Better Software Magazine Articles

When an Emergency Takes Center Stage

The middle of an emergency is no time to make a plan. Take a look at this installment of "Management Chronicles" to learn how not to be prepared for an emergency situation, and then read the Story Lines for some helpful, preparatory advice.

Peter Clark
A Look at GreenBlue Inspector by Ecyware

Why should hackers have all the good tools? Marnie Hutcheson takes a look at Ecyware's GreenBlue Inspector, an inexpensive tool that automates gray box vulnerability testing for simple data types, buffer overflow, SQL injection, and cross-site scripting in forms, cookies, and client requests.

Marnie Hutcheson
A Critical Line of Defense

Tackle software vulnerabilities at the root—in the applications themselves.
 

Herbert H. Thompson
Do-It-Yourself

Projects collapse in a variety of ways and for a variety of reasons. Fortunately there are things you can do to stabilize and rebuild your project before the dust settles. With these expert tips and a little elbow grease, you'll have the tools you'll need to renovate almost any failing project.

Mike Cohn's picture Mike Cohn
Keeping Secrets

Test data has long been a challenge for testing; privacy legislation, identify theft, and the continued trend towards outsourcing has made it even worse. Just establishing and maintaining a comprehensive test environment can take half or more of all testing time and effort. In this column, Linda Hayes adds in the new and expanding privacy laws that inevitably limit your testing options. Yet from the quagmire of laws and company standards, better testing can emerge.

Linda Hayes's picture Linda Hayes
The Enemy Within

Not all threats come from outsiders. In an era of downsizing, layoffs, and pay cuts, sometimes it's your own disgruntled employees (or ex-employees) who are targeting you. Get some tips to help you protect your software from sabotage.

Clarke Ching's picture Clarke Ching
Trust Everyone, but Cover Your Assets

Need a place to go to get the solutions you've been craving? Management Fix is what you've been looking for. In this issue, find out how to manage when you suspect someone on your team may have been stealing from the company.

Elisabeth Hendrickson's picture Elisabeth Hendrickson
A Killer Bug for the New Millenium

We're pleased to bring you technical editors who are well respected in their fields. Get their take on everything that relates to the industry, technically speaking. In this issue, find out why our guest editor thinks he's found the bug that will once again bring testers to the forefront—a bug that dwarfs Y2K and could put big, rich software companies out of business.

James Whittaker's picture James Whittaker
Case Your Own Joint

Hackers are going to probe your system looking for weak spots and holes. What will they find? Learn how to uncover your own security vulnerabilities before the bad guys do.

Chris Wysopal
Warning: Security Storm Brewing

For too long now, consumers have been bailing, patching, and plugging their software each time a new security hole is discovered. And they've been absorbing the damage done by the leaks. A wave of security-conscious buyers is rising, demanding software that is sound and secure by design. Are you ready to give it to them? Find out why you should be.

Herbert H. Thompson

Pages

AgileConnection is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.