Radical Development

Technical Without the Technicalities

Internet Security, Data Breaches and Password Management

| 0 comments

Today’s state of security truly is in a poor state of affairs and there is really little indication that things will get any better anytime soon. How better to understand the scope of the problem than looking at the last nine years defined as the World’s Biggest Data Breaches? As you review this chart, it is important to understand the breach resulted from a wide variety of risk, which leads to the vulnerability being exploited. The saddest fact is that may of these breaches may have been prevented if more attention to security had been applied, but that is an … Continue reading

Computer Forensics Tools: Windows Registry

| 0 comments

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. There are many well defined tools and processes and you should understand the legalities behind computer forensics should you intend to consider this career field. That being said, you may want to give … Continue reading

Why oh Why Does SQLi Continue To Be a Problem

| 0 comments

So far this year it seems just about every new day brings a new data breach. Now to be fair, I do not know how organizations are being breached, but I would tend to believe that SQL injection may be the culprit and this is just a simple suspicion on my part. However, my suspicion may be accurate as the Open Web Application Security Project (OWASP) has injection as the number one attack vector for 2013 as listed in the OWASP Top 10. Injection was also sitting at the number one slot in 2010 as well, which begs the question … Continue reading

Creating Accessibile Documents

| 0 comments

Creating or converting existing documents into accessible formats is a simple process. This post provides instructions on how to take advantage of the accessibility features in Microsoft Word, PowerPoint, and Adobe Acrobat to create accessible documents. Before you begin, set the styles for titles, headings, and text in your document. By setting the styles before you begin creating the document, you can simply select the exact style of text you want without having to modify every section. These styles provide the document’s structure for the tagged PDF files as well. Also before you begin, set the overall format and spacing … Continue reading

Malware and the Risk to Cybersecurity

| 0 comments

Malware is widespread and continues to grow with each passing day. There are even recent reports that adware vendors are actively purchasing Chrome extensions to peddle their adware and malware. If you are not familiar with what malware really is the jest of it is essentially malicious software. It many ways malware is a lucrative business but it is also very damaging and illegal. You need to understand that the delivery method of malware can include websites, email, electronic documents, and so much more. Think of it this way, the black hat finds a vulnerability which is a weakness in … Continue reading

What Can We Learn From the 2013 Adobe Database Breach

| 0 comments

Early October 2013, Adobe announced that they fell victim to a cyberattack and their database was breached to the degree that 2.9 million customers are impacted in one way or another. From my point of view it is great that Adobe regrets the incident and apologizes for the inconvenience, but I believe that we as consumers should and must demand so much more than a simple “we are sorry”. In the event this breach is new to you, then I urge you to visit Troy Hunt’s new site ‘;–have i been pwned? Troy has done an exceptional job at bringing … Continue reading

Life In a Digital World Means Little or No Privacy

| 0 comments

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy. During discussions with others that I come into contact with, I am disturbed when I hear the response “if you are doing nothing illegal then you have nothing to worry about”. Obviously these individuals have not idea what privacy means. For those individuals, the Webster Dictionary defines privacy as the state of being alone. For those of you who … Continue reading