A small Orange Review and coupon codes (2018)

This month, i decided to switch hosting from ******* to some other service. As there are many website hosting companies, i was confused to decide which one should I signup for. I was impressed with reviews on Hostgator, Inmotion, Bluehost and A2webhosting but I ended signing up for a small orange. ASO was suggested by some that folks have their blogs deployed on ASO servers. It has been a week since I moved my blog. I’m very satisfied with the performance of my new host. Here’s my review of a small orange hosting. ...

December 6, 2014 · 4 min · 773 words · prhost78

More on Limiting Damage to Information Assets

Establishing and enforcing policies that limit employee access to sensitive data and IT systems are one of the most effective mitigation strategies against a malicious insider (Brancik, 2008). There are a number of strategies that organizations can implement in order to better secure their digital assets. ...

September 19, 2014 · 2 min · 386 words · icarnaghan

Managing Access to Information Resources

Security breaches caused by internal employees, consultants, business partners and any other individual or group of individuals that have privileged access to certain parts of the network remain one of the highest threats to digital assets. In an article about the employee life cycle and identification of internal organizational threats, Conrad et al (2009) asserts that within an organization, the employee population is the source of potential malicious insiders. ...

September 18, 2014 · 3 min · 491 words · icarnaghan

Honeypots: To Lure or Not To Lure

Honeypots are sometimes used as an active defense mechanism for network security and provide a means for targeting attackers and recovering forensic evidence. A typical honeypot traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. ...

September 12, 2014 · 2 min · 385 words · icarnaghan

Intrusion Detection

Intrusion Detection is the process of monitoring an information system in order to determine if any action is being performed with malicious or otherwise cause that may negatively affect its availability, confidentiality or integrity of data contained within. In order to get started with intrusion detection, it is important to first of all gain an understanding of what an intrusion might look like and how it might impact a system or network. ...

September 11, 2014 · 3 min · 556 words · icarnaghan

Rockville Drupal Meetup

Are you a Drupal developer or someone who is interested in learning or hearing more about the platform? Each month there are various ‘meet-ups’ that take place across the area. ICF International now co-sponsors two of these meet-ups, one is held in our Fairfax office and the other in Rockville. Last night we held our first Rockville meet-up, which was a big success. ...

May 15, 2014 · 2 min · 273 words · icarnaghan

Testing email in a local development environment

Have you ever had a need to test email functionality on an application within your local development setup? I have found this process to be both time consuming and confusing in the past, especially when working within firewall restrictions. Of course we can always test with real dummy email addresses, but what if we accidently send a mass email out to real users? It is much better to test everything locally first. ...

March 20, 2014 · 2 min · 238 words · icarnaghan

Heather Remote Usability Session 10

Heather also experienced some workflow issues with the application where she was unable to locate various areas of the system. She commented that the excessive scrolling contributed to her confusion with this. In addition to this she noted concern with the various grid updates and format of the STA grid for editing and updating. ...

March 16, 2014 · 1 min · 65 words · icarnaghan

Meg Remote Usability Session 9

Meg had some difficulty working with the various grids, however once she learned the process, she was able to easily complete the remaining tasks. She also had some initial trouble with the ‘Big Ideas’ drop-down selection. ...

March 9, 2014 · 1 min · 47 words · icarnaghan

Michael Remote Usability Session 8

Michael was able to complete all tasks without many concerns. He observer and pointed out a few potential enhancements with the system, however the only issue he ran into was the recurring problem with the ‘Final Product’ text area box. ...

March 9, 2014 · 1 min · 51 words · icarnaghan