877.791.9571 |

About the Author:

Adrian Stolarski is a freelance security tech blogger, specializing in Java, PHP, and JQuery. In his own words, he does the hard work of training the unemployed. Currently, he handles Evaluation Visualization for real-time systems with XWT and Eclipse RAP. If he sees that something works, he asks how it works and why it works, then sets out to make it work better. A researcher for InfoSec Institute, he currently lives in Poland, but plans to move to London.
Team-Building-sized

The ideal method of team building

I have written a lot about building flexible Agile teams and their usual shortcomings. However, there is a river of information behind it and improving our knowledge of building […]

virtual-honey-pot-sized

Virtual Honeypots

At the beginning of this series of tutorials, I would like to note one thing: All the activities that we usually take to increase the security of information systems […]

PHP-risks-sized

PHP Session ID’s – The Risks

,

In today’s article I want to address a very important topic. Namely, I want to talk about PHP session security. I know and understand that this is a very […]

Festive-Fraudsters-sized

Can Festive Fraudsters Make Money on the Internet Before Christmas?

Pre-Christmas fever has slowly embraced us all. Everyone was happy to give donations to charitable organizations or throw a few dollars to help some children. But there are some […]

phplogo-highres-sized

Nine Wishes for Your PHP Applications

When it comes to PHP, some 99% of amateur sites and 60-70% of all sites use the professional scripting language called PHP. But is it safe to use PHP? […]

jquery_logo-sized

How to Safely and Wisely use jQuery: Several Key Issues

At the beginning of this article, I want to thank all those without whom this article would not exist. For starters, I’d like to thank Izabela Galazewska. You are […]

selinux-penguin-new_sized

SELinux Raises the Bar Against Intruders: An Introduction

A task of any operating system is to provide software that strongly increases its security. A lot of programs of this type have been created; some are better than […]

projects-sized

A Final Word on Estimating Projects

We have previously traced all types of estimates, and we introduced Planning Poker. Today, we finish that and do a summary of the entire series. As I have said, […]

PAS-sized

PAM Authentication Service Administrator, Part I

The idea for this series of articles came to my mind when the first series of articles about the honeypot and SELinux appeared. Sometimes we want to demonstrate knowledge, […]

ftp_sized

How do I go about hacking FTP? Part III

Oh boy, this whole series about FTP hacking is really getting long. There’s just too much information to cover in just one article. In fact, if you ever have […]

ftp_sized

How do I go about hacking file transfer protocol? Part II

In the previous part of this article series, we introduced the topic of FTP security, and the basics of how the protocol works. After reading that previous article, you […]

projects-sized

Estimating Projects Part III

In previous articles on planning and estimating projects, we explored the basic principle of estimates. Estimating cannot really determine precisely what we will provide to the client or what […]

ftp_sized

How do I go about hacking file transfer protocol? Part I

Usually, I write about human resource management, risk assessment and project estimation almost every day, but from time to time, I get an e-mail from InfoSec asking for purely […]

programming

Good Programming Techniques – Exceptions to Program, Part 2

In a previous article, we introduced the concept of exceptions. As I mentioned, this is the most important thing when writing high-quality software. Today we will develop this concept […]

cables

Computer Network Diagnostics Part 4

In previous articles on the diagnosis of computer networks we generally learned a lot of tools available and understood how they work. Today we will be doing something much […]

Corporate_Governance_3

The Most Common Problems in the Implementation of Agile Methodologies in Companies, Part 1

As you know, I delight in writing articles on the Agile environment. Why is that? Because I like to advise people about the methodology of software development. Agile is […]

cables

Computer Network Diagnostics, Part 3

Previously, we took the principles of DHCP and DNS servers. We already know how to operate, inter alia. We also have data on how computers communicate over a network. […]

corporate puzle

The Most Common Problems in the Implementation of Agile Methodologies in Companies, Part 2

Previously, we took a major problem with which organizations are faced in the implementation of Agile methodologies in companies. It was where the lack of competence of people when […]

cables

Computer Network Diagnostics Part 2

For part 1 of this series, please click here.

Troubleshooting a computer network is really a very vast topic. In the first part of the series you learned how to […]

cables

Computer Network Diagnostics, Part 1

Sometimes, at the beginning of my adventure to the Internet, I was wondering how it is that I have a local area network and Internet access. See for yourself, […]