Security Tutorials & Articles
-
Isolated Storage
by Ian StevensonIsolated Storage is a solution to a very common problem, but if you don't understand it then it becomes a problem in its own right.
-
What You Need to Know about PCI Compliance and Web Application Security Policy Changes
by Michael SuttonPCI compliance exists to protect consumers from credit fraud, and their data will be protected if rules are followed. If your business accepts credit cards, you are aware of changes to PCI compliance in June. Adherence to section 6.6 of the PCI compliance rules should have been met; if not, web application security must be integrated into existing applications. This mandate allows businesses to evaluate their security practices.
-
How to access Outlook and post to a blog using C#
by Simon SoanesAn article for all those like Robert Scoble who would like to be able to drag and drop an item to a folder in their Outlook and post it instantly to their Blog. We also briefly cover web services and talking to Outlook.
-
Isolated Storage in .NET
by Graham ParkerKnowing how and where to store things is bread and butter stuff for an Application Developer. This article examines an area of storage known as ‘Isolated Storage’ that was introduced to the Windows environment alongside the introduction of the .NET Framework. We’ll discover, what it is and how and why to use it.
-
.NET Applets
by M KenyonMark walks you through how you go about creating a ".NET Applet" - a Windows Forms control hosted within a web page.
-
Client Server Programming with Winsock
by S.S. AhmedWinsock control comes with VB6 and is used to create applications that access the low-level functions of the Transmission Control Protocol/Internet Protocol (TCP/IP).
-
Dynamic Search Conditions in T-SQL
by Erland SommarskogA very common requirement in an information system is to have a function (or several functions) where the users are able to search the data by selecting freely among many possible criterias. In this text I will look at various techniques to solve this problem.
-
Locking the Door behind You: Hacker Protection for Your Web Applications
by Caleb SimaYour Web applications can be the most important and most vulnerable entry point into your organization, and, as such, ensuring adequate hacker protection in your Web applications can be critical. This article discusses some of the issues.
-
SQL Trusted Connections with ASP.NET
by Barry DorransHard coding passwords into your application or your web site is a bad thing. Barry looks at how we can use trusted connections to provide the authentication we need, without the need for these potential security hazards.
-
API Programming Series #1
by Sreejath S. WarrierThis is the first part of a series of articles explaining how to access and use the Win32 API from within VB.
-
Top 10 Application Security Vulnerabilities in Web.config Files - Part One
by Bryan SullivanIn part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application.
-
Testing for Security in the Age of Ajax Programming
by Bryan SullivanAjax programming, which allows a web page to refresh a small portion of its data from a web server, is an exciting technology that has recently been introduced. However, this type of programming can also leave applications open to SQL injection and similar attacks. Learn more about Ajax programming and what it means in terms of security.
-
New features for web developers in ASP.NET 2.0
by Alex HomerASP.NET 2.0 brings enhanced performance and many new features that make the web developer's life easier. Alex Homer takes you through what's new.
-
You Want Salt With That?
by Eric LippertLearn about "security through obscurity", what exactly is this "salt" stuff (in the cryptographic sense, not the chemical sense!), and why it's OK to make salts public knowledge.
-
Top 10 Application Security Vulnerabilities in Web.config Files - Part Two
by Bryan SullivanIn this second part of a two-part series, you will learn about application security issues related to authentication and authorization, as well as five vulnerabilities commonly found in ASP.NET web-based applications. Additionally, find out how to keep configuration files from being unintentionally modified by uninformed programmers or administrators, as well as why it is critical to never rely on default setting values.
-
SharePoint, Document Library and SQL Server
by S.S. AhmedThis tutorial shows how you can capture a document in SharePoint's document library, retrieve information from its properties and store in in SQL Server. It will teach you how to use Event Handler Toolkit.
-
High-Performance .NET Application Development & Architecture
by Dimitrios MarkatosThis article demonstrates the art of creating and architecting high-performance and scalable .NET applications, covering all stages, from planning to development and their perspective best practices.
-
What's new in System.Xml 2.0
by Alex HomerJust as XML itself has evolved, so the XML related classes in .NET Framework 2.0 have changed. Alex Homer finds out what's different.
-
Web Services Interoperability between J2EE and .NET - Part 3
by Wangming YeExplore the source of the common interoperability challenges facing Web services integration across platforms. This third part in a series describes how the different naming conventions between J2EE technology and .NET can cause difficulty in Web services interoperability.
-
Make your Classic ASP code work like in ASP.NET
by Christian CalderonDeveloping in Classic ASP using the same technics as in ASP.NET?. If you have to work in Classic ASP, why don't do it the right way? By using a similar framework not only your code will be more organized and efficient, but it will take you a fraction of the time to port to ASP.NET!