IT Security


  • W23 Protector

    The attached project is a W23 Protector. This program protects with a Windows registry code by applying 8 various types of protections. The program also has a security account with 3 types of user system accounts which are saved in an XML file.
  • Creating a Login User Control

    In this article, we have started with an introduction to the UserControl and have learnt to use the ADO+ DataReader.As we seen User Controls simplifies several common Web application scenarios.User Controls allow developers to easily define custom controls using the same programming techniques for writing Web Forms.
  • XML Signatures in Microsoft .NET

    In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Role Based Security Using Authorization Manager in Windows Server 2003

    Authorization Manager in Windows 2003 is the more flexible, scalable and easier administration tool for role based security. Using Authorization Manager we can define roles and the tasks that roles can perform.
  • Security in Microsoft .Net Framework: Part I

    This article explain you, how to provide security to your applications.
  • Authorization and Programmatic Impersonation

    By default, ASP.NET applications usually do not impersonate the original caller for design, implementation, and scalability reasons. For example, impersonating prevents effective middle-tier connection pooling, which can have a severe impact on application scalability.
  • The Realization of WS-Security Related Specifications by WSE 3.0.

    In this article, we are going to learn the basic concepts of WS-Security related specifications and how they are implemented by Microsoft Web Service Enhancements 3.0 technology.
  • 10 Measures to Reduce Credit Card Fraud for Internet Merchants

    The purpose of this document is to introduce 10 preventative measures that merchants can take in order to minimize credit card fraud. In addition, we would like to take this opportunity to introduce a complete suite of FraudLabs™ Web Services specializing in the analysis of credit card fraud risk for Internet merchants.
  • How to Maintain a CodeGroup in Security Policy at Runtime?

    Whenever protected resources are accessed by an assembly, it’s permissions are determined by the code access security system of CLR. Each permission set granted to an assembly is based on the assembly's evidence (such as its URL or publisher certificate, strong name), which in turn is based on configurable security policy.
  • ASP.NET Security With SQL Server 2005

    This article focuses on security concerm when using SQL Server 2005 in ASP.NET application.
  • Test for User Group Membership in ASP.NET C#

    This article describes a simple approach to determining whether or not a logged in user is a member of a group within the context of an web based application.
  • Attaching a Digital Certificate (Public Key) to an HTTPS Request

    This article will guide you on how to post data to an HTTPS (i.e., secure connection) URL from a Windows application (.NET) by attaching a digital certificate from a certificate file and getting the response back.
  • A Glance at Web Application Security

    Web application security involves implementing protective measures against potential threats, malicious or unintentional, that exploit exposed vulnerabilities. Security is best implemented using the defence-in-depth technique by applying protective measures at network, host, and web application levels. This article will focus on security at the application level by exploring IIS and authentication, authorization and secure communication.
  • Code Access Security using C# in VS.NET 2005

    This article will focus on the definition and configuration of the Code Access Security Policy.
  • How to Get Permissions Assign to Current Assembly in VS.NET 2005 Using C#

    The following code will explain the permissions which are assigned to a current assembly.
  • Securing your .Net Assembly code

    Tips on how to secure your .net code from crackers.
  • Create Your Own SSL Enabled Website

    In this article we will learn how to create the SSL certificates for our web site which we are hosting on our IIS server.
  • How to Secure a Web Site Using SSL

    Secure communication is an integral part of securing your distributed application to protect sensitive data, including credentials, passed to and from your application, and between application tiers.
  • Web Data Security Most Popular Job by 2015?

    If the speed of data keep at the same pace as today, IDC predicts, the amount of data on the Web will be 50 times than today. In year, 2011, the amount of data created and replicated is close to 2.0 trillion gigabytes.
  • Encryption and Decryption in .net

    Encryption and Decryption in .net
  • Exploring ViewFormPagesLockDown Feature and Anonymous site security

    In this article you will learn how to Explore ViewFormPagesLockDown Feature and Anonymous site security.
  • Requesting Admin Approval at Application Start

    Learn how to make your application requests UAC elevation (in Windows Vista and later versions) at start.
  • Introduction to SLP Services Configuration

    This article explains about adding products/feature sets followed by Code Protection Integration using SLP Online Services.
  • How we configure interfaces of PIX or ASA

    A pix or firewall can have up to the 10 interfaces based upon PIX or ASA version and Interface module install on it.
  • Microsoft's OneCare - Threat to Norton and McAfee?

    Microsoft OneCare provides all-in-one including AntiVirus, Firewall, Antospyware, Anti-phishing, backup and restore and more.