Finding Your Inner Evildoer (4/4): An Evil Streak
We’ve made it to the last part of my four part series on what makes a great security tester or hacker. Even though this fourth piece is what I consider to be the most important ...
Which is More Secure: Windows or Linux?
Somebody on LinkedIn asked the above question to a group I’m part of. I decided to answer it thinking “Oh, I can chime in with a quick little answer”, but the more I wrote the m...
The High Cost of an Application Security Data Breach
In the wake of the Sony Security Breaches (breaches, you say? As in plural? Yes, read on for more information) I decided to update some of our instructor led training slide deck...
Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config
This is just a quick post because I couldn’t find this information easily available on other sites. I knew there was a quick way to access the connection strings from the web.co...
When is it OK to Build up Technical Debt
As I previously mentioned I’ve been writing a bit of Ruby on Rails. I’m surprised at how quickly I can slap something together and get results, especially prototypes, up and run...
Time Management with the Pomodoro Technique
About 6 months ago it seemed like the internet was infatuated with a new time management technique called “Pomodoro.” Developed by Francesco Cirillo, The Pomodoro Technique is a...