.NET news » Security Security Rss Feed

SQL Trusted Connections with ASP.NET

Hard coding passwords into your application or your web site is a bad thing. Barry looks at how we can use trusted connections to provide the authentication we need, without the need for these potential security hazards.
9 Oct 2007, 21:03:00   Source: SQL Trusted Connections with ASP.NET   Tags: Database Security

Apply Visual Studio Code Analysis to Beef Up Security

Visual Studio's code analysis feature offers hidden extensibility opportunities for writing custom security code review rules.
20 Sep 2007, 23:55:01   Source: Apply Visual Studio Code Analysis to Beef Up Security   Tags: Security

Applying Cryptography Using The CNG API In Windows Vista

Windows Vista introduces a new cryptography API to replace the old CryptoAPI, which has its roots in the early versions of Windows NT and Windows 95. Cryptography Next Generation (CNG) is meant to be a long-term replacement for the CryptoAPI, providing substitutes for all of the cryptographic primitives it offered. CNG supports all of the algorithms provided by the CryptoAPI, but goes much further and includes many new algorithms and a much more flexible design, providing developers with greater control over how cryptographic operations are performed and how algorithms work together to perform various operations.
21 May 2007, 19:00:00   Source: Applying Cryptography Using The CNG API In Windows Vista   Tags: Security

SQLCLR Security and Designing for Reuse

Bringing the Common Language Runtime (CLR) into SQL Server presents an entirely new set of challenges with regard to privilege and some of the rules that SQL Server developers are used to do not completely translate. Simple grant/deny/revoke logic still applies, but the CLR also brings its own set of specialized permissions, which require slightly different handling in order to properly manipulate.

By not carefully considering these issues when designing your SQLCLR code base, you may be allowing your code too much access.

This article focuses on what the SQLCLR permission sets do to control security and reliability, and what you need to understand when working with them in order to design a system that takes advantage of least privilege. By not carefully considering these issues when designing your SQLCLR code base, you may allow your code too much access, thereby creating potential vectors for security problems down the road..

26 Apr 2007, 19:00:00   Source: SQLCLR Security and Designing for Reuse   Tags: Database Security

Protect Your Downloadable Files Using HTTP Handlers

This article attacks a problem for which I have heard many solutions: How can I offer file downloads on the Internet and protect them from unauthorized downloading? There are many answers to this problem, but some are not without their own problems. In this article, I’ll review some of the techniques commonly used by software vendors, and then show you my solution for this.

1 Mar 2007, 18:00:00   Source: Protect Your Downloadable Files Using HTTP Handlers   Tags: ASP.NET Security

A Programmer's Exploration of Vista's User Account Control

Vista's User Account Control (UAC) improves security, but making it work smoothly requires a little more developer work. Find out what you need to know to code Vista UAC-aware applications.
1 Mar 2007, 15:47:24   Source: A Programmer's Exploration of Vista's User Account Control   Tags: Security

Using Asymmetric Encryption and Digital Signatures in a SQL Server 2005 Database

In this article we start with a look at the T-SQL commands for performing asymmetric encryption and decryption. Next, we discuss using digital signatures as a means for ensuring the integrity of the encrypted data. This article concludes with an ASP.NET 2.0 website example that ties together the lessons learned throughout this article series. Specifically, the database used by this ASP.NET application stores customer information with the customer's credit card information encrypted. An ASP.NET page provides a means to view the sensitive information in plaintext as well as a means to add new customers to the database with the credit card information properly encrypted.

Using Symmetric Encryption in a SQL Server 2005 Database

As the attacks in which hackers use become more and more sophisticated, and the programs in which they attack become increasingly complex, encryption is becoming the last line of defense in database management system (DBMS) security.

In this article we will look at how, specifically, to encrypt the data in a SQL Server 2005 database using symmetric encryption techniques. We'll start with examining the facilities for managing keys in SQL Server and then explore symmetric encryption in SQL Server 2005.

An Overview of Cryptographic Systems and Encrypting Database Data

As the attacks in which hackers use become more and more sophisticated, and the programs in which they attack become increasingly complex, encryption is becoming the last line of defense in database management system (DBMS) security. Since Microsoft announced their Trustworthy Computing security initiatives four years ago, the industry has been waiting to see how these initiatives would be implemented in upcoming products. With the introduction of Microsoft's newest DBMS, SQL Server 2005, it does indeed seem as though they have provided what they have promised.

What follows is a two-part article series that provides an in-depth examination of encrypting data in SQL Server 2005. In this article we will exploring key challenges facing database systems and the motivations for providing robust encryption mechanisms directly within the database system. We will also look at encryption fundamentals and SQL Server 2005's encryption capabilities.

.NET Application Domains

Explains advantages of using application domains features in .NET. Include two Visual Studio .NET sample projects with source code.
15 Jan 2007, 11:46:05   Source: .NET Application Domains   Tags: Security