The 2nd generation Nest thermostat replaces my outdated thermostat

| 0 comments

I finally decided some time ago to replace the original thermostat that was installed when my house was built with the2nd Generation Nest Thermostat. I must say that I waited for the second generation and the idea of spending $249.00 for a thermostat was not easy to swallow, but if all of the reviews that I have read are true then I expect with one year I will have recovered the cost of the thermostat and at that point the monthly savings will be money in my pocket. First let me say that the installation was much simpler than I expected and I am not mechanical by nature, in fact I will call a repairman before doing anything myself. If I can install this thermostat, then anyone can. If you have any doubts about this device working in your home or office be sure to use the Nest Compatibility Tool. The unboxing itself makes you feel like you have a shiny new tech gadget to play with and in many ways you do. My next step was to shut off my power and remove that five year old thermostat and get the wires ready for the Nest. Trust me, it …

Continue reading

Learning BackTrack 5: The Art Of Penetration Testing

| 0 comments

BackTrack is an absolutely amazing Linux based penetration testing environment that is entirely dedicated to hacking. I must say that you should use common sense when you begin digging into the security tools provided because the last thing you want to do is break the law and find yourself in trouble. Now to say that there are many security tools available in BackTrack would be an understatement. In fact there is so many available that I would never start to list theme here. If you wish to see for yourself, simply execute the following within your terminal instance: dpkg –list To be honest I have just recently begun experimenting with BackTrack and I have a great deal of learning ahead of me. For that reason I felt compelled to share the following video tutorials, books, and how-to guides that I could locate. Should you have any tips or resources please leave a comment. Video Tutorials Guides BackTrack User Guide from Braton Groupe sarl.

Stop Online Piracy Act And The Future Of Internet Freedom

| 0 comments

I thought it was time that I sat down and put to paper so to speak my thoughts about the Stop Online Piracy Act (SOPA). For those of you that know me personally know that I am not a fan of SOPA for many of the reasons that other individuals as well as large technology companies have stated. In short SOPA is entirely to vague and leaves the door open for entirely a nanny state which I am sure you agree will kill the Internet freedoms we enjoy today. SOPA “explained” by Guardian Opinion Time I must say that there are pros and cons that go along with SOPA and of course piracy is a problem and the internet of course helps to enable piracy but the answer is not SOPA in it’s current form. In fact according to ChadRocco, Rep. Lamar Smith refuses to take the concerns and complaints seriously. There are many companies that have voiced opposition to SOPA and the list continues to grow each day. If you wish to see for yourself those who oppose SOPA, the Center for Democracy and Technology has compiled a list that you may want to review to understand the heavyweights …

Continue reading

Secure Development Series: Input Validation

| 0 comments

Many websites today collect data from the user community which includes but not limited to an email address, address, or even a phone number. The single golden rule everyone must follow is never trust the data input. In order to mitigate the risk to ensure that the data received and processed by your application is acceptable you must first define what data your application should accept, what its syntax should be and the minimum and maximum lengths. This information will allow you to define a set of “acceptable” values for every entry data point that is captured. Foundation of Security Authentication: Addresses the question: who are you? It is the process of uniquely identifying the clients of your applications and services. Authorization: Addresses the question: what can you do? It is the process that governs the resources and operations that the authenticated client is permitted to access. Auditing:Effective auditing and logging is the key to non-repudiation. Non-repudiation guarantees that a user cannot deny performing an operation or initiating a transaction. Confidentiality: Referred to as privacy, is the process of making sure that data remains private and confidential, and that it cannot be viewed by unauthorized users or eavesdroppers who monitor the flow of traffic across a network. …

Continue reading

Financial Industry Modern Day Privacy Policies

| 0 comments

Financial Privacy & Electronic Commerce: Who’s In My Business, this is the question. The financial industry whether banking, investments, or credit card services face an ever changing landscape when it comes to privacy and if they are to safeguard themselves and their consumers a proper plan must be implemented. There are a number of challenges surrounding privacy in terms of data protection, consumer confidence, supplier partnerships, and of course laws and regulations. The financial industry is particularly at risk because of the nature of business as well as the utter amount of transactions and the sizable customer base. Not only does the Internet pose what is likely the single largest risk in the realm of privacy but also traditional communications must accurately address privacy. To set the stage of what privacy exemplifies the Webster dictionary defines privacy as the quality or state of being apart from company or observation. Now that the definition of privacy is clear, the financial industry must account for laws and regulations in order to both safeguard themselves and their customers. To address privacy it is imperative to establish a policy, which outlines the steps of how a bank manages and shares personal information. Many banks …

Continue reading