Tag Archives: Security

Every Cloud requires a Security lining !

      1 Comment on Every Cloud requires a Security lining !

Security is the paramount challenge of Cloud computing – Ofcourse, what is the point of scaling out if your data is available naked on the Internet ? It comes as no surprise to me, to find out the recent IDC research survey revealed Security as the top concern – critical to the success of Cloud adoption. For more details of… Read more »

Security Guidance for "Sun Certified Enterprise Architect" for Java EE5 exam

Not a shameless promotion – I came to know from multiple feedback and praises from the people who took the Sun Certified Enterprise Architect exam.  Core Security patterns is overwhelmingly suggested as a reference text for “Section 8 – Security” of Sun Certified Enterprise Architect for Java EE5 exam.  Section 8: Security Explain the client-side security model for the Java SE environment,… Read more »

Massachusetts 201 CMR 17.00 imposes "Protection of Personal Identity Information".

A month ago, I had a chance to meet with John Beveridge (Deputy State Auditor at Office of the State Auditor of Massachusetts) at an ISACA event in Boston. During a casual chat, he briefly mentioned about the upcoming regulation highlighting “Mass 201 CMR 17.00 – Massachusetts Standards for Data Protection of Personal Information”  and it’s compelling security requirements ! … Read more »

Provisioning/De-Provisioning Biometric credentials and Convergence of Physical/Logical Access Control Systems

It’s been a while, I had been hearing a lot of talk about unified biometric credentials and using then for convergence of physical and logical access control systems – Like me, you might’ve heard a lot of high-level marketing or analyst’s stuff … so here is some realities from my hands-on experience ! Frankly, there is no magic silver bullet… Read more »

Stronger Authentication with Biometric SSO (Using OpenSSO and BiObex).

I had been involved with multiple Biometric ISV providers and its integration with Sun technologies particularly OpenSSO, IdM, Sun Rays and Solaris. I also had the opportunity to deploy Biometric solutions to few govt organizations that starts with “D” and “N”. Believe it or not…we have few of them in production. Now, getting down to the specifics – Putting it… Read more »

Exploiting MD5 collisions and Creating Fake CA certificates.

It’s been a while, MD5 has been known for its several weaknesses and multiple proven attack scenarios showing how it can be compromised – For those known reasons, a lot of us try our best to stay away from using MD5. Last week at the Chaos Communication Congress Conference – Berlin a bunch of researchers disclosed this eye-raising MD5 collision… Read more »

Filthy' Rich JavaFX :-)

      No Comments on Filthy' Rich JavaFX :-)

I had my chance to play with JavaFX and its samples.  Wow ! unbelievably cool stuff and JavaFX raises the bar for other RIA API tools.  In my experience, JavaFX eats AJAX and other RIA scrApting tools for lunch ! JavaFX offers an easy to understand declarative API for building RIA applications that can include Media, Graphics, XML Web Services… Read more »

NSA probes into Microsoft .NET framework :-)

      No Comments on NSA probes into Microsoft .NET framework :-)

Few weeks ago, I picked this document from one of my crazy mailing list subscriptions – Surprising to note an email, that featured an NSA UNCLASSIFIED document that digs deep into Security features of Microsoft .NET Framework ( versions 1.0, 1.1 and 2.0).  The document is a bit dated and it did’nt highlight the latest security features of .NET version… Read more »

Amazon EC2 Cloud hosts Spammers !

      No Comments on Amazon EC2 Cloud hosts Spammers !

The CLOUD computing buzz.. always sounded to me like another hosting infrastructure services that builds on XEN Virtualization services. What it makes more compelling is…. it facilitates on-demand/out-sourced datacenter that scales up and allows us to pay-as-you-go for used services. Couple of months ago, I had a chance to try out my own Amazon EC2 Web services account playing with… Read more »

Using PIV cards in a Sun Ray Environment.

      No Comments on Using PIV cards in a Sun Ray Environment.

Sun Ray Thin Clients has been widely popular in Government applications for a while now.  With the introduction of HSPD-12/PIV cards,  I had multiple requests from my SI friends asking me to verify whether PIV cards work on SunRays for hotdesking and enabling PKI based authentication.  As on today, Sun Ray Session Server 4.0 does’nt officially support PIV cards …particularly… Read more »