Category Archives: Secure Processing

Basic Guidelines for Secure Software
Web applications accessible to the public Internet are guaranteed to be the target of random or focused attempts at mischief or abuse and recovering from a root compromise always painful. At a minimum, web applications require the planned design and consistent implementation of diverse technologies based on: education in the Most Critical Security Vulnerabilities [owasp.org] […]

Basic Guidelines for Validation and Procesing of User Input to Web Applications
Here is another “Back to Basics” post to help establish, explain and document a baseline architecture for web applications. The modern web is filled with phenonmenal opportunities and following a few basic engineering priciples goes a long way to keep things moving forward in a positive direction. By design, a web user agent (e.g. a […]