Our documents are based on successfully executed projects which save you time and money.
application , networking , web-services

OS Jobs Scripts Can Do

October 14, 2009

Windows Script Host provides objects for manipulation of your scripts. Here are some of the tasks that these objects and services can do for you: Map network drives Connect to printers Modify environment variables e.g. Temp Run basic functions such as CreateObject and GetObject Print a message to a...

Img
application , security , web-services

MySQL Installation Notes on Windows 200x and IIS 6 / 7

October 13, 2009

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The...

Img
application , security , web-services

Basic SQL Parameters

October 10, 2009

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the...

Img
application , projects , web-services

Service-Oriented Architecture (SOA)

October 2, 2009

Service-Oriented Architecture (SOA) is an architectural style that supports service orientation. Service orientation is a way of thinking in terms of services and service-based development and the outcomes of services. A service: Is a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer...

Img
application , security , web-services

Excellent Resource – Vulnerability Assessments

April 8, 2009

Excellent Links: http://www.juniper.net/techpubs/software/management/strm/2008_1/VA_Book.pdf      

Img
application , security , web-services

Application Security Testing Concerns / Advice

March 17, 2009

Cross Site Scripting Cross-site scripting allows hackers to: 1)      Execute malicious script in a client’s Web browser 2)      Embed <script>, <object>, <applet>, and <embed> tags 3)      Steal web session information 4)      Modify user’s screen a.       Any Dynamic HTML code based on content that users submit is vulnerable SQL Injection...

Img
compliances , information-rights-management , security , web-services

Identity Management Glossary of Terms

January 8, 2009

Acquisition device: The hardware used to acquire biometric samples. Acquisition device: The hardware/sensors used to acquire biometric samples. These would include finger sensors or readers, iris scanning devices, facial recognition cameras. Automated Fingerprint Identification System (AFIS): A system that compares a single fingerprint with a database of fingerprint images....

Img
information-rights-management , security , web-services

Identity (IdM) Warehouse described

August 26, 2008

Support for hierarchical organizational units-organizational structure, reporting structure or functional units Application Metadata Definition Simplified user and entitlements import process – Import from csv, xml, txt and other format files – Import directly from some ldap & odbc sources – Import from Identity Management Systems – Import using RBAC ETL processing • Flexible...

Img
information-rights-management , security , web-services

Role Based Access Market Needs

June 14, 2008

Determine – ‘Who has access to what’ – ‘If people have the right access for their job’ • Demonstrate compliance to auditors – RBAC Model – Recertification of Entitlements • Efficient User Access Process – Assign access based on ‘business roles’ – Simplified process for creating and managing roles • Clean up orphaned accounts,...

Img
information-rights-management , networking , security , web-services

Identity Compliance Described

May 17, 2008

Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts Ability to define rules across any platform / database / application or user’s attributes Support for inter and intra application security policy enforcement Monitoring of SoD, role vs actual exceptions, and terminated users with...

Img
compliances , sample-it-spreadsheets , security , web-services

What is an Application Audit

May 7, 2008

What is an Application Audit Usually required to assess • Business risk• Internal control• Strong linkage to corporate governance and compliances such as SOX, PCI, HIPAA and GLBA It is an audit of a single application • Example: audit of an Excel spreadsheet with embedded macros It could also be an...

Img