PlayLater: A Digital Video Recorder For PlayOn

| 0 comments

PlayLater is a digital video recorder that gives you the freedom to record your favorite online videos and enjoy them on your schedule. As more and more of you are getting your favorite shows online, we felt that it was high time the rest of your entertainment technology caught up. After all, the same reasons that apply to recording TV shows and movies in the old world apply to the new world, right? Convenience, access, and frankly — sometimes you don’t have an Internet connection available and that shouldn’t bar you from watching your favorite shows. The future of entertainment is online and now you can record the future. Folks, If you are still paying that cable or dish bill every month you have to stop! I will not go into the reasons why here but you should read Fire Your Cable Provider And Save Your Money With PlayOn, Internet Ready TV And Digital Media Devices, and Are Traditional Cable Providers Becoming Extinct to understand the reasons and options you have at little or no cost with no monthly bill. PlayLater I purchased PlayOn many months back and I have been extremely happy and now with PlayLater I have DVR …

Continue reading

Who Is Behind Database Security Breaches

| 0 comments

Senior developers and architects often make decisions related to application performance or other areas that have significant ramifications on the security of the application for years to come. Some decisions are obvious: How do we authenticate users? How do we restrict page access to authorized users? Others, however, are not so obvious. U.S. Secret Service Assistant Director A.T. Smith said, Americans over the past several years have seen the significant impacts data breaches are having on our nation’s financial infrastructure. Today, cyber criminals are operating in nearly every civilized nation in the world, exposing Americans’ personal information, either stored or transmitted, to substantial risk. The following graph demonstrates the effects of security breaches and where breaches originate. It is not news that a high percentage of attack are derived from external sources but where you should take note is that 18% of attacks come from inside and business partners. Previously I wrote about Facing cyber security threats from employees, if you have not taken the time to read this post; I highly suggest you do so. The external risks are often easily identified in most cases however threats from within are often much more complex to prevent. Combating The Problem …

Continue reading

Microsoft Baseline Security Analyzer

| 0 comments

If you’re running a Windows platform then you must secure your operating system and the Microsoft Baseline Security Analyzer (MBSA) makes it a breeze. Securing your operating system is absolutely the single most important step you can take to protect yourself. Computers have become so mainstream in homes today that often daily activities that they were previously down with pen and paper are all but extinct. There are a number of actions that should be taken which include staying up to date with patches and of course controlling user account but this just begins to scratch the surface. Unless you’re a security expert the typical end user most likely does not understand what the next steps are. This is where the Microsoft Baseline Security Analyzer is beneficial. Introduction to MBSA Microsoft Baseline Security Analyzer is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. A number of options include: Administrative vulnerabilities Week Passwords IIS administrative vulnerabilities SQL administrative vulnerabilities …

Continue reading

OWASP Application Security Tutorials

| 1 Comment

Application security encompasses measures taken throughout the application’s life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.  Applications only control the use of resources granted to them, and not which resources are granted to them. They, in turn, determine the use of these resources by users of the application through application security. Open Web Application Security Project (OWASP) updates on the latest threats which impair web based applications. This aids developers, security testers and architects to focus on better design and mitigation strategy.