Quantcast
Channel: Radical Development » Security
Browsing all 103 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Attacking A Database With SQL Ninja

I find it absolutely amazing the SQL injection is still a large problem when it comes to application security.  The fact is this type of injection attack is not overly difficult to mitigate, rather the...

View Article



Image may be NSFW.
Clik here to view.

Disk Encryption In Mac OSX Lion Using FireVault

I thought it was time to write about disk encryption and this article is of course focused on FireVault that is ships with Mac OSX Lion.  Face it data is golden and in the wrong hands it can very...

View Article

Image may be NSFW.
Clik here to view.

Establishing A Digital Forensics Lab

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to...

View Article

Image may be NSFW.
Clik here to view.

Mobile Digital Forensics Challenges

The world of digital forensics has experienced transformation in recent years. With the mobile landscape changing with each passing day, it is critical that the forensics field adapt promptly to all...

View Article

Image may be NSFW.
Clik here to view.

Business Contingency Operations

The idea of a Business Contingency Plan (BCP) is the act of preparation and adapting to any contingency either manmade or natural. Examples include hurricanes, earthquakes, sabotage, and even war. Upon...

View Article


Image may be NSFW.
Clik here to view.

Password Rant Redux

Today I ran across the video on Youtube title Password Rant and All that I can say to the individual in the video is to be careful what you ask for. There is very good reason to require a strong...

View Article

Image may be NSFW.
Clik here to view.

Organized Cyber Crime Threat Is A Reality And It Is Getting Worse

One of the countless cyber threats today to corporations, small business, and individuals is organized crime. The reality is organized crime no longer marches into a business and demands so-called...

View Article

Image may be NSFW.
Clik here to view.

A Look At Microsoft SQL Server Database Security

Security and web applications is something that I speak and write about often and I believe one aspect of overlooked security is the database itself. For the purpose of this article I am focusing on...

View Article


Image may be NSFW.
Clik here to view.

Open Source and Commericial Security Tools

Whether you’re a network administrator, security professional, or an end user, it’s important that you keep your system clean and secure. There are a variety of high quality open source security tools...

View Article


Image may be NSFW.
Clik here to view.

The Future of Cybersecurity Technology and Policy

Only when a comprehensive understanding of the cyber threat is taken into consideration can organizations utilize process, tools, and technologies to find, correct, and combat those who launch a...

View Article

Image may be NSFW.
Clik here to view.

The Four Goals of Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols that overcome the influence of...

View Article

Image may be NSFW.
Clik here to view.

Security Development Lifecycle Design

Later this month, I will be attending a one day event held by Microsoft in New York, New York on the subject of Security Development Lifecycle. The speaker is Doug Cavit, Principle Security Strategist...

View Article

Image may be NSFW.
Clik here to view.

Security Development Lifecycle: Introduction

I am not entirely sure how many parts of this subject there will be however, I felt I had to start somewhere. Basically I would like to use this series as an opportunity to interact with you on the...

View Article


Static Code Analysis Toolsets

In keeping with my last couple of post on Security Development Lifecycle I thought I would put together a list of free and commercial products. While there are many other products out there this should...

View Article

Never Forget A Password Ever Again

Today more than ever it is important to choose your passwords carefully. I realize that I am stating the obvious here, but it warrants repeating that you should choose a strong password and under no...

View Article


Image may be NSFW.
Clik here to view.

Product Review: AndroXplorer

AndroXplorer is an essential application for everyone who owns an Android device. Its natural process is the way for Android users to explore folders and files proficiently. While there are numerous...

View Article

Browser Fuzzing And What It Means

In today’s day and age a great many individuals conduct daily business via web based applications and it is extremely important to understand the risk with web based applications. For example, banking,...

View Article


Image may be NSFW.
Clik here to view.

Ten Most Critical Web Application Security Risks

I thought it was time to sit down and begin writing a series of articles on the subject of application security for a number of reasons. First, because security should and must be foremost in...

View Article

Image may be NSFW.
Clik here to view.

Security Development Lifecycle: SQL Injection Attacks

In an earlier post titled Security Development Lifecycle: Introduction I begun introducing what the Security Development Lifecycle (SDL) represents and as I continue this series I will focus on the SDL...

View Article

Image may be NSFW.
Clik here to view.

The State Of Web Application Security

This week I officially start my Master Degree in CyberSecurity with the University of Maryland and I have become more and more interested in security from the point of view of application development...

View Article
Browsing all 103 articles
Browse latest View live




Latest Images