https://www.developerfusion.com/t/security/tutorials/Security Tutorials & Articles from Developer Fusion2011-07-04T12:29:00.00Zhttp://www.developerfusion.com/article/121561/integrating-active-directory-into-azure/Integrating Active Directory Into Azure2011-07-04T12:29:00.00ZThe most common giveaway a user experiences when an enterprise application has been moved to the cloud is the sudden appearance of a username/password dialogue box.Steve Plankhttp://www.developerfusion.com/article/84438/isolated-storage/Isolated Storage2010-11-22T12:24:00.00ZIsolated Storage is a solution to a very common problem, but if you don't understand it then it becomes a problem in its own right.Ian Stevensonhttp://www.developerfusion.com/article/7641/what-you-need-to-know-about-pci-compliance-and-web-application-security-policy-changes/What You Need to Know about PCI Compliance and Web Application Security Policy Changes2008-04-12T11:02:00.00ZPCI compliance exists to protect consumers from credit fraud, and their data will be protected if rules are followed. If your business accepts credit cards, you are aware of changes to PCI compliance in June. Adherence to section 6.6 of the PCI compliance rules should have been met; if not, web application security must be integrated into existing applications. This mandate allows businesses to evaluate their security practices.Michael Suttonhttp://www.developerfusion.com/article/7305/dynamic-search-conditions-in-tsql/Dynamic Search Conditions in T-SQL2007-12-01T13:46:00.00ZA very common requirement in an information system is to have a function (or several functions) where the users are able to search the data by selecting freely among many possible criterias. In this text I will look at various techniques to solve this problem.Erland Sommarskoghttp://www.developerfusion.com/article/7142/sql-trusted-connections-with-aspnet/SQL Trusted Connections with ASP.NET2007-10-09T21:05:00.00ZHard coding passwords into your application or your web site is a bad thing. Barry looks at how we can use trusted connections to provide the authentication we need, without the need for these potential security hazards.Barry Dorranshttp://www.developerfusion.com/article/6951/effective-controls-for-attaining-continuous-application-security-throughout-the-web-application-development-life-cycle/Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle2007-08-16T21:37:00.00ZImproving your Web application development process is one of the best ways to avoid security vulnerabilities and nasty surprises during security assessments. Learn about the points in the software development life cycle where additional security awareness and training is needed to ensure that your organization remains successful and secure.Caleb Simahttp://www.developerfusion.com/article/6845/web-application-vulnerability-assessment-essentials/Web Application Vulnerability Assessment Essentials2007-07-01T18:44:00.00ZIt is important for a business to understand the fundamentals of running a vulnerability assessment in order to determine how one will be run and what can be expected from the results. A web application security scanner can automate the process, but a quality assessment may still require actual human eyes to catch specific issues. Learn more about the whys and hows of vulnerability assessments.Caleb Simahttp://www.developerfusion.com/article/6745/top-10-application-security-vulnerabilities-in-webconfig-files-part-two/Top 10 Application Security Vulnerabilities in Web.config Files - Part Two2007-06-10T11:43:00.00ZIn this second part of a two-part series, you will learn about application security issues related to authentication and authorization, as well as five vulnerabilities commonly found in ASP.NET web-based applications. Additionally, find out how to keep configuration files from being unintentionally modified by uninformed programmers or administrators, as well as why it is critical to never rely on default setting values.Bryan Sullivanhttp://www.developerfusion.com/article/6678/top-10-application-security-vulnerabilities-in-webconfig-files-part-one/Top 10 Application Security Vulnerabilities in Web.config Files - Part One2007-05-14T21:05:00.00ZIn part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application.Bryan Sullivanhttp://www.developerfusion.com/article/6197/testing-for-security-in-the-age-of-ajax-programming/Testing for Security in the Age of Ajax Programming2006-09-27T22:24:00.00ZAjax programming, which allows a web page to refresh a small portion of its data from a web server, is an exciting technology that has recently been introduced. However, this type of programming can also leave applications open to SQL injection and similar attacks. Learn more about Ajax programming and what it means in terms of security.Bryan Sullivanhttp://www.developerfusion.com/article/5996/the-power-of-hybrid-application-security-analysis-increasing-the-reliability-of-security-testing-results/The Power of Hybrid Application Security Analysis: Increasing the Reliability of Security Testing Results2006-08-09T20:17:00.00ZDevelopers are beginning to take the important step toward performing security testing before their applications leave their environments. However, it is also important to combine source code analysis with dynamic analysis during security testing, an approach known as hybrid analysis.Jason Schmitthttp://www.developerfusion.com/article/5613/sharepoint-document-library-and-sql-server/SharePoint, Document Library and SQL Server2006-04-19T22:36:00.00ZThis tutorial shows how you can capture a document in SharePoint's document library, retrieve information from its properties and store in in SQL Server. It will teach you how to use Event Handler Toolkit.S.S. Ahmedhttp://www.developerfusion.com/article/5385/highperformance-net-application-development-architecture/High-Performance .NET Application Development & Architecture2006-02-15T15:25:00.00ZThis article demonstrates the art of creating and architecting high-performance and scalable .NET applications, covering all stages, from planning to development and their perspective best practices.Dimitrios Markatoshttp://www.developerfusion.com/article/5381/locking-the-door-behind-you-hacker-protection-for-your-web-applications/Locking the Door behind You: Hacker Protection for Your Web Applications2006-02-14T20:59:00.00ZYour Web applications can be the most important and most vulnerable entry point into your organization, and, as such, ensuring adequate hacker protection in your Web applications can be critical. This article discusses some of the issues.Caleb Simahttp://www.developerfusion.com/article/5348/new-features-for-web-developers-in-aspnet-20/New features for web developers in ASP.NET 2.02006-02-03T12:25:00.00ZASP.NET 2.0 brings enhanced performance and many new features that make the web developer's life easier. Alex Homer takes you through what's new.Alex Homerhttp://www.developerfusion.com/article/5199/whats-new-in-systemxml-20/What's new in System.Xml 2.02006-01-30T11:01:00.00ZJust as XML itself has evolved, so the XML related classes in .NET Framework 2.0 have changed. Alex Homer finds out what's different.Alex Homerhttp://www.developerfusion.com/article/5307/aspect-oriented-programming-using-net/Aspect Oriented Programming using .NET2006-01-30T10:40:00.00ZTill now we were talking about non-mainstream languages to use Aspect Oriented Programming (AOP). Learn what exactly AOP is, and how you can go about getting this functionality in C#.Abhinaba Basuhttp://www.developerfusion.com/article/5155/web-services-interoperability-between-j2ee-and-net-part-3/Web Services Interoperability between J2EE and .NET - Part 32006-01-05T21:28:00.00ZExplore the source of the common interoperability challenges facing Web services integration across platforms. This third part in a series describes how the different naming conventions between J2EE technology and .NET can cause difficulty in Web services interoperability.Wangming Yehttp://www.developerfusion.com/article/4708/to-sp-or-not-to-sp-in-sql-server/To SP or not to SP in SQL Server2005-07-19T13:48:00.00ZThe topic of using or not using stored procedures reaches the level of religious fervor in many quarters. Douglas Reilly, a Microsoft MVP, weighs in on the topic with an in-depth analysis.Douglas Reillyhttp://www.developerfusion.com/article/4683/net-applets/.NET Applets2005-03-30T22:16:00.00ZMark walks you through how you go about creating a ".NET Applet" - a Windows Forms control hosted within a web page.M Kenyon