Daly Realism was founded in 1996 by Leonard Daly to provide high quality services and support to businesses for their Internet requirements. We specialize in the development of systems for transmitting, receiving, and sharing confidential information over the Internet. Our expertise is based is strong project management, business analysis, and information visualization coupled with detailed technical knowledge of information systems.

We are please to announce that Daly Realism is offering a new service in support of the Payment Card Industry's (PCI) Data Security Standard (DSS). This service helps you with the annual audits you need to perform on your systems that accept or process credit cards. Learn More...

Daly Realism can help you business with project management, web site development, secure business-to-business communications, elearning, and web-based 3D and multi-media content. Take a look through our site and contact us with your needs.

Stealing Passwords

Yesterday (2014 Apr 08) news of a major vulnerability of standard encryption software was released. The software is used in an estimated 66% of all web sites. The software is called OpenSSL. It is an open-source implementation of standard encryption algorithm that allows your browser to securely communicate with a web server. This problem is restricted to sites that have or use OpenSSL. Check your site.

Cloud Computing Opportunities (Part 2)

Right Image: 

Notes for Pages 1 & 2 are available at Cloud Computing Opportunities. The page references are for the attachment to this post.

Page 3:

Four of the main issues that come up when considering moving part of your business operation to the cloud are: Security, Access, Cost, and Ownership. It is important to consider all of these issues as they can affect your business. Only the second issue is not related to the cloud service provider.

Cloud Computing Opportunities

Right Image: 

Cloud computing offers small and medium businesses (SMB) many opportunities to reduce computing costs and improve their internal computing operations. The attached file contains the slides from a presentation I made to a group of SMB executives. The discussion below is my slide-by-slide notes. The slides are two per page, and the notes are listed by page number. This posting covers pages 1 and 2. Pages 3 and 4 are at Cloud Computing Opportunities (Part 2).

Page 1:

Views, Dates, and Arguments

in

This is work done in Drupal V6. Drupal is an Open-Source Content Management System. More information is available at http://drupal.org.

I needed to create a View for a Custom Content Type that took an optional date (year) as an argument. I followed the normal process for defining the various fields of a View. The argument was defined with my custom content value (field_event_season). The definition included creating a 'Summary, sorted ascending' action if no value was present. Since I wanted to display the entire list, this is the appropriate setting.

Weak Passwords At Fault for "Morto A"

This is a short follow-on to the Passwords and Hacking series.

The Internet worm "Morto A" continues to infect computers. It uses Microsoft's Remote Desktop to spread. It attempts to gain access to your computer using Remote Desktop's protocol. It will succeed if your password is one of 37 simple passwords listed below.

Solution: Don't use a simple password. See Passwords and Hacking for various means to create complex passwords.

Syndicate content