Solved

Advice on Security , evolution of A perl Application

Posted on 2004-09-07
10
142 Views
Last Modified: 2010-03-05
Hello Dear Experts

I have developed a Web Based Tool in Perl with Oracle as backend . I have used all the cycles of SDLC and now I need to know more about the Security of such kind of application, Evolution .
What I need to know more is what are the special security features that one needs to implement in web based tool and what kinds of tools are used in testing
Thank you
Ronan
0
Comment
Question by:ronan_40060
  • 5
  • 4
10 Comments
 
LVL 16

Assisted Solution

by:xDamox
xDamox earned 200 total points
ID: 11999757
Hi,

you should try Nessus on your server which will also test out your script see if it resolvs any error you may have like cross site scripting.
0
 
LVL 48

Expert Comment

by:Tintin
ID: 12001167
Whisker is a good tool for checking cross-site scripting flaws.

http://www.securityfocus.com/tools/727
0
 
LVL 9

Author Comment

by:ronan_40060
ID: 12001405
Thanks Tintin and xDamox

Well few more info required. generally what are the difficulties encountered in the Maintenance of such application.
0
 
LVL 48

Expert Comment

by:Tintin
ID: 12001601
By "application" are you referring to your own or the tools?
0
 
LVL 9

Author Comment

by:ronan_40060
ID: 12003709
Hello Tintin The application is the one which I developed with Perl and Oracle
its a Web based applicationwhich provides the users the statictics of a an already built tool so I developed the functionalities for the statistics of the existing tool
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 48

Accepted Solution

by:
Tintin earned 200 total points
ID: 12004039
Maintainance really comes down to how well the application is designed and written and whether the requirements change.
0
 
LVL 9

Author Comment

by:ronan_40060
ID: 12004057
Tintin
could you suggest me a good article on Maintenance and security esp of perl Applications ?
Thanks for your valuable time
Ronan
0
 
LVL 48

Expert Comment

by:Tintin
ID: 12004412
Is it a Perl/CGI application?
0
 
LVL 9

Author Comment

by:ronan_40060
ID: 12030773
hello Tintin its Perl application with oracle as backend
0
 
LVL 48

Expert Comment

by:Tintin
ID: 12040224
You originally mentioned it was a web based Perl tool, so I naturally assumed it was CGI.  How do you access the interface then?
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
binary to char / hexadecimal 5 104
Perl Script to read file contents, make changes, and build new file 7 90
Perl modules on linux ec2 3 96
read an xml file in perl 2 15
Many time we need to work with multiple files all together. If its windows system then we can use some GUI based editor to accomplish our task. But what if you are on putty or have only CLI(Command Line Interface) as an option to  edit your files. I…
In the distant past (last year) I hacked together a little toy that would allow a couple of Manager types to query, preview, and extract data from a number of MongoDB instances, to their tool of choice: Excel (http://dilbert.com/strips/comic/2007-08…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now