@TeriRadichel | Cloud. Security. Software.

Notes. Code. Cloud. AWS. Security. Automation. Databases. Bugs. Error Messages. No Guarantees.

Teri Radichel - Software Programmer and System Architect - Cloud + Security

  • 2nd Sight Lab
  • @teriradichel
  • GitHub
  • Seattle AWS
  • LinkedIn
  • Slideshare

Thursday, May 21, 2009

Some Good Web Site Security Links

Overview of things you should do to secure web applications

Cross frame scripting

Cookie Poisoning

Code injection - how it affects sites
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Blog Archive

  • ►  2017 (40)
    • ►  July (5)
    • ►  June (18)
    • ►  May (17)
  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (2)
    • ►  October (1)
    • ►  February (1)
  • ►  2014 (45)
    • ►  December (1)
    • ►  November (3)
    • ►  September (1)
    • ►  August (3)
    • ►  June (5)
    • ►  May (7)
    • ►  April (2)
    • ►  March (19)
    • ►  February (4)
  • ►  2013 (39)
    • ►  December (5)
    • ►  November (16)
    • ►  September (8)
    • ►  August (5)
    • ►  April (3)
    • ►  March (2)
  • ►  2012 (1)
    • ►  April (1)
  • ►  2011 (10)
    • ►  July (4)
    • ►  June (3)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2010 (31)
    • ►  December (1)
    • ►  November (3)
    • ►  October (1)
    • ►  July (4)
    • ►  June (3)
    • ►  May (10)
    • ►  April (9)
  • ▼  2009 (28)
    • ►  October (2)
    • ►  September (3)
    • ►  August (2)
    • ▼  May (6)
      • Java Encryption
      • Special Characters to Block in Web Requests
      • Some Good Web Site Security Links
      • XSS
      • HTML Form File Upload
      • Singletons, Multithreading and Class Loaders
    • ►  April (6)
    • ►  March (8)
    • ►  February (1)
  • ►  2008 (2)
    • ►  December (1)
    • ►  November (1)
  • ►  2006 (2)
    • ►  August (1)
    • ►  May (1)

Security + Software + AWS

  • Secplicity
  • Seattle AWS Architects & Engineers Meet Up
  • Paper: Event Driven Security on AWS
  • Paper: Target Breach Case Study
  • Thoughts

Popular Posts

  • Timeout Connecting to S3 Endpoint From Lambda
    In my last post I explained how to turn on detailed Boto logging to get more information about an AWS error. The specific problem I was hav...
  • Accessing Files in S3 via a Lambda Function in a VPC using an S3 Endpoint
    This post explores creation of a lambda function inside a VPC that retrieves a file from an S3 bucket over an S3 endpoint. The Lambda funct...
  • Detailed AWS Boto Library Logging
    In my last post I explained how to turn on AWS X-RAY to log details about Lambda functions. That feature is probably most useful when you ha...
  • Enable AWS X-Ray for Lambda Function using CloudFormation
    I just realized there's a check box under Lambda configuration tab to enable x-ray. I was trying to enable it in other more complicated ...
  • Videos - Discrete Mathmematics and Linear Algebra
    Discrete mathematics Arsdigita 02 (Discrete Mathematics) Lecture 1/20 http://www.youtube.com/watch?v=h_9WjWENWV8 Arsdigita 02 (Discrete...
  • Estimating AWS Costs Using AWS Calculator
    Tips for estimating AWS costs Amazon Calculator: Amazon Calculator Gather requirements Map requirements to services Right-size servic...
  • 'capabilities' failed to satisfy constraint: Member must satisfy constraint: [Member must satisfy enum value set: [CAPABILITY_NAMED_IAM, CAPABILITY_IAM]]
    When running cloud formation templates certain templates require IAM permissions. You will need to add this to your IAM call: --capabilit...
  • Route Tables: Protecting Your Network
    When you set up your network it is very important to understand how route tables work and how they open up access to your network in uninten...
  • Do You Have HTTP Traffic Hidden in Your HTTPS Page?
    I set my Firebox to only allow HTTPS traffic just so I could see what sites don't support SSL. At first I thought the Linksys site did n...
  • ImportValue in UserData with YAML ~ CloudFormation
    When trying to concoct a UserData statement in an EC2 CloudFormation in YAML a !SUB function can be used to replace variables in the UserD...

Favorites

  • Secplicity
  • SANS Technology Institute
  • AWS Blog
  • AWS Security Blog
  • All Things Distributed
  • Most Viewed AWS Security Topics
  • AWS Service Health Dashboard
  • AWS Security Bulletins
  • Teri Radichel
© Teri Radichel 2017. Awesome Inc. theme. Powered by Blogger.