This post is about secure internet protocols, and mainly about a bizarre phenomenon that prevents us from using SSL security in many situations where it would be useful. What is bizarre is that I don’t think anyone intends it, but there seems to be a natural reaction that leads to less secure systems. While some might attribute this cynically to element who want to make money, I don’t think that is the real driver in this case. Instead, it seems to be natural tendency toward the “security purist” who would rather be completely open and unprotected than to be partially safe. Continue reading
Category Archives: Software
Self-Organizing Business Networks
As the Social Business meme becomes more mainstream, people are starting to ask “What is the real connection with ‘Social’ after all?” and “Isn’t the connection to ‘Social’ a bit overblown?” After all, we really are not talking about literally placing Facebook (as the canonical example) inside a business. Why, then, call it social? Continue reading
Web Security vs. Superstition, Part 4
Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles. Part 4 is about some strange behavior I have seen in security groups and other insanity.
Continue reading
Web Security vs. Superstition, Part 3
Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles. Part 3 is about an experience I had with a public forum, and their justification for deviating from these guidelines. Continue reading
Web Security vs. Superstition, Part 2
Web site security is a very important issue to me. I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles. Part 2 is in response to my meeting with such a “security expert”.
Continue reading
Web Security vs. Superstition, Part 1
Web site security is a very important issue to me. Every application, every information resource, must be built strong enough to put in the Internet, to reliably deliver information to those allowed access, and prevent delivery to those who are not. I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles. Part 1 lays down the requirements for a secure web application. Today’s post is prompted by my meeting with such a security expert. Continue reading
The Thin Gray Cloud
I encountered a cloud problem this week. A couple of years ago I would have said that I encountered a server hosting problem, but we must be fully buzz-word compliant. It seems there are two main kinds of clouds, but I am predicting one will disappear in the long run. Don’t say I didn’t warn you. Continue reading
Security and Email Confirmation
I was using a site today that has a “security” procedure that is so poorly designed, that I thought it was worth discussion. When it comes to aspects of security, I believe it is a good idea to publicize wrong approaches widely, so that those implementing web sites will learn not to take that approach. Let this be a lesson. Continue reading
Social Has No Future (Yet)
This provocative title simply means: In general, social software systems record what is happening now and in the past, but for the most part completely lack any representation of the future. Enterprise Social Software, or Social Business Software, will succeed only if it has some representation of goals or other future activities. Continue reading
The Login Test
This post is on the usability of authenticating to a site. Entering your username and password, what could be complicated about that? But, surprisingly, so many sites get it wrong. The “Login Test” is a measure of one specific aspect of logging in. Continue reading