Configure Webserver & SSL secure & redirect in SuSE Linux Enterprise
Hacking a WebSite & Secure WebServer Techniques Used
-
Upload
siddharth-bhattacharya -
Category
Documents
-
view
121 -
download
7
description
Transcript of Hacking a WebSite & Secure WebServer Techniques Used
![Page 1: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/1.jpg)
Hacking a WebSite & Secure WebServer Techniques used
Group-2:RollNo 6-10.
Setu BehalSiddharth Bhattacharya
![Page 2: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/2.jpg)
A chain is only as strong as its weakest link.
![Page 3: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/3.jpg)
As the old Jungle saying goes …
Half knowledge is Dangerous.
![Page 4: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/4.jpg)
![Page 5: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/5.jpg)
Insight into PracticalWeb-Server Security Issues
![Page 6: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/6.jpg)
![Page 7: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/7.jpg)
![Page 8: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/8.jpg)
![Page 9: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/9.jpg)
![Page 10: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/10.jpg)
![Page 11: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/11.jpg)
![Page 12: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/12.jpg)
![Page 13: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/13.jpg)
![Page 14: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/14.jpg)
![Page 15: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/15.jpg)
![Page 16: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/16.jpg)
![Page 17: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/17.jpg)
![Page 18: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/18.jpg)
![Page 19: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/19.jpg)
![Page 20: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/20.jpg)
![Page 21: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/21.jpg)
![Page 22: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/22.jpg)
![Page 23: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/23.jpg)
![Page 24: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/24.jpg)
![Page 25: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/25.jpg)
![Page 26: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/26.jpg)
![Page 27: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/27.jpg)
![Page 28: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/28.jpg)
![Page 29: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/29.jpg)
![Page 30: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/30.jpg)
![Page 31: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/31.jpg)
![Page 32: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/32.jpg)
![Page 33: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/33.jpg)
![Page 34: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/34.jpg)
![Page 35: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/35.jpg)
![Page 36: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/36.jpg)
![Page 37: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/37.jpg)
![Page 38: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/38.jpg)
![Page 39: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/39.jpg)
![Page 40: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/40.jpg)
![Page 41: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/41.jpg)
![Page 42: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/42.jpg)
![Page 43: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/43.jpg)
![Page 44: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/44.jpg)
![Page 45: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/45.jpg)
CACHE Poisoning
![Page 46: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/46.jpg)
![Page 47: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/47.jpg)
![Page 48: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/48.jpg)
![Page 49: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/49.jpg)
![Page 50: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/50.jpg)
![Page 51: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/51.jpg)
![Page 52: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/52.jpg)
![Page 53: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/53.jpg)
![Page 54: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/54.jpg)
![Page 55: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/55.jpg)
![Page 56: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/56.jpg)
![Page 57: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/57.jpg)
![Page 58: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/58.jpg)
![Page 59: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/59.jpg)
![Page 60: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/60.jpg)
![Page 61: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/61.jpg)
![Page 62: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/62.jpg)
Vulnerabilities of Windows Systems
• 1.Internet Information Services (IIS) • 2.Microsoft Data Access Components (MDAC) -Remote
Data Services • 3.Microsoft SQL Server • 4.NETBIOS -Unprotected Windows Networking Shares • 5.Anonymous Logon -Null Sessions • 6.LAN Manager Authentication -Weak LM Hashing • 7.General Windows Authentication - Accounts with No
Passwords or Weak Passwords • 8.Internet Explorer • 9.Remote Registry Access • 10.Windows Scripting Host
![Page 63: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/63.jpg)
Vulnerabilities of Unix Systems
• 1.Remote Procedure Calls (RPC) • 2.Apache Web Server • 3.Secure Shell (SSH) • 4.Simple Network Management Protocol (SNMP) • 5.File Transfer Protocol (FTP) • 6.R-Services -Trust Relationships • 7.Line Printer Daemon (LPD) • 8.Sendmail• 9.BIND/DNS • 10.General Unix Authentication -Accounts with No
Passwords or Weak Passwords
![Page 64: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/64.jpg)
![Page 65: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/65.jpg)
![Page 66: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/66.jpg)
![Page 67: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/67.jpg)
![Page 68: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/68.jpg)
![Page 69: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/69.jpg)
![Page 70: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/70.jpg)
![Page 71: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/71.jpg)
![Page 72: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/72.jpg)
![Page 73: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/73.jpg)
Hacking as perceived fromManagement’s Perspective
![Page 74: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/74.jpg)
![Page 75: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/75.jpg)
![Page 76: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/76.jpg)
Hacking ISP DNS
![Page 77: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/77.jpg)
![Page 78: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/78.jpg)
![Page 79: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/79.jpg)
![Page 80: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/80.jpg)
![Page 81: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/81.jpg)
![Page 82: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/82.jpg)
![Page 83: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/83.jpg)
![Page 84: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/84.jpg)
![Page 85: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/85.jpg)
![Page 86: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/86.jpg)
![Page 87: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/87.jpg)
![Page 88: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/88.jpg)
![Page 89: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/89.jpg)
![Page 90: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/90.jpg)
![Page 91: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/91.jpg)
SecurityBest
Paractices[Management-Perspective]
![Page 92: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/92.jpg)
![Page 93: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/93.jpg)
![Page 94: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/94.jpg)
![Page 95: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/95.jpg)
![Page 96: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/96.jpg)
![Page 97: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/97.jpg)
![Page 98: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/98.jpg)
![Page 99: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/99.jpg)
![Page 100: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/100.jpg)
![Page 101: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/101.jpg)
![Page 102: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/102.jpg)
![Page 103: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/103.jpg)
![Page 104: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/104.jpg)
![Page 105: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/105.jpg)
![Page 106: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/106.jpg)
![Page 107: Hacking a WebSite & Secure WebServer Techniques Used](https://reader038.fdocuments.net/reader038/viewer/2022102721/546654a9b4af9f833e8b4750/html5/thumbnails/107.jpg)
Thankyou !!!
• Any Questions ?