The Wayback Machine - https://web.archive.org/web/20071124215431/http://www.codeguru.com:80/csharp/.net/net_security/

CodeGuru
Earthweb Search
Forums Wireless Jars Gamelan Developer.com
CodeGuru Navigation
Member Sign In
User ID:
Password:
Remember Me:
Forgot Password?
Not a member?
Click here for more information and to register.

jobs.internet.com

internet.commerce
Partners & Affiliates
Web Design
Invoice Factoring
Free Credit Score
Health Insurance
Compare Prices
Economy Server Racks
Web Hosting
Giveaways
KVM over IP
Promotional Products
Corporate Gifts
Auto Insurance Quote
Promote Your Website
Shop


RSS Feeds

RSSAll

RSSVC++/C++

RSS.NET/C#

RSSVB

See more EarthWeb Network feeds

Home >> .NET / C# >> .NET >> Net Security


Usability and Design
The Usability and design space brings together the latest information, research, tools, podcasts, and conference information related to usability and design. Content is pulled from IBM and non-IBM sites. »
 
Ajax Resource Center
This space is your one-stop shop for information on the Ajax programming model, including articles and tutorials, discussion forums, blogs, wikis, events, and news. If it's happening, it's covered here. »
 
Linux Security
The Linux security space gives an overview of security issues related to Linux and covers all aspects of securing a Linux distribution. It also links to Linux security-related news and articles. »
 
Ruby Programming
Take a closer look at Ruby, a dynamic programming language that is growing rapidly in popularity. Explore its intriguing features and learn what programmers are doing with it. »
 
Wiki: WebSphere, SOA, J2EE in Practice
This wiki discusses how to use J2EE and related technologies to develop business applications, including how to make best use of IBM J2EE products like WebSphere Application Server and Rational Application Developer, and IBM SOA products like WebSphere Process Server and WebSphere Integration Developer. While it occasionally delves into tangential topics and future trends, the primary focus is on how to make use of the products and technologies that we have today. »

Fluke Networks Whitepaper: Locating Rogue Wireless Access Points. An unauthorized, rogue access point can compromise the security of a wireless network. Learn how to remove this security vulnerability.

Net Security

Authentication



[Updated] RFID Programming Made Simple and Cheap
Rating:
Bradley Jones - 12/07/2006
Using RFID hardware and incorporating RFID tag information into your applications can really be quite simple. See what can be done with less than $100 and no more than a few dozen lines of code.

E-Commerce Tip: Programmatically Validate Credit Card Numbers
Rating:
Eric Smith - 07/14/2006
Employ this function in your e-commerce application to validate the credit card numbers your users enter.

How to Maintain a Code Group in Security Policy at Runtime
Rating:
subbuvr - 07/27/2005
Learn about maintaining code groups at runtime.

Managed C++: Authenticating Users via Hash Codes
Rating:
Tom Archer - MSFT - 01/27/2005
For situations when a company doesn't want the responsibility of maintaining a user password file, Tom Archer presents a mechanism that stores and uses the hash codes of passwords instead of the actual passwords to validate users.

ASP.NET 2.0 Moves User Authentication One Step Forward
Rating: none
Anand Narayanaswamy - 11/05/2004
ASP.NET 2.0 provides new classes, methods, and controls that make implementing authentication easy. Learn how to apply the authentication functionalities of the Membership class and its methods into ASP.NET applications.

Blocking Brute-Force Attacks
Rating:
m8urnett - 08/12/2004
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack.

How to Use Windows Authentication to Access SQL Server Through a ASP.NET Web Application
Rating:
bondugula_ramu - 07/23/2004
Learn how to use Windows authentication for Web-based intranet applications to access a SQL Server database using ASP.NET.

Introduction to Role-Based Security in .NET
Rating:
Klaus Salchner - 06/18/2004
Learn how role-based security in .NET works. The sample code shows how to implement a database-driven security model for enterprise applications.

Two Quick Ways to Perform ASP.NET Authentication
Rating:
Anand Narayanaswamy - 06/07/2004
By applying ASP.NET programming logic, you can store user data in either XML files or a Web configuration file and then validate users by using those files. Learn how to apply both of these simple methods of authentication.

The Lowdown on ASP.NET Authentication
Rating: none
Karl Moore - 01/14/2004
By default anyone can access your ASP.NET web pages; however, there is a way to keep nosy, unwanted types out. Discover how to use authentication.


Encryption



Cryptographic Solutions for .NET Developers: Hashing and Encryption
Rating: none
Jani Jarvinen - 07/27/2007
Learn how to use cryptography to improve the security of your applications. Discover the basic building blocks for encryption and hashing using C#.

ASP.NET Tip: Encrypting a Configuration File Section
Rating: none
Eric Smith - 01/29/2007
ASP.NET 2.0 enables you to encrypt portions of your configuration file. You can pick a section in your Web.config file to encrypt and then decrypt.

VB .NET Tip: Encryption in Just Twelve Lines of Code!
Rating:
Karl Moore - 08/05/2005
If you don't want the overhead or complexity of a government-standard encryption technique, there is a simple solution.

[Updated] Deploy SQL Databases Easily with the Installer Class
Rating:
Stefan Prodan - 05/02/2005
Discover a way to make SQL databases easy to deploy within a MSI file along with your applications.

Encrypt Connection Strings in VS 2005 .config Files
Rating: none
Paul Kimmel - 04/28/2005
Learn how to add a connection string to your app.config file in Visual Studio 2005, encrypt that connection string, and introduce a tool for automatically encrypting connection strings for ASP.NET.

Encrypt DataSets for Offline Storage
Rating: none
Paul Kimmel - 01/28/2005
Learn how to encrypt offline data, .NET style. Paul Kimmel offers you the opportunity to experiment with ADO.NET, XML serialization, streams, and the DPAPI—technologies you can use to encrypt user data.

Combining Symmetric and Asymmetric Encryption
Rating:
larryjf - 11/01/2004
Explains symmetric and asymmetric encryption, and then shows how to combine them. The .NET framework is used. All code snippets are written in VB.NET.

Cryptography in .NET
Rating:
Mark Strawmyer - 11/22/2002
In the latest CodeGuru .NET Nuts '& Bolts column, Mark covers encrypting data using the cryptography classes available through the Microsoft .NET Framework.


Net Security



Security Through the Lifetime of a Managed Process: Fitting It All Together
01/12/2004
Learn how the individual pieces of a security system come together and interact to provide a secure environment for executing semitrusted code.


PGP



Using the Gnu Privacy Guard (GnuPG/PGP) within ASP.NET [v1.0]
Rating: none
Emmanuel KARTMANN - 11/11/2002
Enable the use of GnuPG (the OpenPGP Internet encryption standard) within a .NET application using a C# wrapper class (GnuPGWrapper).


Article: SQL Server from an Agnostic's Perspective
Is it time to make your move to the multi-threaded and parallel processing world? Find out!
Get a free copy of Software Engineering with Microsoft Visual Studio Team System. Click here.
Microsoft Dynamics: ERP Software Your People Can Actually Use. Try It Out Free.
Intel Go Parallel Portal: Translating Multicore Power into Application Performance



JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info