Christopher Frenz

Subscribe to Christopher Frenz: eMailAlertsEmail Alerts
Get Christopher Frenz via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Christopher Frenz

With the release of Visual Studio .NET and the structured error-handling capabilities of the .NET Framework came significant improvements in the way that VS programmers are able to capture and deal with programmatic errors. Yet these more robust abilities do not lessen the importance of one of the most time-tested means of error handling: prevention. In this article I will highlight various methods of data validation that can be used to eliminate potentially problematic errors before they have a chance to occur. Data validation checks any inputted data for potential problems prior to the data being passed on to the program logic associated with application functionality. This article will give an overview of the two major types of data validation, field-level and form-level. Field-Level Validation Field-level validation deals with data that is being entered or that wa... (more)

Your Computer's Immune System

Parallels have often been drawn between the computer security landscape and the biological world, since security threats such as computer viruses and worms can be viewed as digital incarnations of common biological threats.  Similarities exist in terms of modes of reproduction as well as infection, and some research even suggests that digital threats follow the laws of evolution that predict these threats will become more sophisticated and effective as time progresses.  A logical extension of this concept has always been to therefore consider the idea of computer security as a fo... (more)

Why 'LiveCD' Should Be a Part of Every Computer User's Vocabulary

Throughout the last decade, society has witnessed an explosion of network connectivity among PCs and mobile devices as well as a vast proliferation of networked applications, ranging from Web-based email to online banking. The end result of this is that network connectivity has become an almost indispensable resource for many individuals. Yet along with the convenience and flexibility of anytime, anywhere network access, society has also seen an increase in computer-related security and privacy concerns, with the most dreaded being the possibility of identity theft.  While numero... (more)

Using PHP to Enhance Password Security

When dictating password policies to users, it is common for such policies to require that users generate passwords that contain a combination of uppercase and lowercase letters, as well as numbers and special characters. Moreover, it is well established that the strengths of such passwords are further enhanced if the passwords do not in any way resemble dictionary words, since minor substitutions of dictionary words and names are often included in the dictionaries used in dictionary-based attacks and in some rainbow table variants. Thus "D3veloper" would be a less than ideal pass... (more)

The Development of a Perl-based Password Complexity Filter

If you watch the news regularly, it is easy to notice that in almost any given week some company seems to have experienced an electronic break-in or in some other way experienced a form of computer or network compromise. While computer security professionals can help to mitigate such risks via the proper configuration of firewalls, careful crafting of Access Control Lists, the application of updates, and the judicious application of file permission, among other measures, it's important that one of the most fundamental ways of improving the security of a computer or network resour... (more)