Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms ...
krishnan.rama Aug 31, 2004 In this article i am going to demonstrate how we can manipulate the IL code to change the behaviour of how the .NET programme executes.
manish Mehta Apr 30, 2001 Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This...
manish Mehta Apr 09, 2001 This article shows how to make file I/O access be denied if the user running the application did not have administrator privileges.
Simon Harris Apr 22, 2002 In this article, we have started with an introduction to the UserControl and have learnt to use the ADO+ DataReader.As we seen User Controls simplifies several common Web application scenarios.User...
C Vinod Kumar Apr 16, 2001 In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Authorization Manager in Windows 2003 is the more flexible, scalable and easier administration tool for role based security. Using Authorization Manager we can define roles and the tasks that roles...
This article explain you, how to provide security to your applications.
Dinesh Tawar May 18, 2006 By default, ASP.NET applications usually do not impersonate the original caller for design, implementation, and scalability reasons. For example, impersonating prevents effective middle-tier connec...
Sonu Chauhan Feb 03, 2006 In this article, we are going to learn the basic concepts of WS-Security related specifications and how they are implemented by Microsoft Web Service Enhancements 3.0 technology.
The purpose of this document is to introduce 10 preventative measures that merchants can take in order to minimize credit card fraud. In addition, we would like to take this opportunity to introduc...
fraudlabs inc Jul 27, 2006 Whenever protected resources are accessed by an assembly, it’s permissions are determined by the code access security system of CLR. Each permission set granted to an assembly is based on the assem...
This article focuses on security concerm when using SQL Server 2005 in ASP.NET application.
Sanjay Gulati Jul 11, 2006 This article describes a simple approach to determining whether or not a logged in user is a member of a group within the context of an asp.net web based application.
This article will guide you on how to post data to an HTTPS (i.e., secure connection) URL from a Windows application (.NET) by attaching a digital certificate from a certificate file and getting th...
Web application security involves implementing protective measures against potential threats, malicious or unintentional, that exploit exposed vulnerabilities. Security is best implemented using th...
This article will focus on the definition and configuration of the Code Access Security Policy.
Sonu Chauhan Feb 17, 2006 The following code will explain the permissions which are assigned to a current assembly.
Sonu Chauhan Feb 24, 2006 Tips on how to secure your .net code from crackers.
Kirtan Patel Sep 17, 2010 In this article we will learn how to create the SSL certificates for our web site which we are hosting on our IIS server.
Krishna Garad Feb 04, 2012