OWASP Application Security Tutorials

| 1 Comment

Application security encompasses measures taken throughout the application’s life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application.  Applications only control the use of resources granted to them, and not which resources are granted to them. They, in turn, determine the use of these resources by users of the application through application security. Open Web Application Security Project (OWASP) updates on the latest threats which impair web based applications. This aids developers, security testers and architects to focus on better design and …

Continue reading

Diskeeper 2011 Product Contest

| 0 comments

If you recall my Product Review: Diskeeper 2010 from the past it is worth stating that the Diskeeper Corporation has revealed the near future release Diskeeper 2011 which bring a number of great feature to the table that goes a long way in assisting you in keeping those fragmented hard drives under control. The fine folks at the Diskeeper Corporation has graciously provided three FREE licenses of Diskeeper 2011 Home, just continue reading for details on how to win. Diskeeper has always been the de facto standard for tooling surrounding fragmentation in my book and while there are a number …

Continue reading

The Game Layer On Top Of The World

| 0 comments

I watch probably more TED Talks than I should, but these talks are so informative and insightful that more often than not I find myself thinking differently about the subject the speaker has presented. Seth talks about how game layers are built into the world via social networks and you begin to understand just how much control these layers have over our life than many of us would like to admit. Seth is a “Proud Princeton dropout” and runs SCVNGR, a mobile start-up trying to build the game layer on top of the world.

Looking Back At Computers In 1960

| 0 comments

I admit that I did not own my first first computer until 1991 and even in the early 1990′s I affectionately refer to the 386SX-25 and CRT as boat anchors; they were huge, well so I thought. Who would have ever thought just 40-50 years ago that we would be walking around with a computer over our shoulder or even placed securely in a pocket? I’m sure not any of the folks in the following videos. Be sure to check out the Computer History Museum YouTube Channel for more history on computers. Now, this next video explains logic, rules, and …

Continue reading

Microsoft Academic Software Discounts And Programs

| 0 comments

If you’re currently a student pursuing your education in hopes of landing the job of your dreams then pay attention. Microsoft provides a number of wonderful programs that will help you to purchase much needed software such as Word that might otherwise be to expensive for you to purchase at you local computer store, obtain certifications, and even participate in a program that allows you access to development tools for free. If you’ve been in need of Word, Excel, PowerPoint, and other Office products you may be surprised to learn that you can grab Office Professional Academic 2010 for a …

Continue reading

Is Facebook’s Facial Recognition Going Too Far?

| 0 comments

The facial recognition feature is technology you may take for granted when you upload images on Facebook. The point of view that I take is technology is only as good as those that use it. What am I saying you may ask? All technology has good and bad points and the individual behind the use of the technology makes the difference. For example, just because I have the freedom to publish my thoughts that does not give me the right to do so should it cause harm to another. Using common sense should always be the focal point and as …

Continue reading