Upload stoyan-stefanov
View 2.932
Download 0
Embed Size (px) 344 x 292 429 x 357 514 x 422 599 x 487
Citation preview
Hacking YSlow
@stoyanstefanov
http://phpied.com
SF WebPerf Meetup Aug 2, 2012
Configuring
Customizing
Extending
Messing
Fiddling
Hacking
Tool -> Platform
Scores
Strike of a genius?
Lucky strike?
Marketing plot?
How come I get an...
Coding horror:
"Yahoo's problems
are not your
problems"
Disagree with scores?
Your own CDN?
Expires not important?
Customize the scores
Customize the rules
New rules
Remove the owner
bottleneck
Lint all the things!
Contribute to the
project
Written in JS
barrier for entry =
!existent
Architecture
1. Peel
2. Lint
3. Show
Running your own
hackable copy
(bookmarklet)
1. Git
2. Build
3. Deploy
4. Install client
1. Git (click)
2. Build (make)
3. Deploy (scp)
(drag)
Hack:
1. customize
2. extend
1. customize YSLOW.registerRuleset()
2. extend YSLOW.registerRule()
Spread:
* send a patch
* BYO
Thanks!
# !@ Ethical Hacking. 2 # !@ Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures
Hacking: Computer Hacking Beginners Guide
GOOGLE HACKING GOOGLE HACKING
Hacking / Hacking Exposed Windows Server 2003: …books.mhprofessional.com/.../products/0072230614/0072230614_ch04.pdfCHAPTER 4 Enumeration 73 Hacking / Hacking Exposed Windows Server
hacking and ethical hacking
Hacking beyond hacking - Forgotten Chapters - DefCamp 2012
SF WebPerf Meetup - Happy 5th Birthday YSlow
Ethical Hacking and Countermeasures - Varutra · Hacking Concepts o Hacking vs. Ethical Hacking o Effects of Hacking on Business o Who Is a Hacker? o Hacker Classes ... Ethical Hacking
Hacking Rapid Share Complete Hacking Process
IN2120: Ethical hacking$ ethical (fun) hacking vs. criminal (boring) hacking $ black hat, white hat and grey hat hacking Ethical hacking $ what to do when finding vulnerabilities?
Hacking: Easy Hacking for Beginners- How to Hack Computers ...index-of.es/Varios-2/Hacking Easy Hacking for Beginners.pdf · most dangerous aspect of hacking is that it doesn’t
Hacking Systems, Hacking Values: Interactive Theories For
HACKING AND WAYS TO PREVENT HACKING
HACKING AUTHENTICATION CHECKS IN WEB … · INDEX •Hacking Authentication Checks in Web Applications Hacking Application Designs Hacking J2EE Container Managed Authentication Hacking
Hacking Wireless World, RFID hacking
A Hacking Atlas: Holistic Hacking in the Urban Theater€¦ · of hacking and holistic hacking, and hacking spaces (and seven types of hacking spaces, each described below) are introduced
Hacking for Dummies - index-of.co.ukindex-of.co.uk/Hacking/Hacking For Dummies/Hacking For Dummies 5.pdf · Hacking for Dummies (Access to other peoples systems made simple – &
Using Firebug & YSlow
Hacking and Anti Hacking
Hacking( Full hacking guide for beginners)
Ethical Hacking Module XV Hacking Wireless Networks
Hacking Training - flane.de · Infrastructure Hacking Web Hacking The Art of Hacking 75% reales Hacking und praktisches Training in unserem Advanced “Hack-Lab” Entwickelt von
Hacking Windows OS - infosectoday.cominfosectoday.com/.../Hacking-Windows.pdf · 1 Chapter 1 Hacking Windows OS Introduction The.word.hacker.has.both.positive.and.negative.connotations.depending.on.who.you.talk.to.and
BlackHat Hacking - Hacking VoIP
Growth Hacking Academy - Growth Hacking Course Launch
Ethical Hacking v10 Module 20 - IoT Hacking
A Hacking Atlas: Holistic Hacking in the Urban Theater · 2018-12-05 · of hacking and holistic hacking, and hacking spaces (and seven types of hacking spaces, each described below)
Hacking CT Hacking for Diplomacy week 8
Career Hacking: Episode 1 - Resume Hacking