@TeriRadichel | Cloud. Security. Software.

Notes. Code. Cloud. AWS. Security. Automation. Databases. Bugs. Error Messages. No Guarantees.

Teri Radichel - Software Programmer and System Architect - Cloud + Security

  • 2nd Sight Lab
  • @teriradichel
  • GitHub
  • Seattle AWS
  • LinkedIn
  • Slideshare

Thursday, May 21, 2009

Some Good Web Site Security Links

Overview of things you should do to secure web applications

Cross frame scripting

Cookie Poisoning

Code injection - how it affects sites
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Blog Archive

  • ►  2017 (40)
    • ►  July (5)
    • ►  June (18)
    • ►  May (17)
  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (2)
    • ►  October (1)
    • ►  February (1)
  • ►  2014 (45)
    • ►  December (1)
    • ►  November (3)
    • ►  September (1)
    • ►  August (3)
    • ►  June (5)
    • ►  May (7)
    • ►  April (2)
    • ►  March (19)
    • ►  February (4)
  • ►  2013 (39)
    • ►  December (5)
    • ►  November (16)
    • ►  September (8)
    • ►  August (5)
    • ►  April (3)
    • ►  March (2)
  • ►  2012 (1)
    • ►  April (1)
  • ►  2011 (10)
    • ►  July (4)
    • ►  June (3)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2010 (31)
    • ►  December (1)
    • ►  November (3)
    • ►  October (1)
    • ►  July (4)
    • ►  June (3)
    • ►  May (10)
    • ►  April (9)
  • ▼  2009 (28)
    • ►  October (2)
    • ►  September (3)
    • ►  August (2)
    • ▼  May (6)
      • Java Encryption
      • Special Characters to Block in Web Requests
      • Some Good Web Site Security Links
      • XSS
      • HTML Form File Upload
      • Singletons, Multithreading and Class Loaders
    • ►  April (6)
    • ►  March (8)
    • ►  February (1)
  • ►  2008 (2)
    • ►  December (1)
    • ►  November (1)
  • ►  2006 (2)
    • ►  August (1)
    • ►  May (1)

Security + Software + AWS

  • Secplicity
  • Seattle AWS Architects & Engineers Meet Up
  • Paper: Event Driven Security on AWS
  • Paper: Target Breach Case Study
  • Thoughts

Popular Posts

  • Using a WatchGuard Firebox for an NTP Server on AWS
    When your instances run on AWS by default they will reach out to the Internet to an NTP service to update the clock that is used to create a...
  • 0.0.0.0/0 in AWS Route Tables and Network Rules
    Public Safety Announcement: 0.0.0.0/0 should be used sparingly. It means any host on any IP address (or any IPv4 address to be precise) on...
  • variable names in Fn::Sub syntax must contain only alphanumeric characters, underscores, periods, and colons
    While trying to use an ImportValue the way specified on the web sites in the UserData section of a CloudFormation template I go this error: ...
  • Installing Paramiko and Crytography in Python Virtual Environment
    This blog post describes how to run SSH jobs from an AWS Lambda function: https://aws.amazon.com/blogs/compute/scheduling-ssh-jobs-using-aw...
  • Creating Paramiko and Cryptography Virtual Environment to Run On AWS Lambda
    A prior blog post explained how to obtain the dependencies to successfully build Paramiko and Cryptography on an AWS EC2 instance in a virtu...
  • Timeout Connecting to S3 Endpoint From Lambda
    In my last post I explained how to turn on detailed Boto logging to get more information about an AWS error. The specific problem I was hav...
  • "ResourceStatusReason": "No export named [x] found. Rollback requested by user.",
    Was having someone help me test FireboxCloud automation script and got this error. "ResourceStatusReason": "No export named...
  • invalid ELF header - Import Error
    If you see this error when running an AWS lambda function: { "errorMessage": "/var/task/cryptography/hazmat/bindings/_cons...
  • Configuring TLS on Postfix - RedHat AWS EC2 instance - Amazon Cloud
    Please note. This didn't really end up working. Leaving notes for all the things I did get working however. This is old and not recommen...
  • Wireless Access Points, PEAP and Radius Servers
    Started looking up what it takes to use PEAP with wireless access point. There are a bunch of parts and pieces need to put together... R...

Favorites

  • Secplicity
  • SANS Technology Institute
  • AWS Blog
  • AWS Security Blog
  • All Things Distributed
  • Most Viewed AWS Security Topics
  • AWS Service Health Dashboard
  • AWS Security Bulletins
  • Teri Radichel
© Teri Radichel 2017. Awesome Inc. theme. Powered by Blogger.