Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanis...
Gayan Peiris May 07, 2003 Developing security for a site is like paying tax. You know it should be done at the end of financial year. But you keep it for the last and some time expect you should never have to do it. It is a...
Gayan Peiris Mar 04, 2003 .NET Sql Authorization Manager (AzMan x .NET 2.0) allows you to set Item-based permissions for Authorization Manager-enabled Microsoft.NET 2.0 applications. Storage reside on a MS Sql Server DataBa...
This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can als...
Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in...
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configurat...
In some applications, it might be necessary to extract the modulus and exponent from the X509Certificate PublicKey. The X509Certificate.GetPublicKey() returns a byte array that contains the ASN.1 E...
Assert is a security action that is evaluated at run time. Code Access Permission classes and Permission Sets support a method called Assert. Using the Assert method to control access to resources ...
Chris Rausch Apr 25, 2001 In this article I will show you how you can view the Code Groups that an assembly belongs to and what permissions belong to the assembly. I will demonstrate the Caspol utility supplied with the .NE...
Chris Rausch May 02, 2001 Versioning in the Microsoft .NET Framework is managed at the assembly level and is only used when locating strong-named assemblies. By default, the common language runtime loads the assembly whose ...
A solution to block bots submitting to your database using C#.
Oguz Altuncu Aug 01, 2005 Code Access Security represents a fundamentally different way of controlling access rights to protected resources. Traditionally, permissions such as access to the file system, databases or network...
Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms ...
krishnan.rama Aug 31, 2004 In this article i am going to demonstrate how we can manipulate the IL code to change the behaviour of how the .NET programme executes.
manish Mehta Apr 30, 2001 Code access security is a mechanism that grants/denies access to resources within a method call. For example, code written by a person may be allowed to write to the disk while code from another on...
Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This...
manish Mehta Apr 09, 2001 This article shows how to make file I/O access be denied if the user running the application did not have administrator privileges.
Simon Harris Apr 22, 2002 The attached project is a W23 Protector. This program protects with a Windows registry code by applying 8 various types of protections. The program also has a security account with 3 types of user ...
Walla Mostafa Nov 24, 2003 In this article, we have started with an introduction to the UserControl and have learnt to use the ADO+ DataReader.As we seen User Controls simplifies several common Web application scenarios.User...
C Vinod Kumar Apr 16, 2001 In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.