Radical Development

Technical Without the Technicalities

What is Ping All About?

| 0 comments

If you have used a computer more than say a single day, I am sure that you are well aware of ping. If not, then you are in for a treat! Well I suppose it may not be a treat in some opinions, but this is an utility that you should take time to learn about and appreciate. Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping operates by sending … Continue reading

Cookie Poisoning: Not Your Grandmother’s Cookies

| 0 comments

Cookie poisoning is a recognized technique mainly for achieving impersonation, breach of privacy, or even modification that could result in lost bossiness through manipulation of session cookies, which maintain the identity of the client. By poisoning these cookies, an attacker can impersonate a valid client, and thus gain information and perform actions on behalf of the victim. The ability to poison session cookies stems from the fact that the tokens are not generated in a secure way. Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits … Continue reading

Basic Linux Commands

| 0 comments

Since I am on a mission to learn Linux and I am clearly a late comer to this operating system I wanted to document commands that I have begun to learn or in the process of learning. This post really is self serving and if you find value in it then I am clad to have helped. I also intend to update this post over time with the hopes of gathering a fairly comprehensive list of commands. This may seem basic to some, but again the intent is to start with basics and build up, therefore if you have any … Continue reading

Data Recovery The Easy Way With TestDisk

| 0 comments

There are many solutions on the market that are free, open source, and commercial. While many may argue that commericial solutions provide both ease of use and work well, I present to you that open source solutions are often a better solution. This being said, I wanted to share my experiences with TestDisk from CGSecurity, which is primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting a Partition Table). Partition table recovery using TestDisk is really easy … Continue reading

Ensure Deleted Files Are Not Recoverable With SDelete

| 0 comments

Have you ever stopped and considered for a just how easily it is to recover deleted files from a hard disk? Disk recovery is not diffucult and there are many commercial products available which make the task quick and painless. If you have heard the name Mark Russinovich then you’re aware of the tools that he has created over the years. In this case SDelete implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with SDelete, your file data is gone forever. Note that SDelete securely deletes file data, but not … Continue reading

Secure Development Series: Peer Reviews

| 0 comments

Stop and consider for a moment what exactly the best way to address web application security is? If you place yourself into the mindset of a hacker you just may find that you find vulnerabilities that you may have otherwise not noticed. In this article, which is a follow-up to Secure Development Series: Input Validation, I will put forth the topic of peer reviews in hopes that you pause and consider what you can do to harden your applications? Just where do the largest number of vulnerabilities reside? While you may think the network poses the greatest risk and at … Continue reading

Secure Web Browsing Using Lightweight Portable Security

| 0 comments

Stop for a moment and ask yourself just how safe to do feel when logging into your favorite social network site and at some point in time logging into online banking for example. I am not advocating that social networks fall short in the area of security but the reality is the internet is a dangerous place. Today’s threats are increasing with each passing day and I would go so far to say that many individuals do not understand nor take the time to properly address security. In fact the Software Engineering Institute at Carnegie Mellon states: Many users have … Continue reading