By

Ravel Charles
This article is to help readers understand the differences/similarities between XSS and CSRF attacks. These are attacks that are common in the application security realm. This information may be useful for a job interview one day. I hope you enjoy! The main difference between Cross-Site Scripting (XSS) and Cross Site Request Forgery (CSRF) is in...
Read More
By: Ravel Charles & Gillian Cowen | athenahealth Integration Design  For three days, over 250 global developers, designers, and entrepreneurs accepted the challenge to build something that would foster better health for their communities and the world. They were hacking healthcare at the first ever HLTH Hackathon at the Aria in Las Vegas. These hackers...
Read More
The topic of “Hacktivism” is one of importance. Hacktivism is a term that can be “credited to the Cult of the Dead Cow”, a hacker group that argued that universal access to the internet is a human right. Hacktivist aim to cause social change, just as many others have done in the past, through the...
Read More
If you have ever used API’s before then you are probably familiar with OAuth. If not, no worries, read below and expand your authentication knowledge! OAuth has become one of the emerging as a standard for authorization. Important Terms Lets get you up to speed with a couple of terms: OAuth is an authorization protocol...
Read More
Through my graduate school I was fortunate to work with Revitalize CDC on a system analysis project. I worked on this project with several other teammates. Review findings here: Systems Analysis Report and Recommendations Please note that this is a Report that I and my team created during grad school. We were able to accomplish...
Read More
Through my graduate school I was fortunate to work with Parker Chomerics on a advertising data project for their marketing department. You can review my findings here: Analysis With revenues greater than 1 Billion, Chomerics Division is part of the Parker Hannifin Corporation Engineered Materials Group, and is a global leader in the development and application...
Read More
There are many definitions as to what IT Infrastructure is.  It can be formally defined as all of the hardware, software, networks, facilities, etc that are required to develop, test, deliver, monitor, control or support IT. The term IT Infrastructure includes all of Information Technology, but not the associated people, processes and documentation.  In general,...
Read More
The following is a quick description on Encoding, Encryption and Hashing. This post is to quickly help anyone understand these concepts and the differences with each. Encoding is the act of transforming data from one form into another. This type of transformation does not require a key, as it should be able to decoded by...
Read More
The following below is my personal opinion on what the three most significant threats are in regards to the information we are sharing today. Data sharing and data privacy dominate the news these days as companies are being investigating for their policies and people are beginning to crack down on their habits. This is my...
Read More
This post showcases a network diagram of an office space with the following arrangements: A reception area, 4 offices for management, 1 conference room, 10 work stations for the project team, a computer room with several servers and at least one printer.  I assume that the reception area will have one computer and one printer...
Read More
1 6 7 8 9 10