Open Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading →
Critical Chain Safety
Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in 3 steps; planning, execution, and monitoring. 1. Planning: Two durations are entered for each … Continue reading →
Develope a Web Based CMS Using PHP
Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The objective of managing users, and information in any given network environment can only be hindered by the creativity of an information … Continue reading →
Model View Control
Introduction Model View Control (MVC) is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a huge mess when it is time to redesign you program. MVC patterns will simplify implementation and greatly enhance re-usability. It should always be … Continue reading →
Ethics in Business Intelligence
The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as professional ethics and not to be confused with other forms of philosophical ethics including religious conviction, or popular conviction. … Continue reading →
SAP-B1 | Pack List for Sales Orders | SQL | Crystal Report
Looking for a better packing list for your shippers to view? This one will add descriptions and notes from the sales order text lines (unless the word “Freight Charge” is in the text line). Lines will be added them in the same ‘visual order’ as the shipping order. It will … Continue reading →
Digital Forensics
Reviewing the concept of anti-forensics, which can be described as being: “…more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you” (Berinato, 2007). The … Continue reading →
Run Fortify from Maven
Installing Fortify SCM Maven Plugin sca-maven-plugin supports Maven 3.0.5, 3.5.x And 3.6.x Installing This document is only viable if you already have Fortify installed for running with the Scan Wizard and Audit workbench. From: C:\Program Files\Fortify\Fortify_SCA_and_Apps_20.1.0\plugins\maven or wherever you installed Fortify Copy: maven-plugin-src.zip (poor success with the binary zip, choose … Continue reading →
Linux: Compiz Grid Plugin
After working on a few projects in windows, I finally moved my primary workstation back to Linux (RHEL 6.6). Out of the box everything worked fine, only one thing was missing, the ability to place a window were I needed it. In Windows 7 you can drag a full screen … Continue reading →
Make sure you have committed to SCM before Production Build
Maven/BitBucket Validation for Production Code Deployment Introduction The justification for this document is to express a way to secure company code and create a possible company standardization for the WAR naming convention that is easily tracked back to a BitBucket commit that was used to deploy an interface to UAT … Continue reading →