Authorization Manager in Windows 2003 is the more flexible, scalable and easier administration tool for role based security. Using Authorization Manager we can define roles and the tasks that roles...
This article explain you, how to provide security to your applications.
Dinesh Tawar May 18, 2006 By default, ASP.NET applications usually do not impersonate the original caller for design, implementation, and scalability reasons. For example, impersonating prevents effective middle-tier connec...
Sonu Chauhan Feb 03, 2006 In this article, we are going to learn the basic concepts of WS-Security related specifications and how they are implemented by Microsoft Web Service Enhancements 3.0 technology.
The purpose of this document is to introduce 10 preventative measures that merchants can take in order to minimize credit card fraud. In addition, we would like to take this opportunity to introduc...
fraudlabs inc Jul 27, 2006 Whenever protected resources are accessed by an assembly, it’s permissions are determined by the code access security system of CLR. Each permission set granted to an assembly is based on the assem...
This article focuses on security concerm when using SQL Server 2005 in ASP.NET application.
Sanjay Gulati Jul 11, 2006 This article describes a simple approach to determining whether or not a logged in user is a member of a group within the context of an asp.net web based application.
This article will guide you on how to post data to an HTTPS (i.e., secure connection) URL from a Windows application (.NET) by attaching a digital certificate from a certificate file and getting th...
Web application security involves implementing protective measures against potential threats, malicious or unintentional, that exploit exposed vulnerabilities. Security is best implemented using th...
This article will focus on the definition and configuration of the Code Access Security Policy.
Sonu Chauhan Feb 17, 2006 The following code will explain the permissions which are assigned to a current assembly.
Sonu Chauhan Feb 24, 2006 Tips on how to secure your .net code from crackers.
Kirtan Patel Sep 17, 2010 In this article we will learn how to create the SSL certificates for our web site which we are hosting on our IIS server.
Krishna Garad Feb 04, 2012 Secure communication is an integral part of securing your distributed application to protect sensitive data, including credentials, passed to and from your application, and between application tiers.
Sanjoli Gupta Jan 18, 2012 In this article you will learn how to Explore ViewFormPagesLockDown Feature and Anonymous site security.
Learn how to make your application requests UAC elevation (in Windows Vista and later versions) at start.
This article explains about adding products/feature sets followed by Code Protection Integration using SLP Online Services.
A pix or firewall can have up to the 10 interfaces based upon PIX or ASA version and Interface module install on it.
Parveen Malik Jan 12, 2009 This article explains what is Cryptography? Why it is needed? and the types of Cryptography.