We’ve all done it. You sit down bleary eyed at your terminal and tap in your username then instinctively hit tab and type in your password. You hit return before you realise that you didn’t hit tab correctly. The problem…
We’ve all done it. You sit down bleary eyed at your terminal and tap in your username then instinctively hit tab and type in your password. You hit return before you realise that you didn’t hit tab correctly. The problem…
When using the Windows Identity Foundation and following a tutorial in Vittorio Bertocci’s excellent book ( Programming Windows Identity Foundation ) I discovered a problem with the way that the WIF installs. When you right-click on an ASP .NET project…
Security through obscurity is the premise by which one seeks to hide the implementation of a system as a way to further secure a system (be it software or hardware that you are seeking to protect). Intuitively this seems like…
Here is a brief run down – or tl;dr of the common security paradigms: Encryption – Encryption is the process of taking a block of data (called plaintext) and transforming it into something that would not be understood. This process…
(For a glossary of terms look here) Many people neglect security as a matter of course these days. But as we move towards a more data driven economy and with everyday life becoming increasingly linked to an online presence we…
Today an article appeared that has seemed to have gone viral – it was published here. The article referred to an as yet unnamed employee ‘Bob’ who had managed to outsource his job to a software developer in China. It smacked a…