View Post

Web Application Database Vulnerabilities to be Aware of

In Cybersecurity, Web Development by Ian1 Comment

The use of malicious code attacks against web applications and more specifically, web enabled databases, is on the rise and continues to be a greater threat as systems become more complicated and reliant on third party libraries and frameworks.  There are many different types of exploits and vulnerabilities associated with malicious code attacks which can potentially threaten the very databases …

FacebookTwitterGoogle+PinterestLinkedInShare
View Post

SQL Injection Explained

In Cybersecurity, Web Development by IanLeave a Comment

SQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie (2008).  SQL or Sequential Query Language is a database language used to interact with large quantities of data, typically stored in tables inside a Relational Database Management System (DBMS).  Each command using the SQL language typically generates a result set of …

View Post

Usable Security? User Friendly Factors

In Cybersecurity by IanLeave a Comment

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root cause of this problem is …

View Post

Post Authentication Methods

In Cybersecurity by IanLeave a Comment

A lot of time can be spent in an organization firming up authentication and access control systems to ensure greater levels of security to their network. All of this however is only one step to insuring a users credentials are not compromised. Considerations need to be made for post authentication. There are several things organizations can do to mitigate risk …

View Post

Unix Permissions For UMUC’s Nova Server Explained

In CMST 385, Web Development by IanLeave a Comment

All files and directories created in a Unix environment such as Nova are assigned permissions based on the level of access available to different user groups. In order to understand permissions better, we will discuss users, groups and ownership. Users Unix is a multi-user operating system. It serves many users who have ownership or certain privileges of resources on the …

View Post

Managed WordPress Hosting with Media Temple

In Web Development by IanLeave a Comment

I recently migrated this site to Media Temple’s managed WordPress hosting plan. For a number of years I had been running a dedicated server through CoreNetworks, which I have been extremely happy with. More recently however I have come to realize I no longer have the need for dedicated server and began researching cheaper managed hosting alternatives, which brought me …

View Post

Scotch Box Vagrant LAMP Stack

In Web Development by IanLeave a Comment

For a while now I have been using WAMP as my daily driver for Drupal development on my Windows 8 machine. For anyone who is a Drupal developer and uses WAMP (or a variation LAMP stack on Windows) has probably felt the pain it brings in terms of sluggishness, incompatibility with native Linux applications (Drush anyone?), and a headache administer …