Quantcast
Channel: information security – Perficient Blogs
Browsing latest articles
Browse All 18 View Live

Securing Oracle WebLogic Server – Install

This post discusses the actual installation of WebLogic Server. Generally speaking, the installation of Oracle WebLogic Server, in reality, involves installing two software products: Java – typically a...

View Article



Securing Oracle WebLogic Server – Configure

The next step after installing the software consists of creating the WebLogic domain. Before we do, as stated in the pre-installation posts, following OA&M best practices, application and user data...

View Article

Image may be NSFW.
Clik here to view.

Securing Oracle WebLogic Server – Ethical Hacking?

2013/05/21 Update: I made a correction to specify that AES uses a cipher key and not an initialization vector (more information on AES can be found here). Some may have positive reactions while others...

View Article

Securing Oracle WebLogic Server – The Hack Patch

Before I start, it is important to understand Oracle’s license terms. It is not uncommon to download Oracle products from the Oracle Technology Network (OTN). Here’s an extract from the Oracle...

View Article

Image may be NSFW.
Clik here to view.

Jump-Start Your Secure Coding Program With OWASP ASVS 3.0

The concept of secure coding used to be a little hazy, one of those you’ll-know-it-when-you-see it concepts.  Patterns for secure coding generally arrived as one-offs, where some vendor would recommend...

View Article


Image may be NSFW.
Clik here to view.

Panel Discussions: Do This, Not That

About a month ago I attended a local infosec panel discussion (Detect and Defend,  hosted by the St. Louis Business Journal).  I’ve seen a lot of panel discussions, and I’ve even been a panelist from...

View Article

Image may be NSFW.
Clik here to view.

Security Starts at Home and So Does Information Security

As a Perficienite, I have been involved in ISO27001, SSAE-16 and HIPAA assessments and have learned the need for information security. I would like to give back my knowledge and awareness to all in a...

View Article

Image may be NSFW.
Clik here to view.

How To Connect Your Android Phone To Your AWS-Based VPN Server

In my previous post, How to Set Up Your Own VPN Server Using Amazon Web Services, we set up and configured an OpenVPN server using Amazon Web Services, and then we configured Windows and Linux machines...

View Article


Image may be NSFW.
Clik here to view.

Introduction to Data Masking Transformation in Informatica

Introduction On a daily basis, data growth is expanding at a pace greater than the expansion of the universe itself. It makes our lives better, but it also has the capability of reflecting the...

View Article


Image may be NSFW.
Clik here to view.

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos...

View Article
Browsing latest articles
Browse All 18 View Live


Latest Images