Useful Security
Welcome to usefulsecurity.com. This blog is dedicated to providing tips, pointers, howtos, and other information on solving real security problems. Too often today security professionals come up with...
View ArticleVulnerable web applications
Problem Web applications can be a source of very frequent vulnerabilities. These vulnerabilities can stem from bugs in the program itself as well as the libraries and frameworks upon which it depends....
View ArticlePreventing Disclosure
Problem While it is always preferable to keep confidential information such as customer records away from a website, that is often not feasible. This is especially true in ecommerce, but is true in...
View ArticleLinuxWorld 07
I'd like to say thanks to all who attended my talk at LinuxWorld. A copy of the slides is available here. I hope you enjoyed it and got a lot out of it. I just posted the second demo in full here, and...
View ArticleMontavista Vision 2007
I had the distinct opportunity to speak at the Montavista Vision conference about SELinux in embedded devices. I'd like to say thanks to all who attended my talk. A copy of the slides is available...
View ArticleApple Sandboxes Part 1
Linux isn't the only operating system with activity in the enhanced access control department. Apple recently released Mac OS X 10.5 Leopard, which includes a new feature called a sandbox (or seatbelt,...
View ArticleApple Sandboxes Part 2
Here are a couple of examples of using sandboxes in Leopard. Both examples involve confining a test application that needs to read a file, but should not be able to write that file. I realize that this...
View ArticleApple Sandboxes Further Use
It looks like Apple will be using sandboxes for a bit more than the current couple processes in the future (perhaps Snow Leopard). Looking at the CUPS code (CUPS was purchased by Apple in February of...
View ArticleSandboxes used in Google Chromium
I was pleased to see that Google Chromium (the open project behind Google Chrome) is utilizing OS X sandboxes as well. This is the first I've heard of a third-party application developer utilizing...
View Article
More Pages to Explore .....