The Wayback Machine - https://web.archive.org/web/20071011103919/http://www.developer.com:80/security/
developer.com
Search EarthWeb
CodeGuru | Gamelan | Jars | Wireless | Discussions
Navigate developer.com
Architecture & Design  
Database  
Java
Languages & Tools
Microsoft & .NET
Open Source  
Project Management  
Security  
Techniques  
Voice  
Web Services  
Wireless/Mobile
XML  
Technology Jobs  

   Developer.com Webcasts:
  The Impact of Coding Standards and Code Reviews

  Project Management for the Developer

  Defining Your Own Software Development Methodology

  more Webcasts...




See the Winners!


Developer Jobs

Be a Commerce Partner
Memory
Promos and Premiums
Online Meetings
Custom Products
KVM over IP
Online Universities
Domain Registration
Health Insurance
Home Improvement
Phone Systems
Domain registration
Corporate Awards
Business Gifts Canada
Data Center Solutions

 

Compare Prices:

  Navigating Your IT Career
A career in information technology usually has its share of ups and downs. Download this Internet.com eBook to learn where the jobs are in IT, how to negotiate a salary, and helpful advice on job security and how to deal with a layoff. »
 
  Inside Spyware: A Guide to Finding, Removing, and Preventing Online Pests
Your organization's computers are possibly being used to send spam, harvest e-mail addresses, make purchases on stolen credit cards or take part in denial of service attacks. Learn how to indentify, avoid, and remove malware from computers and keep your network and machines safe. »
 
  Tips for Selecting Software Vendors
IT managers need a proven, steadfast process for sifting through the hundreds of choices available for each enterprise software market segment. There are a series of steps for ensuring a result that will survive the intense, long-term scrutiny this level of investment will certainly attract. »
 
  Storage Basics: A Guide to the World of Storage Technology
Regardless of industry, size, or age, businesses are awash in more data than ever before. Federal regulations require that data be stored, protected, and retrievable for a certain amount of time. Storage is also a growing area in IT, which means employment opportunities exist now, and should exist for some time. »
 
  Building Your Own IP PBX
If you're already into having control of your computing infrastructure, taking charge of your telephone network is a natural progression. Asterisk is an open source PBX that runs on Linux. It can free your organization from expensive commercial PBXs, and gives you complete control over your telephone services »
 
Developer News -
•Linux Kernel Gets 'Fair'    October 10, 2007
•Zend Brings Microsoft Into the PHP Fold    October 9, 2007
•IBM Unleashes Rational, Tivoli Tools For SMBs    October 5, 2007
•Bungie Jumps Microsoft's Ship    October 5, 2007
Free Tech Newsletter -

Receive news and information via Developer XML/RSS feeds

See more EarthWeb Network feeds

Innotas Webcast: 3 Easy Steps to Project Portfolio Management Success. Learn how web-based PPM solutions are making it possible for IT leaders to manage more projects with less effort.

Newest Security Articles
Implementing a Custom ConnectionString Installer for Setup
By Paul Kimmel - Published 10/10/2007
See how a setup project with a custom action lets the user define the connection string using the Data Links dialog and encrypt that connection string using RSA encryption.

Nominations for Developer.com Product of the Year Begin October 15
By Rosemarie Graham - Published 10/01/2007
Help Developer.com choose the best of the best for the upcoming year.

The Basics of Manipulating File Access Control Lists with C#
By Jani Järvinen - Published 09/26/2007
Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.


Object Integrity & Security: Error & Exceptions
By Matt Weisfeld - Published 09/06/2007
One of the advantages of using object-oriented languages is that much of the error/exception handling is built directly into the language itself. Thus, many of these issues can be handled during the design of the application—and not when the application crashes in the hands of a user.

Handling Anomalies: Errors and Exceptions
By Matt Weisfeld - Published 08/06/2007
When things go wrong in an application, what should the code do?

Cryptographic Solutions for .NET Developers: Hashing and Encryption
By Jani Järvinen - Published 07/27/2007
Learn how to use cryptography to improve the security of your applications. Discover the basic building blocks for encryption and hashing using C#.

Speech Authentication Strategies, Risk Mitigation, and Business Metrics
By Marcia Gulesian - Published 06/22/2007
Compare the economic and technical differences among voice authenticated applications and those using traditional or other biometric methods of authentication.

Windows Cryptography API: Next Generation (CNG)
By Nick Wienholt - Published 06/05/2007
For long-term Visual C++ developers, the CryptoAPI will be a familiar part of your programming toolkit. If you're developing Windows Vista applications, though, you should be applying the new Windows Cryptography API: Next Generation.

Object Integrity & Security: Duplicating Objects
By Matt Weisfeld - Published 05/02/2007
Explore the issues pertaining to duplicating, or cloning, objects.

Java Language Integrity & Security: Fine Tuning Bytecodes
By Matt Weisfeld - Published 04/04/2007
Explore how you can process the bytecodes produced by the compiler to help you improve performance, security, intellectual property protection, and readability issues.

Security Archives



DevX Headlines
Visualizing Data: Self-Documenting Ant files
Back to Basics: How to Manage Collections in Your Legacy Brew Applications
Solving Data Center Complexity with Microsoft System Center Configuration Manager 2007
The Hidden Dangers of PST Files
Microsoft XNA: Ready for Prime Time?

Fix bad addresses and phone numbers before they ruin your database. Download a free Data Quality Tools trial.
Cache', the world's fastest object database, does away with mapping. Free download.
PDF Download: Compiler Usage Guidelines for 64-bit Operating Systems on AMD64 Platforms
Generate Complete .NET Web Apps in Minutes . Download Iron Speed Designer today.
Developing Intelligent Communications? Visit the Avaya Developer Connection Center on DevX.

Solutions


JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info