Integrating Security into Continuous Delivery

Tom Stiehm, Coveros CTO, is presenting Integrating Security into Continuous Delivery at DC Continuous Integration, Delivery and Deployment Group Wednesday, March 13, 2013 at Blackboard Inc. (650 Massachusetts Avenue Northwest, Washington, DC (map)) starting at 6:30PM. The Internet is full of insecure applications that cost organizations money and time, while damaging their reputations when their […]

Read more
Mailtrap.io for Email Testing

Testing applications and web sites that send email can be difficult. During testing you might generate many email notifications and you don’t want to flood a real mailbox. Or you might not want email from a development system being confused for production email. And especially when using production data during development, you might want to […]

Read more
Increasing the Amount of Memory Available to a 32-bit Windows Application

Despite the fact that I am running a 64-bit version of Windows 7, I sometimes need to run 32-bit applications.  By default these applications are only able to use 2 GB of memory, regardless of the amount of available memory on the system (see: https://docs.microsoft.com/en-us/windows/win32/memory/memory-limits-for-windows-releases ).  However, I sometimes need these 32-bit applications to be […]

Read more
Using Sequences of System Events to Identify Users

In my last post on the Active Authentication project I described how to use Microsoft Detours to collect a trace of system calls (also known as system events) for a single process.  At Coveros Labs we leveraged an example program provided with Detours in order to create our own prototype system that validates the identity of a […]

Read more
How to display a logon/disclaimer notice banner in SharePoint by customizing the Global.asax and deploy the global.asax file using the Sharepoint WSP.

  I was working on a SharePoint DoD project, due to security requriements(STIG) it needed to display a disclaimer notice banner when a user initiates a session with the SharePoint Site. This solution tells how to customize and deploy the SharePoint Global.asax that triggers the new session start event to display the disclaimer notice banner. This solution was split into two SharePoint […]

Read more
Running a Jenkins Job on an Amazon EC2 Windows Slave

Continuous integration (CI) is a key component of agile software development that all organizations should strive to include in their development process.  However, for small organizations with little or no infrastructure, purchasing and maintaining a server to use for continuous integration is extremely impractical and often infeasible.  In these situations it is more cost-effective to […]

Read more
Calling Python Code from C++
Code

When developing an application in programming language A you may discover that certain parts of the program are easier to code using a different language B.  At this point you have one of three choices: Write the application entirely in language A. Write the application entirely in language B. Write most of the application using […]

Read more
Security Testing: OWASP ZAP (Zed Attack Proxy)

As part of my ongoing collection of reviews and thoughts on today’s Security Testing Tools, I’m taking a look at the Zed Attack Proxy (ZAP) by OWASP.  While, my last review of WebSecurify, looked at a very simplistic tool for Web Application Security Testing, this review will bring us a slightly more complex tool.   So where […]

Read more
X