Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
application , o-s , web-services

Sample Application Server Consolidation

March 12, 2010

File / Print / Utility Servers Ability to provide a more predictable and dense application consolidation which will result in a further reduction of server footprint Save time and money by accelerating costs savings through deeper consolidation Lower the risks involved in a higher density of applications per server...

Img
application , security , web-services

Sample – Shared Application Development and Testing Environment Project

March 12, 2010

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the...

Img
application , projects , web-services

Software Security and SDLC Considerations

March 8, 2010

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define...

Img
application , security , web-services

Application Threats and Vulnerabilities

March 7, 2010

  Application Threats and Vulnerabilities    Oracle MS SQL Server Sybase Lotus Domino Denial of Service SNMP DoS   Malformed RPC Absolute value of numeric DoS Unicode DoS Redirection DoS   Request DoS   Select All DoS  IIOP DoS ID/Password Control Issues Default passwords Default passwords Default passwords Default passwords Brute force...

Img
application , web-services

Oracle Database Configuration & Performance Tips

March 7, 2010

Introduction This guide is aimed at those who wish to configure Oracle 10 – 11 databases to ensure that it can perform under large loads that may be placed upon it. SAP utilizes Oracle database technology to store SAP activity data, in form of transaction. It requires a transactional...

Img
compliances , security , web-services

What is an x.509 Digital Certificate Structure

March 7, 2010

X.509 certificates have the following fields. Version x.509 version:  0=v1, 1=v2, 2=v3 serialNumber Controlled by CA, assigned to each cert signature algorithm OID of the algorithm used for digital signature issuer name Ex “sha1WithRSAEncryption” or “dsa-with-sha1” validity period x.500 Distinguished Name (DN) of the CA subject name Expiration date...

Img
application , web-services

Quick overview of HTTP Request messages

March 5, 2010

OPTIONS         Request information about available options GET                Retrieve document identified in URL HEAD              Retrieve meta information about document identified in URL POST              Give information (e.g., annotation) to server PUT                Store document under specified URL DELETE           Delete specified URL TRACE            Loopback request message CONNECT        For use by proxies HTTP response codes 1xx                Informational   Request...

Img
application , security , web-services

Useful SQL Commands

February 28, 2010

SQL Commands Begin Statements that make up the block. Built In functions Most SQL data functions are supported within PL/SQL blocks. Code storage Blocks may be stored within an Oracle database as procedures, functions, packages (a group of blocks) and triggers. Composite Datatypes Records allow groups of fields to...

Img
application , security , web-services

SQL Design Considerations

February 28, 2010

In order to assist us in designing your database, please have your applications and dba review and answer the following questions. SQL: • Has SQL been explained/optimized? • Have ‘bind variables’ been used? ie select * from my.table where name = :b1; Bind variables are not actually substituted until...

Img
application , security , web-services

SQL Security Overview

February 28, 2010

SQL, maintains it own internal security umbrella including password encryption, password aging, minimum length restrictions on passwords and user account management resources. Integrated security relies on trusted connections, which are only available with both named pipes protocol and MS new RPC based multi-protocol net library. Because SQL Server supports...

Img
application , security , web-services

Directx, Java and Activex runtime errors and diagnostics

February 25, 2010

52 Runtime Error This is a “bad file name or number” error in JavaScript. It means that the script cannot find a file it is looking for (web-page, course component) and is most likely a connectivity problem. Try to clear your temporary internet files which should resolve any further...

Img
compliances , sample-it-spreadsheets , web-services

Sample Excel – Gartner Web Evaluation Tool

January 4, 2010

Free Excel document download Gartner Web Evaluation Tool: http://www.aworc.org/went2001/tracks/joint/all-tool-web-evaluation.xls https://www.bestitdocuments.com/Samples

Img
application , security , web-services

Application Security Related Activities

November 9, 2009

Security Objectives. Define security objectives and requirements early in the process. Security objectives are goals and constraints that affect the confidentiality, integrity, and availability of your data and application. Design Guidelines for Security. To avoid many of the vulnerabilities introduced by poor design choices, your design activity should use...

Img
application , web-services

Application Testing

October 20, 2009

Testing plays a critical role in the development of the web site and its long-term maintenance. While smaller web sites—especially those with more limited budgets—may not need to follow the formal testing procedures that are required for large-scale, commercial web sites, every site needs to be thoroughly tested to...

Img
application , networking , web-services

OS Jobs Scripts Can Do

October 14, 2009

Windows Script Host provides objects for manipulation of your scripts. Here are some of the tasks that these objects and services can do for you: Map network drives Connect to printers Modify environment variables e.g. Temp Run basic functions such as CreateObject and GetObject Print a message to a...

Img
application , security , web-services

MySQL Installation Notes on Windows 200x and IIS 6 / 7

October 13, 2009

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The...

Img
application , security , web-services

Basic SQL Parameters

October 10, 2009

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the...

Img
application , projects , web-services

Service-Oriented Architecture (SOA)

October 2, 2009

Service-Oriented Architecture (SOA) is an architectural style that supports service orientation. Service orientation is a way of thinking in terms of services and service-based development and the outcomes of services. A service: Is a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer...

Img
application , security , web-services

Excellent Resource – Vulnerability Assessments

April 8, 2009

Excellent Links: http://www.juniper.net/techpubs/software/management/strm/2008_1/VA_Book.pdf      

Img
application , security , web-services

Application Security Testing Concerns / Advice

March 17, 2009

Cross Site Scripting Cross-site scripting allows hackers to: 1)      Execute malicious script in a client’s Web browser 2)      Embed <script>, <object>, <applet>, and <embed> tags 3)      Steal web session information 4)      Modify user’s screen a.       Any Dynamic HTML code based on content that users submit is vulnerable SQL Injection...

Img
compliances , information-rights-management , security , web-services

Identity Management Glossary of Terms

January 8, 2009

Acquisition device: The hardware used to acquire biometric samples. Acquisition device: The hardware/sensors used to acquire biometric samples. These would include finger sensors or readers, iris scanning devices, facial recognition cameras. Automated Fingerprint Identification System (AFIS): A system that compares a single fingerprint with a database of fingerprint images....

Img
information-rights-management , security , web-services

Identity (IdM) Warehouse described

August 26, 2008

Support for hierarchical organizational units-organizational structure, reporting structure or functional units Application Metadata Definition Simplified user and entitlements import process – Import from csv, xml, txt and other format files – Import directly from some ldap & odbc sources – Import from Identity Management Systems – Import using RBAC ETL processing • Flexible...

Img
information-rights-management , security , web-services

Role Based Access Market Needs

June 14, 2008

Determine – ‘Who has access to what’ – ‘If people have the right access for their job’ • Demonstrate compliance to auditors – RBAC Model – Recertification of Entitlements • Efficient User Access Process – Assign access based on ‘business roles’ – Simplified process for creating and managing roles • Clean up orphaned accounts,...

Img
information-rights-management , networking , security , web-services

Identity Compliance Described

May 17, 2008

Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts Ability to define rules across any platform / database / application or user’s attributes Support for inter and intra application security policy enforcement Monitoring of SoD, role vs actual exceptions, and terminated users with...

Img
compliances , sample-it-spreadsheets , security , web-services

What is an Application Audit

May 7, 2008

What is an Application Audit Usually required to assess • Business risk• Internal control• Strong linkage to corporate governance and compliances such as SOX, PCI, HIPAA and GLBA It is an audit of a single application • Example: audit of an Excel spreadsheet with embedded macros It could also be an...

Img
visio-stencils , web-services

Mission Bell Inn

October 31, 2007

missionbellinn (trademark all rights reserved) promoting packaged quality Mexican food products based on recipes 50 years old. Available on demand.

Img