[SC-L] Bring your Cloud to Work Day

2010-03-20 Thread Gunnar Peterson
Flip side of Lifestyle Hacking aptly described by Messrs McGraw and  
Routh is when your organization cannot deliver the functionality/data/ 
usability that the consumers need.


http://1raindrop.typepad.com/1_raindrop/2010/03/bring-your-cloud-to-work-in-iraq.html

-gunnar
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] SC-L Digest, Vol 6, Issue 56

2010-03-20 Thread AK

 As soon as a non-developer creates code, they are no longer a 
 non-developer.  By definition, they are now a developer!

 Of course, they may completely lack any kind of knowledge about security.  
 Just like most developers, I should add.  I expect this problem to *increase* 
 over time.


   

For the case that one is creating a product/service I will have to
rephrase a bit.

Substitute non-developer with person who lacks all but the most basic
notions of software engineering. So, technically, yeah they are
developers but probably they are not good developers and will run to a
multitude of problems, one of which will be security.


However, by non-developers, I was meaning people who write code as a
one-off, (e.g. a security consultant writes some quick and dirty code
to fuzz something, or someone writing a script for home use). Even if
the security knowledge is there, since security is not a required
property, it just will not in the resultant code, as the code is
supposed to be used a few times and then thrown away (or hopefully
rewritten :-) )
 That may be true in some places.  But all too often real knowledge and 
 expertise is rare.  Many System Admins, esp. in the Windows world, do not 
 understand the underlying technology at all.  They only know how to how to 
 point-and-click based on recipes created by others (e.g., local instructions 
 or whatever Google tells them).  All too often we *train* while ignoring 
 *education*.

 When they have to program at all, these kinds of people perform cargo cult 
 programming (see http://en.wikipedia.org/wiki/Cargo_cult_programming ).
   

If an organization hires (or outsources to) point-n-click admins (which,
I'll hazard a guess, on average will cost cheaper than the admins who
have invested time sharpening their saw), the organization will most
likely have operational problems, which are not limited to security,
even before the admins type shebang, IMHO.
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


[SC-L] free scans from Google...

2010-03-20 Thread Benjamin Tomhave
I guess we can all retire now, eh? I find it so exciting that the app is
written in pure C... and coming from Google, I'm sure it won't leak
info back to the mothership at all...

Meet skipfish, our automated web security scanner
http://googleonlinesecurity.blogspot.com/2010/03/meet-skipfish-our-automated-web.html

-- 
Benjamin Tomhave, MS, CISSP
tomh...@secureconsulting.net
Blog: http://www.secureconsulting.net/
Twitter: http://twitter.com/falconsview
LI: http://www.linkedin.com/in/btomhave

[ Random Quote: ]
Do you think that when they asked George Washington for ID that he just
whipped out a quarter?
Steven Wright

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] SC-L Digest, Vol 6, Issue 56

2010-03-20 Thread ljknews
At 7:56 PM +0200 3/19/10, AK wrote:

 It is way easier for attackers to reverse engineer desktop applications
 than web applications. Assuming proper server configuration, it is next
 to impossible for an attacker to get the server side source code or
 compressed form (e.g WARs) for a web application and proceed with
 disassembly/decompilation/patching.

Assuming proper _desktop_ configuration, the user does not have
the ability to modify the programs they will execute, nor change
the protections of objects on the system.

http://nvd.nist.gov/fdcc/fdcc_faq.cfm

Yes, physical access to a computer means ultimately it is possible
to gain control, but the necessary measures to not constitute
easier, and given control of one test machine it is not at all
trivial to transfer that to control of another machine, especially
if the machines are not connected to a common network.
-- 
Larry Kilgallen
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___