-
Network Security
network map can identify some service configurations which reveal too much information and determines the scope of further analysis. Port scanning / Traffic analysis There are 64K IP ports on which services may be listening. Common services use the...
-
Output oriented analysis
Data analysis projects often focus too much on the collection and classification of the data and too little on how the result will be used. This can lead to some poor decisions that could be avoided with a more integrated approach. The view from the...
-
Data crunching
customers). These order details need to be validated and reformatted for importing into their respective main systems. Log Analysis In order to analyse their mail traffic, a large multi-site organisation had previously been importing their mail logs...
-
A Taxonomy of Loss
can make the true level of threat to an organization difficult to determine. Adopting a structured approach to the analysis of computer system security risks and allows an organization to more effectively balance their operational requirements against...
-
My cat is cloud-based
oriented. Today he might suggest the cat was cloud based. The common point here is that buzzwords are not a substitute for analysis. Don't implement a cloud-based solution because you believe in cloud computing or a salesdroid tells you it’s the way of...
-
Choosing the right tool for the job
solution that just gets the job done is Ok. This is fine, so long as it really is a short term solution. Lack of analysis. The long term requirements of a new system or process can be difficult to foresee. This is where experience (bitter, bitter...
-
About us
on the mid-north coast of NSW, Dropbear Consulting provides programming and analysis services for a variety of languages and environments. The principal of Dropbear Consulting is Peter Langton, who has over 20 years experience in the IT industry in many...
-
OpenOffice / StarOffice macros
database for more detailed manipulation. Database applications Could be anything from a custom order entry procedure to an analysis and reporting application supporting an existing third-part application. There are just some of the processed that can...
-
Beyond the Blackboard
regardless of their location[3] and without any need to travel. As for any new computer system, a proper requirements analysis should be completed before implementing an on‑line learning system. Think about what you want to achieve with the system and...
-
Google Analytics - no thanks
The Google Analytics service provides enhanced traffic analysis services for websites, unfortunately it requires that viewers accept certain cookies or your web site hangs. As a site viewer, there is something you can do about this. For website owners,...
-
Computers are for life, not just for Christmas
process; a more common problem is ensuring that the requirements of all system are included in any change control/impact analysis process. Imagine installing an intranet web-based system that talks to a database and sends email. What happens if you...