

{"id":727,"date":"2011-12-30T10:51:51","date_gmt":"2011-12-30T15:51:51","guid":{"rendered":"https:\/\/rud.is\/b\/?p=727"},"modified":"2018-03-10T07:53:38","modified_gmt":"2018-03-10T12:53:38","slug":"three-resolutions-for-web-developers","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","title":{"rendered":"Three Resolutions For Web Developers"},"content":{"rendered":"<p>I&#8217;m on a &#8220;<a href=\"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/\">three things<\/a>&#8221; motif for 2012, as it&#8217;s really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports, user help requests or just ensuring proper caffeine levels are maintained.<\/p>\n<p>In 2011, web sites took more hits then they ever have and\u2014sadly\u2014<em>most<\/em> attacks could have been prevented. I fear that the pastings will continue in 2012, but there are some steps you can take to help make your site less of a target.<\/p>\n<p><strong>Bookmark &amp; Use OWASP&#8217;s Web Site Regularly<\/strong><\/p>\n<p>I&#8217;d feel a little sorry for hacked web sites if it weren&#8217;t for resources like <a href=\"https:\/\/www.owasp.org\/index.php\/Category:How_To\">OWASP<\/a>, tools like <span class=\"removed_link\" title=\"https:\/\/www.ironbee.com\/\">IronBee<\/span> and principles like <a href=\"http:\/\/www.ruggedsoftware.org\/\">Rugged<\/a> being in abundance, with many smart folks associated with them being more than willing to offer counsel and advice.<\/p>\n<p>If you run a web site or develop web applications and have not inhaled all the information OWASP has to provide, then you are engaging in the Internet equivalent of driving a Ford Pinto (the exploding kind) without seat belts, airbags, doors and a working dashboard console. There is <i>so<\/i> much good information and advice out there with solid examples that prove some truly effective security measures can really be implemented in a single line of code.<\/p>\n<p>Make it a point to read, re-read and keep-up-to-date on new articles and resources that OWASP provides. I <strong>know<\/strong> you also need to beat the competition to new features and crank out &#8220;x&#8221; lines of code per day, but you also need to do what it takes to avoid joining the ranks of those in <a href=\"https:\/\/blog.datalossdb.org\/\">DataLossDB<\/a>.<\/p>\n<p><strong>Patch &amp; Properly Configure Your Bootstrap Components<\/strong><\/p>\n<p>Your web app uses frameworks, runs in some type of web container and sits on top of an operating system. Unfortunately, vulnerabilities pop up in each of those components from time to time and you need to keep on top of those and determine which ones you will patch and when. Sites like <a href=\"https:\/\/secuniaresearch.flexerasoftware.com\/community\/advisories\/\">Secunia<\/a> and <a href=\"https:\/\/www.us-cert.gov\/\">US-CERT<\/a> aggregate patch information pretty well for operating systems and popular server software components, but it&#8217;s best to also subscribe to release and security mailing lists for your frameworks and other bootstrap components.<\/p>\n<p>Configuring your bootstrap environment securely is also important and you can use handy guides over at the <a href=\"https:\/\/learn.cisecurity.org\/benchmarks\">Center for Internet Security<\/a> and the <a href=\"https:\/\/nvd.nist.gov\/ncp\/repository\">National Vulnerability Database<\/a> (which is also good for vulnerability reports). The good news is that you probably only need to double-check this a couple times a year and can also integreate secure configuration baselines into tools like <a href=\"https:\/\/www.wired.com\/2011\/10\/chef-and-puppet\/\">Chef &amp; Puppet<\/a>.<\/p>\n<p><strong>Secure Data Appropriately<\/strong><\/p>\n<p>I won&#8217;t belabor this point (especially if you promise to read the OWASP guidance on this thoroughly) but you need to look at the data being stored and how it is accessed and determine the most appropriate way to secure it. Don&#8217;t store more than you absolutely need to. Encrypt password fields (and other sensitive data) with more than a plain MD5 hash. Don&#8217;t store any credit card numbers (really, just don&#8217;t) or <span class=\"removed_link\" title=\"http:\/\/www.akamai.com\/html\/solutions\/security\/edge_tokenization.html\">tokenize<\/span> them if you do (but you really don&#8217;t). Keep data off the front-end environment and watch the database and application logs with a service like <a href=\"https:\/\/www.loggly.com\/\">Loggly<\/a> (to see if there&#8217;s anything fishy going on).<\/p>\n<p>I&#8217;m going to cheat and close with a fourth resolution for you: <a href=\"http:\/\/www.experian.com\/blogs\/data-breach\/2011\/02\/22\/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported\/\">Create (and test) a data breach response plan<\/a>. If any security professional is being honest, it&#8217;s virtually impossible to prevent a breach if a hacker is determined enough and the best thing you can do for your user base is to respond well when it happens. The only way to do that is have a plan and to test it (so you know what you are doing when the breach occurs). And, you should run your communications plan by other folks to make sure it&#8217;s adequate (ping @securitytwits for suggestions for good resources).<\/p>\n<p>You want to be able to walk away from a breach with your reputation as intact as possible (so you&#8217;ll have to keep the other three resolutions anyway) with your users feeling fully informed and assured that you did everything you could to prevent it.<\/p>\n<p><em>What other security-related resolutions are you making this year as a web developer or web site owner and what other tools\/services are you using to secure your sites?<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m on a &#8220;three things&#8221; motif for 2012, as it&#8217;s really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports, user help requests or just [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[61,63,3,7,4,26],"tags":[92,100,199,578,581,567,579,576,291,575,382,150,580,582,458,738,577,95,569,570,186,574,571,568,573,572,583],"class_list":["post-727","post","type-post","status-publish","format-standard","hentry","category-breach","category-development","category-information-security","category-programming","category-risk","category-vulnerabilities","tag-bootstrapping","tag-computer-network-security","tag-computer-security","tag-counsel","tag-data-breach","tag-ford","tag-ford-pinto","tag-hacked-web","tag-internet","tag-internet-equivalent","tag-operating-system","tag-operating-systems-2","tag-owasp","tag-patch","tag-secure-communication","tag-security","tag-server-software-components","tag-statistics","tag-toolsservices","tag-web-app-uses-frameworks","tag-web-applications","tag-web-container","tag-web-developer","tag-web-developers","tag-web-site-owner","tag-web-site-regularly","tag-web2py"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Resolutions For Web Developers - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Resolutions For Web Developers - rud.is\" \/>\n<meta property=\"og:description\" content=\"I&#8217;m on a &#8220;three things&#8221; motif for 2012, as it&#8217;s really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports, user help requests or just [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-30T15:51:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-10T12:53:38+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Three Resolutions For Web Developers\",\"datePublished\":\"2011-12-30T15:51:51+00:00\",\"dateModified\":\"2018-03-10T12:53:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\"},\"wordCount\":754,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"Bootstrapping\",\"Computer network security\",\"Computer security\",\"counsel\",\"Data breach\",\"Ford\",\"Ford Pinto\",\"hacked web\",\"Internet\",\"Internet equivalent\",\"Operating System\",\"operating systems\",\"OWASP\",\"Patch\",\"Secure communication\",\"Security\",\"server software components\",\"Statistics\",\"tools\/services\",\"web app uses frameworks\",\"web applications\",\"web container\",\"web developer\",\"Web Developers\",\"web site owner\",\"Web Site Regularly\",\"Web2py\"],\"articleSection\":[\"Breach\",\"Development\",\"Information Security\",\"Programming\",\"Risk\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\",\"url\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\",\"name\":\"Three Resolutions For Web Developers - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"datePublished\":\"2011-12-30T15:51:51+00:00\",\"dateModified\":\"2018-03-10T12:53:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Resolutions For Web Developers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Resolutions For Web Developers - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","og_locale":"en_US","og_type":"article","og_title":"Three Resolutions For Web Developers - rud.is","og_description":"I&#8217;m on a &#8220;three things&#8221; motif for 2012, as it&#8217;s really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports, user help requests or just [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","og_site_name":"rud.is","article_published_time":"2011-12-30T15:51:51+00:00","article_modified_time":"2018-03-10T12:53:38+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Three Resolutions For Web Developers","datePublished":"2011-12-30T15:51:51+00:00","dateModified":"2018-03-10T12:53:38+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/"},"wordCount":754,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["Bootstrapping","Computer network security","Computer security","counsel","Data breach","Ford","Ford Pinto","hacked web","Internet","Internet equivalent","Operating System","operating systems","OWASP","Patch","Secure communication","Security","server software components","Statistics","tools\/services","web app uses frameworks","web applications","web container","web developer","Web Developers","web site owner","Web Site Regularly","Web2py"],"articleSection":["Breach","Development","Information Security","Programming","Risk","Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","url":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","name":"Three Resolutions For Web Developers - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-12-30T15:51:51+00:00","dateModified":"2018-03-10T12:53:38+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Three Resolutions For Web Developers"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-bJ","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":600,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/","url_meta":{"origin":727,"position":0},"title":"What Can We Learn From The @lulzsec senate.gov Hack Dump?","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"What can the @lulzsec senate.gov dump tell us about how the admins maintained their system\/site? [code light=\"true\"]SunOS a-ess-wwwi 5.10 Generic_139555-08 sun4u sparc SUNW,SPARC-Enterprise[\/code] means they haven't kept up with OS patches. [-1 patch management] [code light=\"true\"]celerra:\/wwwdata 985G 609G 376G 62% \/net\/celerra\/wwwdata[\/code] tells us they use EMC NAS kit for web\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":87,"url":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","url_meta":{"origin":727,"position":1},"title":"Quick Hits :: 2011-02-09","author":"hrbrmstr","date":"2011-02-09","format":false,"excerpt":"Security VSR uses some high-ish profile attacks from 2010 to provide fodder for the VAR community :: Security Risk: Top Hacker Attacks of 2010. I include it as the examples they provide should make it easier for folks doing presentations where they need to show real-life attacks (without sifting through\u2026","rel":"","context":"In &quot;HTML5&quot;","block_context":{"text":"HTML5","link":"https:\/\/rud.is\/b\/category\/html5\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7246,"url":"https:\/\/rud.is\/b\/2017\/11\/23\/black-cyber-tips-a-k-a-how-the-hrbrgrinch-ruined-christmas-shopping\/","url_meta":{"origin":727,"position":2},"title":"&#8220;Black&#8221;\/&#8221;Cyber&#8221; Tips (a.k.a. How the hrbrgrinch ruined Christmas shopping)","author":"hrbrmstr","date":"2017-11-23","format":false,"excerpt":"NOTE: This is mainly for those of us in the Colonies, but some tips apply globally. Black Friday \/ Cyber Monday \/ Cyber November \/ Holiday ?hopping is upon us. You're going to buy stuff. You're going to use digital transactions to do so. Here are some tips in a\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2225,"url":"https:\/\/rud.is\/b\/2013\/03\/03\/security-hobos\/","url_meta":{"origin":727,"position":3},"title":"Security Hobos","author":"hrbrmstr","date":"2013-03-03","format":false,"excerpt":"If you haven't viewed\/read Wendy Nather's (@451Wendy) insightful [Living Below The Security Poverty Line](https:\/\/451research.com\/t1r-insight-living-below-the-security-poverty-line) you really need to do that before continuing (we'll still be here when you get back). Unfortunately, the catalyst for this post came from two recent, real-world events: my returned exposure to the apparent ever-increasing homeless\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":96,"url":"https:\/\/rud.is\/b\/2011\/02\/12\/web-development-is-dangerous\/","url_meta":{"origin":727,"position":4},"title":"&#8220;Web Development Is Dangerous&#8221;","author":"hrbrmstr","date":"2011-02-12","format":false,"excerpt":"Those were the words that greeted me within five minutes of checking out the Flask microframework for Python web applications. I feel compelled to inline those four, short paragraphs: I\u2019m not joking. Well, maybe a little. If you write a web application, you are probably allowing users to register and\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30,"url":"https:\/\/rud.is\/b\/2011\/02\/03\/awesomechartjs-meets-microsoft-security-bulletins\/","url_meta":{"origin":727,"position":5},"title":"AwesomeChartJS Meets Microsoft Security Bulletins","author":"hrbrmstr","date":"2011-02-03","format":false,"excerpt":"I wanted to play with the AwesomeChartJS library and figured an interesting way to do that was to use it to track Microsoft Security Bulletins this year. While I was drawn in by just how simple it is to craft basic charts, that simplicity really only makes it useful for\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=727"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/727\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}