In today’s day and age the importance of a strong password cannot be over stated, but have you really stopped for a moment and considered just what makes a strong password? Many organizations have policies concerning passwords and while a policy is an absolute the reality is that passwords often are weak. For example, consider for a moment that a policy states that passwords must be at a minimum of eight characters and include upper case, lower case, one special character and a number. If an employee was to use a password of P@ssword1 then they would be conforming to … Continue reading
Application security encompasses measures taken throughout the application’s life-cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance of the application. Applications only control the use of resources granted to them, and not which resources are granted to them. They, in turn, determine the use of these resources by users of the application through application security. The next time you begin a project stop and ask yourself the following questions. The best way to be successful is to prepare in advance and know what to … Continue reading
Database change management provides a set of tools which make the process of propagating database schema and data changes to multiple environments effortless. The problem that Database Change Management is attempting to solve: Most significant business applications rely on at least one relational database for persisting data As new features are developed, database schema changes are often necessary – i.e. new tables, columns, views, and stored procedures Database schema changes and corresponding code changes must always be deployed together Successful database change management requires that a consistent process be applied by all team members. Without a consistent process than the … Continue reading
This is the second article on the subject of DropDownList. If for any reason you missed the earlier post titled Series DropDownList: Binding XML Data to a DropDownList, I would recommend that you take the time and read that post as well. In part two of this series I will focus on accomplishing cascading selections with your DropDownList. Since the bulk of the work was accomplished in DropDownList: Binding XML Data to a DropDownList we will pick up from there. Web Form Here we will incorporate a small change from the previous example. Notice that in this example I have … Continue reading
Who doesn’t love XML? Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is defined in the XML 1.0 Specification produced by the W3C, and several other related specifications, all gratis open standards. The design goals of XML emphasize simplicity, generality, and usability over the Internet. It is a textual data format with strong support via Unicode for the languages of the world. Although the design of XML focuses on documents, it is widely used for the representation of arbitrary data structures, … Continue reading
Have you ever stopped and considered for a just how easily it is to recover deleted files from a hard disk? Disk recovery is not diffucult and there are many commercial products available which make the task quick and painless. If you have heard the name Mark Russinovich then you’re aware of the tools that he has created over the years. In this case SDelete implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with SDelete, your file data is gone forever. Note that SDelete securely deletes file data, but not … Continue reading
Who doesn’t like free stuff? Here is a poster that covers application security that I hope you may find useful. I believe tidbits like this are great in terms of awareness. Download your copy today!