%41%43%45%20%54%65%61%6d

HelloSecureWorld.com Launched

Discover the New HelloSecureWorld Security Resource www.HelloSecureWorld.com provides a powerful...

Author: Techjunkie2 Date: 02/01/2008

First Line of Defense for Web Applications – Conclusion

Platform features for validating input in .NET Framework There are many platform features which...

Author: Techjunkie2 Date: 01/06/2008

First Line of Defense for Web Applications – Part 5

First of all folks, my apologies for this delayed post. I have been traveling and busy doing a very...

Author: Techjunkie2 Date: 12/17/2007

First Line of Defense for Web Applications – Part 4

I am on a red eye flight back to Seattle from Dulles, VA where I just finished delivering some...

Author: Techjunkie2 Date: 11/12/2007

First Line of Defense for Web Applications – Part 3

Precaution: Are you consuming Unexpected Input Technology is developing fast and web programming...

Author: Techjunkie2 Date: 10/30/2007

Microsoft Research Reveals New Trends in Cybercrime This is well worth reading if you're in Info...

Author: Techjunkie2 Date: 10/27/2007

Some technical details on how XSSDetect does Dataflow Analysis

Hi, my name is Hassan Khan. I work for the ACE Engineering Team, which is a part of the ACE...

Author: Techjunkie2 Date: 10/24/2007

First Line of Defense for Web Applications – Part 2

Hello everyone, as promised I am back with the next post on input validation series for web...

Author: Techjunkie2 Date: 10/23/2007

Inside the Matrix for Mobiles A pretty interesting concept: hack together a platform for connecting...

Author: Techjunkie2 Date: 10/20/2007

First Line of Defense for Web Applications – Part 1

Hi folks, I am Anmol Malhotra and I work with ACE Services Team as a security consultant. There are...

Author: Techjunkie2 Date: 10/13/2007

All about the data: IT security starts with a data-centric worldview ACE Team's Roger A. Grimes has...

Author: Techjunkie2 Date: 10/13/2007

Securing the Gateway to Your Enterprise: Web Services

Eugene Siu, a Senior Security Consultant on the ACE Team has just published a great article...

Author: Techjunkie2 Date: 10/13/2007

Mark Curphey joins Microsoft's ACE Team

We're super excited to have Mark aboard, Mark was formerly running FoundStone Consulting and also...

Author: Techjunkie2 Date: 10/08/2007

What's hot in Microsoft security: White lists; Blue hats A discussion on Symantec’s proposal to...

Author: Techjunkie2 Date: 10/05/2007

The difference between pentesting and an application development security process Part I

Many times when we’re speaking with a customer or reviewing material from security vendors, the...

Author: Techjunkie2 Date: 10/05/2007

Welcome, finally.

Over the last several weeks after launching this blog we’ve had several logistical issues to deal...

Author: Techjunkie2 Date: 10/05/2007

Update

Thank you all for the tremendous response and support. I've gotten so many of your messages that...

Author: Techjunkie2 Date: 09/15/2007

welcome to a different kind of blog from microsoft

Hello world. Welcome to a new blog from Microsoft. The focus of this blog is likely to be a little...

Author: Techjunkie2 Date: 08/26/2007