Securing Oracle WebLogic Server – Install
This post discusses the actual installation of WebLogic Server. Generally speaking, the installation of Oracle WebLogic Server, in reality, involves installing two software products: Java – typically a...
View ArticleSecuring Oracle WebLogic Server – Configure
The next step after installing the software consists of creating the WebLogic domain. Before we do, as stated in the pre-installation posts, following OA&M best practices, application and user data...
View ArticleSecuring Oracle WebLogic Server – Ethical Hacking?
2013/05/21 Update: I made a correction to specify that AES uses a cipher key and not an initialization vector (more information on AES can be found here). Some may have positive reactions while others...
View ArticleSecuring Oracle WebLogic Server – The Hack Patch
Before I start, it is important to understand Oracle’s license terms. It is not uncommon to download Oracle products from the Oracle Technology Network (OTN). Here’s an extract from the Oracle...
View ArticleJump-Start Your Secure Coding Program With OWASP ASVS 3.0
The concept of secure coding used to be a little hazy, one of those you’ll-know-it-when-you-see it concepts. Patterns for secure coding generally arrived as one-offs, where some vendor would recommend...
View ArticlePanel Discussions: Do This, Not That
About a month ago I attended a local infosec panel discussion (Detect and Defend, hosted by the St. Louis Business Journal). I’ve seen a lot of panel discussions, and I’ve even been a panelist from...
View ArticleSecurity Starts at Home and So Does Information Security
As a Perficienite, I have been involved in ISO27001, SSAE-16 and HIPAA assessments and have learned the need for information security. I would like to give back my knowledge and awareness to all in a...
View ArticleHow To Connect Your Android Phone To Your AWS-Based VPN Server
In my previous post, How to Set Up Your Own VPN Server Using Amazon Web Services, we set up and configured an OpenVPN server using Amazon Web Services, and then we configured Windows and Linux machines...
View ArticleIntroduction to Data Masking Transformation in Informatica
Introduction On a daily basis, data growth is expanding at a pace greater than the expansion of the universe itself. It makes our lives better, but it also has the capability of reflecting the...
View ArticleHow Microsoft Word “Protected View” Stops Information Leaks
Microsoft Word has long offered support for loading images and templates over the network. This is a great feature within corporate environments because it facilitates the reuse of assets like logos...
View Article