Building Secure Web Applications

When working on a new web application there are some crucial aspects to your application security that all developers should follow. This applies to both a production and test environment. Just because an application is in-test or not production-ready does not excuse poor security. There are a few examples of where even ‘secure’ environments have been exploited through their test systems. Secure Development Environments Should not use real-world data and should rely on faker or placeholder data. This can be more time consuming for agile teams as the data may change over time, which is why your ORM models should… Continue reading Building Secure Web Applications

Making a Web Scraper to Download Images off the Internet

One afternoon I read on a popular website that http://prnt.sc/ uses sequential 6 character codes to host user images on their website, this made me wonder what was on there. The next day I made a small bot to scrape the website and collect all images through a range and then the bot could run multiple times to collect more images if necessary. I left the bot running for a couple of hours and here’s what I managed to find, I’m sure I cannot re-host the images but the range I scraped through was gmmlaq for 1,287 images before the… Continue reading Making a Web Scraper to Download Images off the Internet

The Cheap Raspberry Pi Security Camera

One of the great things about the Raspberry Pi is the community that works to create really great projects. I have setup a Raspberry Pi B looking out my windows. It faces the front door so can see anyone coming down the street and toward the door. I had a couple cheap $2 webcams lying around so I set them up looking out the windows. The total cost of the entire setup is about $10, minus the cost of the Pi itself, I also think that the Pi is a little underpowered for the task as occasionally the thing will stop… Continue reading The Cheap Raspberry Pi Security Camera

Six things ICT Provide

ICT is used globally, and has multiple points that are useful to it.   Fast Repetitive Processing allows companies and individuals to process large quantities of data at once and quickly, repetitive tasks allow for people to make personalised and tailored reports and information, things like bank statements can be processed rapidly overnight at low points in the day. New technologies mean that they can perform complex calculations quickly and effectively.   Vast Storage Capacity means that IT systems can store larger quantities of data in smaller form factor, large businesses are able to store large quantities of data and… Continue reading Six things ICT Provide