySQL as
root, usually not required
It is weak security vulnerability. When it is a single control, it never fails, and it uses open source controls
and recognizes that the weaknesses of the rules are neither secret nor missing.
In terms of security, the financial system is less aggressive (both large and complex).
we do not rely on external communication services
Specify a secure security example (for example, mental health consent): The password can be set by
default and the user can opt-out.
This will use the taint scanning mechanism which is explicit.
For securing web servers we can add rules for firewalls for establishing new connections with the
internal system and external websites.
This will check the files or filenames which are supplied by the users.
Try to secure or hide your private object referencing from the users as and when possible.
Make use of an "accept known good “and validate the private object referencing extensively.
For all the referenced objects we need to verify the authorization.
56 | P a g e
Critical evaluation includes design and usability of the website and also includes creating a new web
application, analyzing/testing the security of the old application, and traditional web publishing security.
The account must have the necessary privileges required to operate: do not link to database MySQL as
root, usually not required
It is weak security vulnerability. When it is a single control, it never fails, and it uses open source controls
and recognizes that the weaknesses of the rules are neither secret nor missing.
In terms of security, the financial system is less aggressive (both large and complex).
we do not rely on external communication services
Specify a secure security example (for example, mental health consent): The password can be set by
default and the user can opt-out.
This will use the taint scanning mechanism which is explicit.
For securing web servers we can add rules for firewalls for establishing new connections with the
internal system and external websites.
This will check the files or filenames which are supplied by the users.
Try to secure or hide your private object referencing from the users as and when possible.
Make use of an "accept known good “and validate the private object referencing extensively.
For all the referenced objects we need to verify the authorization.
56 | P a g e
1 out of 56
![[object Object]](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.