[Ldsoss] updated mlsrpt program

2006-08-19 Thread Bill Pringle
If anyone is using my mlsrpt program, I've just uploaded a new 
version of the program.


This program reads the CSV files you export from MLS and then creates 
a series of CSV and report files.  The CSV files have dates in a 
standard format that can be imported into spread sheets and 
databases, and the report files include a set that are formatted for 
MarkMyScriptures from skimware.


This new version lets you define as many phone numbers and e-mail 
addresses as you want to individuals (not just families as in 
MLS).  You can attach "post-it" notes to individuals (e.g., "works 
nights").  You can also define out-of-unit members who are serving in 
your unit.  (This information isn't exported by MLS at present.)


You can download the latest version of my program from my web site:
http://www.personal.psu.edu/faculty/w/r/wrp103/lds/index.html


I am always open to suggestions if you think of something you would 
like the program to do better (or differently ;^).





---
Bill Pringle
work: [EMAIL PROTECTED]   http://www.unisysfsp.com
http://www.unisys.com
home/school: [EMAIL PROTECTED] http://www.personal.psu.edu/~wrp103
http://CherylWheeler.com

___
Ldsoss mailing list
Ldsoss@lists.ldsoss.org
http://lists.ldsoss.org/mailman/listinfo/ldsoss


RE: [Ldsoss] Scout Tracking

2006-08-19 Thread Steven H. McCown










I’m resending this since it bounced.  Something about being
over 40KB…



 

There are some more serious security
implications with your choice of tools (e.g., injections).  Far from the
definitive word, these are hotly debated, demonstrated, and refuted.  Here
are a couple of blog articles that you should research and consider re PHP:

 

- PHP Insecurity: Failure of Leadership (http://www.greebo.net/?p=320)

 

- PHP Security: Dumb Users or Dumb APIs? (http://www.sitepoint.com/blogs/2006/01/24/php-security-dumb-users-or-dumb-apis/)

 

This is from last year’s Blackhat,
but it’s fairly new and still relevant:

 

- Beefed up OWASP 2.0 introduced at
BlackHat (http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci443,00.html)
 and (http://www.owasp.org/index.php/Main_Page)


 

How to harden this?  It’s a
moving target.  PHP6?  Until it is released and then I’ll say
PHP7…   ;-)

 

The key is that if you don’t
*really* have to be web-accessible, then don’t.

 

Steve






___
Ldsoss mailing list
Ldsoss@lists.ldsoss.org
http://lists.ldsoss.org/mailman/listinfo/ldsoss