Real World Software Architecture

Real World Software Architecture is dedicated to providing information and experiences from the field of Software Architecture.



Subscribe with RSS or ATOM Add to Google

Links

  • Home Page
  • Real World Software Process Engineering
  • Suggested Reading
  • .NET Dev and Arch Collection
  • SEI Essays on SA
  • Software Architecture
  • Bredemeyer
  • wwisa
  • Product Line Engineering
  • PLEES
  • Software Product Lines
  • MSDN Architecture Center
  • patterns & practices






Tuesday, July 14, 2009

.NET Security and Hacking Tool Belt - Tools, Books, Videos, and Sites

There are a ton of tools and books out on security and hacking. My focus has been on learning the techniques hackers use so I can fortify the applications I build. Learning the techniques is great, but you also need to know where in the development process you should use them.

The application my team is rebuilding now is a result of waiting to worry about security until the end of the development lifecycle. They inherited quite a mess. Not only was security completely overlooked, the tools to implement security did not go through a proof of concept. In the end, the product they planned on using did not support role base authorization, it is wide open to Denial-of-service (DOS) attacks, and it intercepts and rewrites JavaScript breaking most of the functionality that has nothing to do with security. Instead of needing the 1 role that was planned for they need between 5 - 7.

Security considerations must be included from the beginning of a project. The only way I know how to do that effectively is to execute architecture centric design. Meaning that without proper architecture, any sizable project will not have proper security.  Without a way to keep it in balance with other quality attributes, you can also go over board with security.  I have never treated it as its own solution, but rather just one part of the solution that needs to be balanced with the systems other needs (performance, modifiability, etc.).

I have listed some of the tools, books, videos, and sites I keep in my security tool belt below.

Tools
Burp Suite
Nmap and Zenmap GUI
Microsoft Threat Analysis and Modeling v2.1.2 (I like the new version (SDL Threat Modeling Tool 3.1) better. It is lighter weight and can be used in a development process much easier. This version required to much overhead and was hard to justify using. Although this one was prettier.)
SDL Threat Modeling Tool 3.1
Privoxy
TOR
Sam Spade
Vistumbler
Xenu's Link Sleuth
Foundstone's Free Tools

Books



Videos
Matt Fisher - SQL Injection - Everything About SQL Injection
"How Do I" Videos for Security
Microsoft Webcasts

Sites
Microsoft SDL - Developer Starter Kit
The Ethical Hacker Network
Threat Modeling
patterns & practices Improving Web Services Security
CLR Security
Security Developer Center
Web Application Security Consortium
CERT
Security Quality Requirements Engineering (SQUARE) Methodology
Hack this Site
McAfee
Norton- Threat Explorer
The Microsoft Security Response Center (MSRC)
Hacking Exposed: Web Applications 2
Hacking Exposed: Windows
The Web Application Hacker's Handbook

posted by tadanderson at 7:23 PM 0 comments

Friday, July 10, 2009

Silverlight 3 Released and Expression Blend 3 with SketchFlow is Available

Silverlight 3 has been released!!!!

Below are some of the key downloads you will need and sites worth checking out.

Microsoft Silverlight 3 Tools for Visual Studio 2008 SP1 (Get it here)
Overview (from MSDN Download site)
This package is an add-on for Visual Studio 2008 SP1 to provide tooling for Microsoft Silverlight 3. It can be installed on top of either Visual Studio 2008 SP1 or Visual Web Developer 2008 Express with SP1, and it provides a Silverlight project system for developing Silverlight applications using C# or Visual Basic.

This download will install the following:
  • Silverlight 3 developer runtime
  • Silverlight 3 software development kit
  • KB967143 for Visual Studio 2008 SP1
    and/or
    KB967144 for Visual Web Developer 2008 Express with SP1
  • Silverlight 3 Tools for Visual Studio 2008 SP1
    and/or
    Silverlight 3 Tools for Visual Web Developer 2008 Express with SP1
Silverlight 3 Tools for Visual Studio 2008 SP1 includes:
  • Visual Basic and C# Project templates
  • Intellisense and code generators for XAML
  • Debugging of Silverlight applications
  • Remote debugging of Silverlight applications for Mac
  • Web reference support
  • WCF Templates
  • Team Build and command line build support
  • Support for cached transparent platform extensions
  • Support for Silverlight 3 Out-of-Browser applications
Silverlight 3 Toolkit (Get it Here)
Overview (from CodePlex Download site)
The Silverlight Toolkit is a collection of Silverlight controls, components and utilities made available outside the normal Silverlight release cycle. It adds new functionality quickly for designers and developers, and provides the community an efficient way to help shape product development by contributing ideas and bug reports. It includes full source code, unit tests, samples and documentation for 26 new controls covering charting, styling, layout, and user input.

Install Microsoft Expression Blend 3 + SketchFlow RC (Get it here)
Overview (from MSDN Download site)

Expression Blend 3 + SketchFlow is a visual tool for designing and prototyping desktop and web applications. You build an application by drawing shapes, drawing controls such as buttons and list boxes, making the pieces of your application respond to mouse clicks and other user input, and styling everything to look uniquely your own.

Web Sites:
Microsoft Expression
Get Started Building Silverlight 3 Applications
Scott Guthrie on Silverlight 3

posted by tadanderson at 8:35 PM 0 comments

Thursday, July 09, 2009

ZM NC2000 Silver Notebook Cooler Review and the Poor Mans Cooler

I was recently encouraged to buy a Notebook Cooler, Silver, ZM-NC2000 when my laptop got so hot it shut down on me, and burnt my finger when I hit the power button to turn it back on.

I had the opportunity to buy one several times at a very reduced rate when Circuit City was going out of business, but I blew it off thinking I would never need one. WRONG.

I am not a gamer, just an amateur photographer and programmer. I was using Deep Zoom to create a zoomable collage, had Photoshop up, was running a virtual of Visual Studio 2010 on Windows 2008, and running Visual Studio 2008 locally. I think I got really luckily. There are some pretty bad horror stories out there about over heated laptops and the expenses paid to get them back up and running.

While waiting on my new Notebook Cooler to arrive, I used a poor mans cooler. Before and after pictures are below. I will use the poor mans cooler at work, and the new ZM-NC2000 Notebook Cooler at home. Geez, rereading that sounds bad, but in reality I don't pull out the big guns at work. I hardly ever mess with graphics there.

This thing runs super quiet. The laptop has stayed nice and cool so far. I repeated the same scenario I over heated in (above), and the laptop stayed nice and cool. I don't think I will ever find myself carrying it around with my laptop, but it is light enough to.

I recommend this to anyone running on the hot side of your processor. Do some digging and you'll find some costly stories about overheating laptops. For the price, you can't beat it.



Poor Man's Cooler (Click image for larger view)



ZM-NC2000 Notebook Cooler (Click image for larger view)

posted by tadanderson at 6:18 PM 0 comments

Previous Posts

  • DevOps: A Software Architect's Perspective Book Re...
  • Scaled Agile Framework (SAFe) LiveLessons Video Se...
  • Bulletproof Android: Practical Advice for Building...
  • Swift for Programmers Book Review
  • Security in Computing (5th Edition) Book Review
  • Swift in 24 Hours, Sams Teach Yourself Book Review
  • Sparx Systems Releases Enterprise Architect 12
  • Learning Swift Programming Book Review
  • Android Security Internals: An In-Depth Guide to A...
  • Adaptive Code via C#: Agile coding with design pat...



Archives

  • December 2005
  • January 2006
  • February 2006
  • March 2006
  • April 2006
  • June 2006
  • August 2006
  • October 2006
  • November 2006
  • December 2006
  • January 2007
  • February 2007
  • March 2007
  • April 2007
  • May 2007
  • June 2007
  • July 2007
  • August 2007
  • September 2007
  • October 2007
  • November 2007
  • December 2007
  • January 2008
  • February 2008
  • March 2008
  • April 2008
  • May 2008
  • June 2008
  • July 2008
  • August 2008
  • September 2008
  • October 2008
  • December 2008
  • January 2009
  • February 2009
  • March 2009
  • April 2009
  • May 2009
  • June 2009
  • July 2009
  • August 2009
  • September 2009
  • October 2009
  • November 2009
  • December 2009
  • January 2010
  • February 2010
  • March 2010
  • April 2010
  • May 2010
  • June 2010
  • August 2010
  • September 2010
  • October 2010
  • November 2010
  • December 2010
  • January 2011
  • February 2011
  • March 2011
  • April 2011
  • May 2011
  • June 2011
  • July 2011
  • August 2011
  • September 2011
  • October 2011
  • November 2011
  • December 2011
  • January 2012
  • February 2012
  • March 2012
  • April 2012
  • May 2012
  • June 2012
  • July 2012
  • August 2012
  • September 2012
  • October 2012
  • November 2012
  • December 2012
  • January 2013
  • February 2013
  • March 2013
  • April 2013
  • May 2013
  • June 2013
  • July 2013
  • August 2013
  • September 2013
  • October 2013
  • November 2013
  • December 2013
  • January 2014
  • February 2014
  • March 2014
  • April 2014
  • May 2014
  • June 2014
  • July 2014
  • August 2014
  • September 2014
  • October 2014
  • December 2014
  • February 2015
  • March 2015
  • April 2015
  • June 2015
  • July 2015
  • September 2015

Powered by Blogger