https://www.developerfusion.com/t/security/tutorials/ Security Tutorials & Articles from Developer Fusion 2011-07-04T12:29:00.00Z http://www.developerfusion.com/article/121561/integrating-active-directory-into-azure/ Integrating Active Directory Into Azure 2011-07-04T12:29:00.00Z The most common giveaway a user experiences when an enterprise application has been moved to the cloud is the sudden appearance of a username/password dialogue box. Steve Plank http://www.developerfusion.com/article/84438/isolated-storage/ Isolated Storage 2010-11-22T12:24:00.00Z Isolated Storage is a solution to a very common problem, but if you don't understand it then it becomes a problem in its own right. Ian Stevenson http://www.developerfusion.com/article/7641/what-you-need-to-know-about-pci-compliance-and-web-application-security-policy-changes/ What You Need to Know about PCI Compliance and Web Application Security Policy Changes 2008-04-12T11:02:00.00Z PCI compliance exists to protect consumers from credit fraud, and their data will be protected if rules are followed. If your business accepts credit cards, you are aware of changes to PCI compliance in June. Adherence to section 6.6 of the PCI compliance rules should have been met; if not, web application security must be integrated into existing applications. This mandate allows businesses to evaluate their security practices. Michael Sutton http://www.developerfusion.com/article/7305/dynamic-search-conditions-in-tsql/ Dynamic Search Conditions in T-SQL 2007-12-01T13:46:00.00Z A very common requirement in an information system is to have a function (or several functions) where the users are able to search the data by selecting freely among many possible criterias. In this text I will look at various techniques to solve this problem. Erland Sommarskog http://www.developerfusion.com/article/7142/sql-trusted-connections-with-aspnet/ SQL Trusted Connections with ASP.NET 2007-10-09T21:05:00.00Z Hard coding passwords into your application or your web site is a bad thing. Barry looks at how we can use trusted connections to provide the authentication we need, without the need for these potential security hazards. Barry Dorrans http://www.developerfusion.com/article/6951/effective-controls-for-attaining-continuous-application-security-throughout-the-web-application-development-life-cycle/ Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle 2007-08-16T21:37:00.00Z Improving your Web application development process is one of the best ways to avoid security vulnerabilities and nasty surprises during security assessments. Learn about the points in the software development life cycle where additional security awareness and training is needed to ensure that your organization remains successful and secure. Caleb Sima http://www.developerfusion.com/article/6845/web-application-vulnerability-assessment-essentials/ Web Application Vulnerability Assessment Essentials 2007-07-01T18:44:00.00Z It is important for a business to understand the fundamentals of running a vulnerability assessment in order to determine how one will be run and what can be expected from the results. A web application security scanner can automate the process, but a quality assessment may still require actual human eyes to catch specific issues. Learn more about the whys and hows of vulnerability assessments. Caleb Sima http://www.developerfusion.com/article/6745/top-10-application-security-vulnerabilities-in-webconfig-files-part-two/ Top 10 Application Security Vulnerabilities in Web.config Files - Part Two 2007-06-10T11:43:00.00Z In this second part of a two-part series, you will learn about application security issues related to authentication and authorization, as well as five vulnerabilities commonly found in ASP.NET web-based applications. Additionally, find out how to keep configuration files from being unintentionally modified by uninformed programmers or administrators, as well as why it is critical to never rely on default setting values. Bryan Sullivan http://www.developerfusion.com/article/6678/top-10-application-security-vulnerabilities-in-webconfig-files-part-one/ Top 10 Application Security Vulnerabilities in Web.config Files - Part One 2007-05-14T21:05:00.00Z In part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application. Bryan Sullivan http://www.developerfusion.com/article/6197/testing-for-security-in-the-age-of-ajax-programming/ Testing for Security in the Age of Ajax Programming 2006-09-27T22:24:00.00Z Ajax programming, which allows a web page to refresh a small portion of its data from a web server, is an exciting technology that has recently been introduced. However, this type of programming can also leave applications open to SQL injection and similar attacks. Learn more about Ajax programming and what it means in terms of security. Bryan Sullivan http://www.developerfusion.com/article/5996/the-power-of-hybrid-application-security-analysis-increasing-the-reliability-of-security-testing-results/ The Power of Hybrid Application Security Analysis: Increasing the Reliability of Security Testing Results 2006-08-09T20:17:00.00Z Developers are beginning to take the important step toward performing security testing before their applications leave their environments. However, it is also important to combine source code analysis with dynamic analysis during security testing, an approach known as hybrid analysis. Jason Schmitt http://www.developerfusion.com/article/5613/sharepoint-document-library-and-sql-server/ SharePoint, Document Library and SQL Server 2006-04-19T22:36:00.00Z This tutorial shows how you can capture a document in SharePoint's document library, retrieve information from its properties and store in in SQL Server. It will teach you how to use Event Handler Toolkit. S.S. Ahmed http://www.developerfusion.com/article/5385/highperformance-net-application-development-architecture/ High-Performance .NET Application Development & Architecture 2006-02-15T15:25:00.00Z This article demonstrates the art of creating and architecting high-performance and scalable .NET applications, covering all stages, from planning to development and their perspective best practices. Dimitrios Markatos http://www.developerfusion.com/article/5381/locking-the-door-behind-you-hacker-protection-for-your-web-applications/ Locking the Door behind You: Hacker Protection for Your Web Applications 2006-02-14T20:59:00.00Z Your Web applications can be the most important and most vulnerable entry point into your organization, and, as such, ensuring adequate hacker protection in your Web applications can be critical. This article discusses some of the issues. Caleb Sima http://www.developerfusion.com/article/5348/new-features-for-web-developers-in-aspnet-20/ New features for web developers in ASP.NET 2.0 2006-02-03T12:25:00.00Z ASP.NET 2.0 brings enhanced performance and many new features that make the web developer's life easier. Alex Homer takes you through what's new. Alex Homer http://www.developerfusion.com/article/5199/whats-new-in-systemxml-20/ What's new in System.Xml 2.0 2006-01-30T11:01:00.00Z Just as XML itself has evolved, so the XML related classes in .NET Framework 2.0 have changed. Alex Homer finds out what's different. Alex Homer http://www.developerfusion.com/article/5307/aspect-oriented-programming-using-net/ Aspect Oriented Programming using .NET 2006-01-30T10:40:00.00Z Till now we were talking about non-mainstream languages to use Aspect Oriented Programming (AOP). Learn what exactly AOP is, and how you can go about getting this functionality in C#. Abhinaba Basu http://www.developerfusion.com/article/5155/web-services-interoperability-between-j2ee-and-net-part-3/ Web Services Interoperability between J2EE and .NET - Part 3 2006-01-05T21:28:00.00Z Explore the source of the common interoperability challenges facing Web services integration across platforms. This third part in a series describes how the different naming conventions between J2EE technology and .NET can cause difficulty in Web services interoperability. Wangming Ye http://www.developerfusion.com/article/4708/to-sp-or-not-to-sp-in-sql-server/ To SP or not to SP in SQL Server 2005-07-19T13:48:00.00Z The topic of using or not using stored procedures reaches the level of religious fervor in many quarters. Douglas Reilly, a Microsoft MVP, weighs in on the topic with an in-depth analysis. Douglas Reilly http://www.developerfusion.com/article/4683/net-applets/ .NET Applets 2005-03-30T22:16:00.00Z Mark walks you through how you go about creating a ".NET Applet" - a Windows Forms control hosted within a web page. M Kenyon