See how easy it can be to implement Role-based Security in your Visual Basic applications.
Latest Authentication Articles
Using Secure Sockets in .NET
Securing regular sockets against tampering isn't that difficult if you follow this lead.
ASP.NET FTP with SSL
This code snippet and document show how to connect to an FTP server with SSL enabled using ASP.NET. The code is written in C#.NET.
ASP.NET Mixed Mode Authentication
In many web applications it is desirable for both intranet users and external parties to be able to seamlessly log onto the system. The problem this raises is that it is not easy to allow intranet users to log in via Windows integrated authentication while also allowing external parties to log in to the same application using standard forms authentication. This article will show you one way to achieve the best of both worlds when it comes to authentication.
Designing Role-Based Security Models for .NET
In this article, Michele Leroux Bustamante discusses authentication, authorization and role-based security in .NET. Along the way, he provides some best practices for implementing role-based security in some typical .NET application scenarios including rich clients, Web applications, and Web services.
Implementing Active Directory Services in ASP.NET 2.0
With the introduction of ASP.NET 2.0 and Visual Studio 2005, many of the security tasks required to connect an application's authentication and authorization mechanisms to Active Directory have been dramatically simplified. This article shows how to perform both Active Directory (LDAP:\\) and local member server (WinNT:\\) tasks.
Latest Developer Videos
More...Latest CodeGuru Developer Columns

Comparing the stdio and iostream C++ Libraries
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.

.NET Back to Basics: The String Class
Take the plunge into the string class and master it.

Developer Careers for the VB Programmer
Learn about the various types of software development there are as well the job titles that go along with them.
Influencing Users: Compliance and Conformity
Learn about two common influence techniques, compliance and conformity, as well as how to design for them.