• 07 Apr 2010

    Tools & techniques for hacking Windows servers & workstations

    Ever wonder how Windows servers get hacked? Perhaps you're unsure of which approach you need to use the get the most out of your security testing at the server and desktop levels? Or you may be wondering what you need to do to lock down Windows-based Web servers? Maybe you're curious about how Windows Server 2008 R2 stands up to security tests?Well, I've got just what you need to know ...

    Continue Reading...
  • 05 Apr 2010

    Pros and cons of disk imaging

    Disk imaging is one of those awesome technologies that so many businesses can benefit from yet so few people (at least from what I see) are using it. Here's a new piece I wrote for SearchDataBackup.com where I talk about the pros and cons of disk imaging and how you can benefit from it:Using disk imaging software in data backup and recovery...

    Continue Reading...
  • 02 Apr 2010

    THE process for successful Web security testing

    Here's a new piece I wrote for SearchSoftwareQuality.com where I talk about the lifecycle of testing for Web security flaws. From obtaining buy-in to reporting to the stakeholders, it's a process you need to master.Security testing best practices for today's Web 2.0 applications...

    Continue Reading...
  • 01 Apr 2010

    Two B I G reasons to secure your home computers/network

    Here's a crazy story: burglar breaks into a home, uploads child pornography on the family computer, and tries to frame the husband of his co-worker who he had a crush on.If this isn't a good enough reason to secure your home computers, I don't know what is.Not to mention your wireless network. How'd you like one of those creeps we used to see on Dateline's To Catch a Predator doing ...

    Continue Reading...
  • 30 Mar 2010

    A couple of neat things about WebInspect

    If you're into finding the Web security flaws that matter HP's WebInspect should be on your short list of prospective Web vulnerability scanners. Over the past six months WebInspect has repeatedly found a couple of items that I know I otherwise wouldn't have uncovered or been able to exploit to the extent I did.The first is SQL injection. WebInspect does a very good job finding the actual flawed inputs but ...

    Continue Reading...
  • 29 Mar 2010

    Don’t forget about XSS *behind* the login prompt

    Don't assume that your Web security concerns stop at the login prompt. Here's a new piece I wrote where I talk about cross-site scripting (XSS) and whether or not it matters for logged-in users:Authenticated XSS - problem or not?...

    Continue Reading...
  • 29 Mar 2010

    Got Linux security on your mind?

    Here's a new webcast and accompanying podcast I recently recorded for SearchEnterpriseLinux.com where I share some insight and opinions regarding the biggest weaknesses I'm seeing with Linux today...and what you can do about it:Tightening down Linux security (webcast)Tightening down Linux security (podcast)...

    Continue Reading...
  • 27 Mar 2010

    Windows DirectAccess – VPN killer or not?

    Here's a new piece I wrote for SearchEnterpriseDesktop.com on Windows 7's/2008's new DirectAccess app:Using Windows 7's DirectAccess to enhance the mobile user experience...it's actually pretty cool and worth checking out....

    Continue Reading...
  • 26 Mar 2010

    Why the rich keep getting richer and the poor keep getting poorer

    Contrary to what Senator Max Baucus (Democrat) recently said about the forthcoming healthcare deform that's being forced upon us:“Too often, much of late, the last couple three years the mal-distribution of income in America is gone up way too much, the wealthy are getting way, way too wealthy, and the middle income class is left behind. Wages have not kept up with increased income of the highest income in America. ...

    Continue Reading...
  • 26 Mar 2010

    I do not like it Uncle Sam

    Here's a good one going around the Internet that I just love:I do not like it Uncle Sam, I do not like it Sam I am. I do not like these dirty crooks, I do not like how they cook books. I do not like when Congress steals, I do not like their secret deals. I do not like this Speaker Nan, I do not like this 'YES WE CAN'! ...

    Continue Reading...