Amazon RDS database instance set up

Detailed instructions for Amazon RDS database setup and configuration: First log on to your Amazon cloud with AWS account. Assuming you have AWS account. https://console.aws.amazon.com/ec2 Step 1: Launch new Instance After Login Select RDS from top left corner. Select Launch a DB Instance. Select the MySQL engine or any other engine that you need for your […]

Read more
Coveros CTO Tom Stiehm presents on Integrating Security into Continuous Delivery

Coveros CTO Tom Stiehm presents on Integrating Security into Continuous Delivery to the DC Continuous Integration, Delivery, & Deployment Group on March 13, 2013 at Blackboard Inc. The Internet is full of insecure applications that cost organizations money and time, while damaging their reputations when their systems are compromised. We need to build secure applications […]

Read more
Integrating Security into Continuous Delivery

Tom Stiehm, Coveros CTO, is presenting Integrating Security into Continuous Delivery at DC Continuous Integration, Delivery and Deployment Group Wednesday, March 13, 2013 at Blackboard Inc. (650 Massachusetts Avenue Northwest, Washington, DC (map)) starting at 6:30PM. The Internet is full of insecure applications that cost organizations money and time, while damaging their reputations when their […]

Read more
Mailtrap.io for Email Testing

Testing applications and web sites that send email can be difficult. During testing you might generate many email notifications and you don’t want to flood a real mailbox. Or you might not want email from a development system being confused for production email. And especially when using production data during development, you might want to […]

Read more
Increasing the Amount of Memory Available to a 32-bit Windows Application

Despite the fact that I am running a 64-bit version of Windows 7, I sometimes need to run 32-bit applications.  By default these applications are only able to use 2 GB of memory, regardless of the amount of available memory on the system (see: https://docs.microsoft.com/en-us/windows/win32/memory/memory-limits-for-windows-releases ).  However, I sometimes need these 32-bit applications to be […]

Read more
Using Sequences of System Events to Identify Users

In my last post on the Active Authentication project I described how to use Microsoft Detours to collect a trace of system calls (also known as system events) for a single process.  At Coveros Labs we leveraged an example program provided with Detours in order to create our own prototype system that validates the identity of a […]

Read more
How to display a logon/disclaimer notice banner in SharePoint by customizing the Global.asax and deploy the global.asax file using the Sharepoint WSP.

  I was working on a SharePoint DoD project, due to security requriements(STIG) it needed to display a disclaimer notice banner when a user initiates a session with the SharePoint Site. This solution tells how to customize and deploy the SharePoint Global.asax that triggers the new session start event to display the disclaimer notice banner. This solution was split into two SharePoint […]

Read more
X