This talk covers security at each level: server, database, and application. I cover how to secure a Linux server, secure the database, and finally to secure the application.
This presentation is a step-by-step guide that includes two-factor authentication, SSH security, intrusion detection, permissions, sockets, proxies, grants, password encryption, entropy, SQL injection, and social hacking.
I am a Technology Entrepreneur with a software development background. Currently, I am focused on solving the technology issues that many companies face for login, registration, and user management. My team and I built FusionAuth: A modern customer identity and access management (CIAM) platform that comes with features not seen in the marketplace today. It allows companies to focus on their core product not the plumbing of identity and user management.
More About Brian »