Recent Posts

    Authors

    Published

    Tag Cloud

    How are SQL Injection attacks prevented?

    SQL injection is a code injection technique, used to attack data driven applications like stSoftware.

    stSoftware systems support a number of web accessible protocols including:-

    • ReST
    • SOAP
    • Web Forms
    • GWT RPC 

    All protocols access the underlying data through the DAL ( data access layer). There is NO direct access to the underlying data store no matter which protocol is used. Each protocol accepts the request to read or write data and then perform the protocols validations and then passes the request on to the DAL to execute the request which in turn validates the request, checks the user's access and perform any validations before returning the result.

    SQL & XSS attacks are automatically tested for each of the supported protocols. Listed below are the standard SQL injection strings attempted.

    SQL Injection String
    "&amp;%00<!--\'';你好
    \'; DROP

    by:Nigel Leck - 14 Mar 2014
    Windows Active Directory Single Sign-on for stSoftware servers

    Overview

    Single sign using Microsoft LAN Manager (NTLM) allows users within a intranet enviroment to use the system without the need to re-enter their password once they have logged into the Windows network.

    Note the NTLM protocol can only be used within a internet environment.  


    by:Nigel Leck - 2 Mar 2014
    Assigning a domain (host) name to your stSoftware hosted website or web system

    After you have registered a new domain name with a domain name (DNS) provider such goDaddy, or you have an exisiting domain name, you need to change the associated IP address so that your domain name points to stSoftware's servers.

    Or contact us to add "Assigning your domain name" service to your website or websystem package and we'll manage it for you.

     

    Assign your domain (host) name to the IP addresses of our servers

    Have your DNS pointed to either of the two groupings of IP addresses below;

    101


    by:Nigel Leck - 1 Jan 2014
    Reporting facilities

    There are many built in reports created in the screen painter. 

    Jasper Reports can be designed and uploaded for more complex reports 

    External tools such as Open Office or Excel can be used to generate reports via JDBC or ReST web services.


    by:Nigel Leck - 13 Dec 2013
    What are the supported browsers?

    Supported desktop browsers

    1. Chrome
    2. Firefox
    3. Safari
    4. Internet Explorer

     

    Supported tablets

    • iPad 2+ with iOS7+
    • Android tables 4.3+

     


    by:Nigel Leck - 13 Dec 2013
    System security overview

    Overview

    stSoftware designs systems to meet or exceed all aspects of the Australian Government Protective Security Policy Framework PSPF. At stSoftware, we take security very seriously. Our ephemeral workload servers are locked down to be accessed only via bastion hosts; the support team can only access the bastion hosts themselves via secure shell from specific IP addresses. 

     

    stSoftware follows Infrastructure as Code principles for all AWS services.


    by:Nigel Leck - 13 Dec 2013
    Rotating Banner ads

    yes, the site owner can/should be able to change anything.

    And technically they can as it's all just JavaScript/HTML/CSS.

    An example is
    SRL when they publish an article the banner image is placed on the carousel and linked to the article. The page reads this information from the RSS feed. 

    Article Banner

     

    carousel


    by:Nigel Leck - 27 Nov 2013
    Page: 1..234..6