Click here to Skip to main content
12,395,115 members (69,436 online)

Articles by CdnSecurityEngineer (Article: 1, Technical Blogs: 29, Tip/Trick: 1)

Article: 1, Technical Blogs: 29, Tip/Trick: 1

RSS Feed

Average article rating: 5.00

Web Security
Security
Posted: 9 Feb 2015   Updated: 9 Feb 2015   Views: 4,151   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Security Engineer manifesto

Average blogs rating: 4.89

Grid & Data Controls
General
Posted: 14 Dec 2015   Updated: 14 Dec 2015   Views: 2,580   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Earlier this spring became aware of a new cyber attack (Smishing) spreading across the US after migrating it’s way through Asia. This new attack as you may have already guessed was SMiShing and subsequently it’s close cousin Vishing.
Client side scripting
General
Posted: 11 Feb 2013   Updated: 11 Feb 2013   Views: 9,042   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Intro This is the second post in a series on cross site scripting(XSS). In this entry I examine cross site scripting and the way that it can creep into our programs and what different cross site scripting input strings look like.
Posted: 19 Feb 2013   Updated: 19 Feb 2013   Views: 4,480   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Intro This is post #3 on a cross site scripting tutorial, during this post I examine how to exploit xss attack vectors in a variety of manners & their consequences. I have decided not to make the code, demonstrable for this entry.
Web Security
General
Posted: 10 Jul 2013   Updated: 11 Jul 2013   Views: 8,274   Rating: 4.86/5    Votes: 5   Popularity: 3.36
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
I prove everyone who’s ever said XSS isn’t a serious vulnerability wrong.
Posted: 25 Jul 2013   Updated: 25 Jul 2013   Views: 5,860   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
The reality is that, today’s information security landscape sucks, attacks are becoming more sophisticated, and getting folks involved in producing the software thinking about security seems like a losing battle.
Security
Posted: 11 Feb 2013   Updated: 11 Feb 2013   Views: 4,530   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Intro Many organizations have switched in recent years to performing some form of code review, this trend is absolutely great as I am a big believer in the code review as part of early defect detection strategies.
Posted: 27 Jul 2014   Updated: 27 Jul 2014   Views: 4,091   Rating: 4.50/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 4   Downloaded: 0
How to design for security - security patterns
Posted: 2 Aug 2014   Updated: 2 Aug 2014   Views: 5,440   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 4   Downloaded: 0
Intro – Secure Process Creation I chose the Secure Process Creation pattern as the first pattern to kick of the series on security design patterns because process creation is everywhere in the software world today. Ensuring that the way processes…Read more ›
Posted: 4 Aug 2014   Updated: 4 Aug 2014   Views: 4,604   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Intro This is an interesting topic, my reasoning for writing this will become clear in the not too distant future, however not many organizations that are actively writing code have many folks focused or dedicated exclusively to security, if you…Read more ›
Posted: 27 Sep 2014   Updated: 27 Sep 2014   Views: 4,380   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Pillars of application security
Posted: 16 Oct 2014   Updated: 16 Oct 2014   Views: 2,351   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
When you want to buy something that you can afford, what do you do? Well if you’re like most people you go to some financial institution and take out a loan in the amount of the item you wish to…Read more ›The post Application Security Economics appeared first on Security Synergy.
Posted: 25 Oct 2014   Updated: 25 Oct 2014   Views: 2,940   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Scalable Security Engagement Problem
Posted: 28 Oct 2014   Updated: 28 Oct 2014   Views: 2,882   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 4   Downloaded: 0
Quantify your security position
Posted: 12 Nov 2014   Updated: 12 Nov 2014   Views: 3,490   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Case for Security Intelligence
Content Management Server
General
Posted: 30 Jan 2014   Updated: 30 Jan 2014   Views: 5,951   Rating: 4.74/5    Votes: 9   Popularity: 4.77
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
Exploiting managed memory
General Graphics
General
Posted: 21 Feb 2015   Updated: 21 Feb 2015   Views: 3,500   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
How to think like a general
.NET Framework
General
Posted: 20 Oct 2014   Updated: 20 Oct 2014   Views: 9,632   Rating: 4.94/5    Votes: 20   Popularity: 6.42
Licence: The Code Project Open License (CPOL)      Bookmarked: 19   Downloaded: 0
Protecting .NET Configs
Cryptography & Security
General
Posted: 8 Nov 2014   Updated: 8 Nov 2014   Views: 4,782   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Identity provider security pattern
Internet / Network
Network
Posted: 4 Feb 2015   Updated: 4 Feb 2015   Views: 3,950   Rating: 3.86/5    Votes: 3   Popularity: 1.62
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
AppSec Don’t Trust the Network
Work Issues
General
Posted: 22 Sep 2014   Updated: 22 Sep 2014   Views: 3,700   Rating: 4.40/5    Votes: 3   Popularity: 1.91
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
How to build a technology career
Recruiting and Job hunting
Posted: 11 Feb 2013   Updated: 11 Feb 2013   Views: 15,338   Rating: 4.57/5    Votes: 6   Popularity: 3.42
Licence: The Code Project Open License (CPOL)      Bookmarked: 5   Downloaded: 0
I truly believe programing tests during an interview are pointless.
Uncategorised Technical Blogs
General
Posted: 25 Jul 2014   Updated: 25 Jul 2014   Views: 12,926   Rating: 5.00/5    Votes: 7   Popularity: 4.23
Licence: The Code Project Open License (CPOL)      Bookmarked: 6   Downloaded: 0
Spoofing an IP is hard
Posted: 4 Aug 2014   Updated: 4 Aug 2014   Views: 4,383   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Your Software is insecure If this is the first time you’ve heard this, or you believe otherwise, you’re honestly in the wrong field. Software as good as it is, as useful as it is, as wonderfully inventive as it is,…Read more ›
Posted: 18 Oct 2014   Updated: 18 Oct 2014   Views: 3,281   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
I’ve worked in large organizations where IT and software was the means to an end by supporting business and I’ve worked in purely technical organizations where software & IT was our business.
Reviews on Third Party Products and Tools
Community Reviews
Posted: 19 Feb 2014   Updated: 19 Feb 2014   Views: 4,530   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
I’ve been in the high tech market for 8 years now, granted compared to some of my colleagues I am still the neophyte in the cube block. In those eight years, I’ve worked for big companies and start ups alike.…Read more ›
Posted: 23 Sep 2014   Updated: 23 Sep 2014   Views: 3,440   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Building An Application Security Program: Business Agreement Starting An Application Security Program Getting Business to agree to start an application security program is one of the hardest obstacles you will face In light of the ever ending stream of large…Read more ›The post Appl
Posted: 27 Sep 2014   Updated: 27 Sep 2014   Views: 4,130   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Application Security Charter
General
Posted: 6 Feb 2015   Updated: 6 Feb 2015   Views: 1,902   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Your security position and the vendor's
Posted: 18 Nov 2015   Updated: 18 Nov 2015   Views: 761   Rating: 5.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Vendor: Insecure, Security

Average tips rating: 5.00

Web Security
General
Posted: 7 Feb 2013   Updated: 7 Feb 2013   Views: 8,792   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 8   Downloaded: 0
It only takes a few minutes to run a ZAP attack scan, which can quite possibly save your firm and you a lot of trouble in the future!
No reference articles have been posted.

CdnSecurityEngineer
Engineer
Canada Canada
I am a Sr Engineer for a major security firm; I have been developing software professionally for 8 years now; I've worked for start ups, small companies, large companies, myself, education. Currently the company I work for has 7,000+ employees worldwide. I am responsible for our platform security, I write code, implement features, educate other engineers about security, I perform security reviews, threat modeling, continue to educate myself on the latest software. By night, I actively work to educate other developers about security and security issues. I also founded a local chapter of OWASP which I organize and run.

I cut my teeth developing in C++ and it's still where my heart is with development, lately I've been writing a lot of C# code & some java, but I do have a project or two coming out in C++ /DiectX 11 whenever I get the time.

When I am not developing code I am spending my time with my wife and daughter or I am lost deep in the woods some where on a camping trip with friends. If you can't find me with a GPS and a SPOT device then chances are I am on the Rugby pitch playing Rugby and having a great time doing so.


You can find more about me and My thoughts on security


Advertise | Privacy | Mobile
Web01 | 2.8.160721.1 | Last Updated 23 Jul 2016
Copyright © CodeProject, 1999-2016
All Rights Reserved. Terms of Service
Layout: fixed | fluid