PlayLater: A Digital Video Recorder For PlayOn

| 0 comments

PlayLater is a digital video recorder that gives you the freedom to record your favorite online videos and enjoy them on your schedule. As more and more of you are getting your favorite shows online, we felt that it was high time the rest of your entertainment technology caught up. After all, the same reasons that apply to recording TV shows and movies in the old world apply to the new world, right? Convenience, access, and frankly — sometimes you don’t have an Internet connection available and that shouldn’t bar you from watching your favorite shows. The future of entertainment …

Continue reading

Who Is Behind Database Security Breaches

| 0 comments

Senior developers and architects often make decisions related to application performance or other areas that have significant ramifications on the security of the application for years to come. Some decisions are obvious: How do we authenticate users? How do we restrict page access to authorized users? Others, however, are not so obvious. U.S. Secret Service Assistant Director A.T. Smith said, Americans over the past several years have seen the significant impacts data breaches are having on our nation’s financial infrastructure. Today, cyber criminals are operating in nearly every civilized nation in the world, exposing Americans’ personal information, either stored or …

Continue reading

OWASP Application Security Tutorials

| 1 Comment

Application security encompasses measures taken throughout the application’s life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.  Applications only control the use of resources granted to them, and not which resources are granted to them. They, in turn, determine the use of these resources by users of the application through application security. Open Web Application Security Project (OWASP) updates on the latest threats which impair web based applications. This aids developers, security testers and architects to focus on better design and …

Continue reading

Creating Charts With Microsoft Chart Controls

| 0 comments

There is no shortage of charting controls for the Microsoft .NET framework and while many do a great job, they may be overkill and costly to any project. If you’re not familiar with the Microsoft Chart Controls then you may find that you’re in for a pleasant surprise for two reasons; They are free Quickly render charts Quick Walkthrough My purpose here is simple and to the point. I want to demonstrate just how easy it is to return a chart to the end user. In this case I will be using an XML data source rather than a database …

Continue reading

Security Development Lifecycle: SQL Injection Attacks

| 0 comments

In an earlier post titled Security Development Lifecycle: Introduction I begun introducing what the Security Development Lifecycle (SDL) represents and as I continue this series I will focus on the SDL model that Microsoft has so graciously provided to the community. Introduction In part 2 of this series I want to focus of SQL Injection and for those of you just getting started it is important to understand what a SQL Injection attack is. Here is what Microsoft has stated: SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance …

Continue reading

Ten Most Critical Web Application Security Risks

| 0 comments

I thought it was time to sit down and begin writing a series of articles on the subject of application security for a number of reasons. First, because security should and must be foremost in everyone’s mind and second I have decided to return to school to obtain a Master’s Degree in CyberSecurity. I can think of no better reasons to both educate myself and other surrounding to topic of security. Introduction If you’re not familiar with The Open Web Application Security Project (OWASP) then I strongly urge you to take time to visit them. The amount of information you …

Continue reading