The Industry Insiders

Insight from the heart of the IT industry

The Industry Insiders

  • Treat all input as Evil until proved otherwise - how to prevent code injection

    Adrian J. Beasley has provided us with another excellent article titled A General Defence Against Injection Attacks on Websites written in his inimitable fashion tackling the challenging subject of how to validate user input.
  • A General Defence Against Injection Attacks on Websites

    By Adrian J. Beasley The usual range of IT Security techniques is of little use against injection attacks. They can mitigate some of the effects of such attacks by, for example, setting proper permissions on resources, and ensuring that access from...
  • Introduction to SCORM and SharePoint Learning Kit

    SharePoint has been a phenominal success as a product for Microsoft. It has successfully penetrated almost every industry as collaboration & portal platform. SharePoint's role in the enrichment of secondary education has been particularly strong....
  • Introduction to SCORM and SharePoint Learning Kit (SLK)

    SharePoint Learning Kit also known as SLK is a delivery tool for SCORM compliant documents. Certificated as a SCORM 2004 deliverly tool, SLK will turn a SCORM compatible file and deliver it to a user and track their progress. What is SCORM? SCORM...
  • Windows 2008 protection from Accidental deletion

    Many thanks to Richard Siddaway for his article on protecting AD objects from Accidental Deletion. Well worth a read if you've ever deleted the wrong thing from AD.
  • Windows Server 2008 Protection from Accidental Deletion

    By Richard Siddaway, Microsoft Practice Leader, Centiq Ltd With each new version of the Windows Server Operating System there are new possibilities for automation to help make the administrator’s job easier. Automation brings increased efficiencies...
  • Richard Siddaway

    Richard Siddaway is Microsoft Practice Leader for Centiq Ltd, a Microsoft partner specialising in optimisation, measurement, management and migration involving Microsoft technologies. With over 20 years experience in various aspects of IT Richard is currently...
  • The Scoop on OCS and Live Meeting Features

    Thanks to Chris Dalby of Yellow Park for this contributing piece breaking down the great new enhancements made to OCS and Live Meeting! The article can be found here.
  • OCS LiveMeeting Breakdown

    By Chris Dalby The Unified Communications (UC) Launch on 16 October 2007 marks the start of a dramatic change in the way we can all do business. It is clear that Microsoft have been listening to their customers with the release of Live Meeting...
  • Be proactive: Information Security as a Business Enabler

    Thanks to Paul Vincent for contributing his article Information Security; The Business Enabler . Paul goes on to explain how information security is much more than setting every security control you can lay your hands on.
  • Information Security; The Business Enabler

    By Paul Vincent Don’t get me wrong, I’m a tecchie. There was a time (and it wasn’t that long ago!) when I could name and identify the function of pretty much every Group Policy Object setting in Windows XP. However, Information Security is more...
  • ID: Who do you think you are?

    Thanks to Craig Murphy for contributing his article titled Who Do You Think You Are? - it's well worth a read. He talks about identity from the perspective of a variety of vendors and applications.
  • Who do you think you are?

    By Craig Murphy Actually, that's the wrong question, I really need to know who you are, who you really are, please confirm your identity. How are you going to tell me who you are? I've got an e-mail address, send me an e-mail and I'll reply, then you...
  • How to make sense of anti-virus reviews

    Thanks to David Harley for sharing some of his vast experience of the anti-virus industry in his article titled An Insider's Guide to Comparative Anti-virus Reviews . David explains in detail how independant labs evaluate software and includes links...
  • Insider's Guide to Comparative Anti-Virus Reviews

    By David Harley There has been a certain amount of excitement and irritation in anti-virus research circles about a not-very-good comparative test of antivirus scanners that was conducted at LinuxWorld on 8th August, 2007. I was so exercised personally...
  • The wonders of Software Restriction Policies and PowerShell Code Signing

    Thanks to Adrian J. Beasley for providing yet another excellent article, this one's titled Software Restriction Policies and PowerShell Code Signing - Adrian provides a wealth of practical advice how to make the most of one of the most powerful yet under...
  • Software Restriction Policies and PowerShell Code Signing

    By Adrian J. Beasley Health Warning Software Restriction Policies (SRPs) are extremely powerful . They also make it possible for you to foul up big-time - there is no safety barrier. For all that, they are very useful. “With great power...
  • David Harley

    David Harley CISSP has worked in computing since 1986, and first fell semi-accidentally into security and antivirus research in 1989. His background includes systems, applications and network support and administration, and includes PCs, Macs, Unix and...
  • To secure your documents, or not, that's the question

    Adam Vero is our newest contributor. I encourage you to read his pragmatic advice for securing information is his post titled Don't Secure Your Documents . His proactive "security as an enabler" perspective makes a refreshing read.
  • Paul Vincent

    Paul is a Cyber-defence consultant who provides technical Information Security advice to Financial Institutions. Having worked in technology and engineering disciplines for 15 years, Paul has tried to develop a logical approach to the field of I.S...
  • Craig Murphy

    Craig Murphy is an author , developer, speaker, podcaster , Microsoft MVP and is a Certified ScrumMaster. He enjoys working with .NET, C#, Borland Delphi, XML/Web Services, XSLT and is a great follower of Test-Driven Development, Extreme Programming,...
  • Don’t secure your documents!!

    By Adam Vero ...or rather, don’t use poor methods to secure documents (or anything else – this is bordering on Security Theatre). Also, don’t spend valuable IT resources securing things for users on a case-by-case basis by creating a tangled web of...
  • Adam Vero

    Adam Vero - Technical Director of Meteor IT Ltd Meteor IT is a consulting and training services firm based in Leeds providing systems installation and management consultancy for businesses in the professional services sector and a variety of SMEs....
  • Sharepoint Interview questions

    Adoption of the SharePoint platofrm is growing rapidly and for every new deployment there is a requirement for staff to support and maintain it. Identifying the necessary skills in potential new recruits for individuals who have not had sufficient experience...
  • Sharepoint Interview Questions to ask

    Stephen works with a lot of customers who ask him about SharePoint, and the sort of questions that they should ask candidates at interviews in order to demonstrate what they know about the product and their strengths in particular areas. He's put together...