Security
IT Security

RECENT POSTS

  • Authentication-Authorization / Windows built-in Role enumeration

    In this article I will be talking about authentication and authorization. Authentication is the process which uses users cridential to validate against system, where as Authorization is the process the authenticated user has rights to do some specific task.
  • Security Steps for Strong Authentication

    Weak authentication increases the identity spoofing threat. If a user’s logon credentials fall into the wrong hands, an attacker can spoof the user’s identity and gain access to the application. The attacker shares all of the user’s privileges in the application. Credentials must be protected as they are passed over the network and while they are persistent
  • Simple Password Encryption Program

    This article shows you how to make a simple password encryption program.
  • User Authentication & Role Management in ASP.NET 2.0 using Sql Server 2005: Part II

    This article gives you a detailed idea of how to implement the role management in ASP.NET 2.0 using SQL Server 2005.
  • User Authentication & Role Management in ASP.NET 2.0 using Sql Server 2005: Part I

    This article gives you a complete description of the user authentication and how to manage roles for different users using asp.net 2.0 and sql server-2005.
  • Visual Guard for .NET

    Novalys announces Visual Guard, which is aimed at setting up user’s profile and permissions for .net application (who is allowed to do what?). The tool easily integrates to any .net application and makes rights/permissions management easier thanks to its administrating console.