The Basics of Manipulating File Access Control Lists with C#
Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.
Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.
This five-part article gives a basic overview of the building blocks underlying XML Schemas, showing how and when to use them.
Password security is an easy way to tighten access to any application. Use this function to check a password against a set of rules, as well as a set of previously used passwords.
Discover an approach to efficiently communicate with a Web service asynchronously.
Microsoft released the Community Technical Preview (CTP) of their next-generation Web-Services technology, "Indigo," today.
The new asynchronous invocation framework in .NET Framework 2.0 increases developer productivity and greatly enhances the user experience. Learn how to implement it in your .NET applications.
WSE comes to the rescue to develop better scalable and secured Web services.
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack.
Building Web services with the .NET Framework is easy'—easy, that is, unless the Web services are secure. There is no standard, agreed-upon method for exposing Web services over the Internet in such a way that only authorized users can call them. Jeff Prosise jumps into one method of tackling this now.