Tony Karre, Author at Perficient Blogs
Blog

Posts by this Author

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

Tony Karre

OSCP, CEH, CSM, CSPO

Posts by this author:

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Read more

How To Connect Your Android Phone To Your AWS-Based VPN Server

In my previous post, How to Set Up Your Own VPN Server Using Amazon Web Services, we set up and configured an OpenVPN server using Amazon Web Services, and then we configured Windows and Linux machines to use the new VPN server.  In this post, I’ll show you how to setup your Android phone to […]

Read more

How to Set Up Your Own VPN Server Using Amazon Web Services

A Virtual Private Network, or VPN, allows you to securely connect your computer to another computer network through the internet.  A VPN Server is the computer or network device that runs the VPN, and normally your computer will connect to a VPN Server to “get on the VPN”.  In this post I will show you […]

Read more

Building Your Own Personal Business Continuity Plan

Just like any small business, the operation of your own household depends on reliable processes and access to technology.  What would happen if your household suddenly lost access to critical services like bill pay, banking or investment websites, or maybe you lost your phone or laptop, or perhaps even lost you?  Just like that small business, […]

Read more

Panel Discussions: Do This, Not That

About a month ago I attended a local infosec panel discussion (Detect and Defend,  hosted by the St. Louis Business Journal).  I’ve seen a lot of panel discussions, and I’ve even been a panelist from time to time, but none of those events were as particularly engaging as this one.  All of the panelists seemed […]

Read more

Jump-Start Your Secure Coding Program With OWASP ASVS 3.0

The concept of secure coding used to be a little hazy, one of those you’ll-know-it-when-you-see it concepts.  Patterns for secure coding generally arrived as one-offs, where some vendor would recommend their product/library/framework  because it “solved critical security problem X and here’s why…”  Recently, however, the vast number of data breaches reported in the news has dramatically driven […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up