Certificates, root versus self signed, private versus public key

I struggled a lot with understanding the nuances of security certificates – self-signed versus root certs, public keys versus private keys versus Certificate Authorities (CAs)….This post will attempt to clarify some of the key (no pun intended) concepts. What is

Read More Certificates, root versus self signed, private versus public key

copy paste from pdf, copy paste from ebooks

Copying and pasting content from either PDFs or eBooks is a fairly common need. While specialized tools can help with the task, some simple techniques – using only the basic software for reading these formats – are described below. From

Read More copy paste from pdf, copy paste from ebooks

Sanitizing image and pdf files prior to upload

Does your site allow for file uploads of any sort? Pdfs? Jpegs? Anything whatsoever? All these file formats are notorious for allowing malware to piggyback onto them (a technique known as Steganography). How do you protect your file uploads? How

Read More Sanitizing image and pdf files prior to upload

Creating an Oracle RAC like structure with SQL Server Technology

It is no secret that Oracle’ RAC platform has been a best seller in the enterprise database category. Among other things, Lowers overall cost of ownership by providing a single platform to collapse databases onto. Provides out of the box

Read More Creating an Oracle RAC like structure with SQL Server Technology

Web application intrusion testing

What is Black Box Scanning? Black-box web application scanning, if we abstract from the details, is a simple process: Identify all links, forms, query string parameters. Send specially crafted strings to each input and analyze the output Generate a report

Read More Web application intrusion testing