Cross Site Scripting

Recently a few of my friends had become white hat hackers. This is an interesting predicament for a person like me. I am both a systems designer and developer. My very good friends had more or less become a friendly version of the enemy. Over a couple of beers they recounted tails of how insecure the world is, and how easy it is to prevent. Well I started to think… I develop different websites, and… I am developing the highly anticipated Query Glass. I need to make sure everything is secure if I want for people to continue to trust …

Continue Reading

Security Theory – CIA Triangle

With the rise of hackers security has become a hot button issue. A simple search of the word “hacker” reveals numerous stories about hackers finding ways to compromise sensitive information or breach supposed secure systems. Hackers have proliferated and formed organizations where they pool their resources and talents to achieve a number of objectives. Organizations such as “LulzSec” have pulled off some of the most unthinkable hacking jobs that have made news headlines. Before delving into implementing security it is important to identify a clear security policy as the guide to making decisions. Security professionals use many different tools to …

Continue Reading