The Wayback Machine - https://web.archive.org/web/20111101203459/http://www.codeguru.com:80/csharp/csharp/cs_webservices/security/

    Security

    The Basics of Manipulating File Access Control Lists with C#

    Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.

    XSD Tutorial: XML Schemas For Beginners

    This five-part article gives a basic overview of the building blocks underlying XML Schemas, showing how and when to use them.

    .NET Tip: Creating a Password-Checking Function

    Password security is an easy way to tighten access to any application. Use this function to check a password against a set of rules, as well as a set of previously used passwords.

    Asynchronous Web Services in .NET Using WSE 2.0

    Discover an approach to efficiently communicate with a Web service asynchronously.

    "Indigo" CTP Released Today

    Microsoft released the Community Technical Preview (CTP) of their next-generation Web-Services technology, "Indigo," today.

    Asynchronous Web Services Invocation in .NET Framework 2.0

    The new asynchronous invocation framework in .NET Framework 2.0 increases developer productivity and greatly enhances the user experience. Learn how to implement it in your .NET applications.

    WSE 2.0 Specifications and How to Program Them Using .NET

    WSE comes to the rescue to develop better scalable and secured Web services.

    Blocking Brute-Force Attacks

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack.

    Build Secure Web Services With SOAP Headers and Extensions

    Building Web services with the .NET Framework is easy'—easy, that is, unless the Web services are secure. There is no standard, agreed-upon method for exposing Web services over the Internet in such a way that only authorized users can call them. Jeff Prosise jumps into one method of tackling this now.