whoisjoe.com

Security, people, process, and resilient software.

83 published stories
Hero

Finding Your Inner Evildoer (4/4): An Evil Streak

We’ve made it to the last part of my four part series on what makes a great security tester or hacker. Even though this fourth piece is what I consider to be the most important ...

Hero

Battling with Word and Excel

I recently had to build a word document that references fields in an excel spreadsheet. Since this report will update over time from data in the spreadsheet I wanted it to pull ...

Hero

Which is More Secure: Windows or Linux?

Somebody on LinkedIn asked the above question to a group I’m part of. I decided to answer it thinking “Oh, I can chime in with a quick little answer”, but the more I wrote the m...

Hero

The High Cost of an Application Security Data Breach

In the wake of the Sony Security Breaches (breaches, you say? As in plural? Yes, read on for more information) I decided to update some of our instructor led training slide deck...

Hero

Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config

This is just a quick post because I couldn’t find this information easily available on other sites. I knew there was a quick way to access the connection strings from the web.co...

Hero

When is it OK to Build up Technical Debt

As I previously mentioned I’ve been writing a bit of Ruby on Rails. I’m surprised at how quickly I can slap something together and get results, especially prototypes, up and run...

Hero

Time Management with the Pomodoro Technique

About 6 months ago it seemed like the internet was infatuated with a new time management technique called “Pomodoro.” Developed by Francesco Cirillo, The Pomodoro Technique is a...