A blog on Software Development & Information Security.

 Subscribe to RSS     [Valid RSS]

From The Architect

The Mirai Botnet


Mirai is software that can takeover a large number of internet-connected machines for use in mass attacks on other systems. It spreads by using a list of common passwords against random internet connections. It’s a simple and effective way to find connected machines with weak passwords.

Read more ›

Posted in Computer Security

What Is Cross-Site Scripting (XSS)?

The Swindler

XSS is an abbreviation for Cross-Site Scripting, a type of computer vulnerability normally found in web applications. According to Symantec, Cross-Site Scripting accounted for around 84% of all security-related vulnerabilities in 2007.

Read more ›

Posted in Software Development

WordPress and the Panama Papers Breach

The Panama Papers Breach is a prime example of the importance in regularly updating the WordPress platform.

Read more ›

Posted in Software Development

Stored Procedures Do Not Protect from SQL Injection Attacks

SQL Stored Procedures are considered to be safe from SQL Injection Attacks, however this is not the case. Programs are open to SQL Injection attacks when they concatenate strings and execute them without proper filtering.

Read the entire article at DevX.Com.

Posted in News


On the surface the differences between COALESCE and ISNULL seem minor. In practice there are many differences; some of which are significant. This document attempts to summarize the differences. Read more ›

Posted in Software Development