C# Corner

Related resources for Net Security
  • Writing Secure Code Using C#3/13/2019 11:56:41 AM. Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how to
  • Password Encryption Using Salt Hashing In ASP.NET MVC12/11/2015 12:53:19 AM. This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
  • Code Acceptance Checklist in .NET10/23/2014 3:11:44 PM. This article provides a Code Acceptance Checklist for .NET.
  • .NET Code Access Security (CAS)8/6/2013 1:28:48 PM. Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from unauthorized actions.
  • Using Symmetric Algorithms to Encrypt Data10/4/2012 9:40:25 AM. In this article, I will propose a method of how to encrypt data and store it using symmetric algorithms whose are, in fact, four integrated classes within the .Net framework, namely DES,RC2,Rijndael and TripleDES but I will perform the task using the two last ones as they are the mostly used in real time cases.
  • Exploring Security in .NET: Part I10/4/2012 9:08:08 AM. This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
  • Developing Secure Web Site with ASP.NET and IIS: PartII10/3/2012 11:09:36 AM. Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanisms available in ASP.NET and how they join with IIS to provide a secure platform to develop sites in Part I of this article. I will be looking at Form Authentication and how to implement it in several sample web applications.
  • Hash Password Generator10/3/2012 10:54:06 AM. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Cryptography in Microsoft.NET Part I: Encryption10/3/2012 9:41:46 AM. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Extracting Modules and Component(RSAParameter) from X509Certificate PublicKey10/3/2012 9:28:28 AM. In some applications, it might be necessary to extract the modulus and exponent from the X509Certificate PublicKey. The X509Certificate.GetPublicKey() returns a byte array that contains the ASN.1 Encoding information along with the modulus and exponent as described in the RFC2459.
  • Understanding How Assert Effects Security10/3/2012 7:36:17 AM. Assert is a security action that is evaluated at run time. Code Access Permission classes and Permission Sets support a method called Assert. Using the Assert method to control access to resources or actions will allow your code to perform actions that it normally has permission to perform and will allow other callers up stream in the call stack to have access that they would not normally have.
  • Cryptography in Microsoft.NET Part II: Digital Envelop and Digital Signatures10/1/2012 8:59:24 AM. Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
  • Viewing Assembly Permissions5/20/2012 1:32:28 AM. In this article I will show you how you can view the Code Groups that an assembly belongs to and what permissions belong to the assembly. I will demonstrate the Caspol utility supplied with the .NET SDK.
  • Configuring Publisher Policy File5/20/2012 1:28:18 AM. Versioning in the Microsoft .NET Framework is managed at the assembly level and is only used when locating strong-named assemblies. By default, the common language runtime loads the assembly whose entire version number matches the version number in the calling assembly's metadata.
  • Code Access Security5/20/2012 12:57:20 AM. Code Access Security represents a fundamentally different way of controlling access rights to protected resources. Traditionally, permissions such as access to the file system, databases or network were allocated based on characteristics of the user. All processes executed by the user would assume an equivalent set of permissions.
  • Securing Your ASP.NET Web Applications 5/20/2012 12:56:33 AM. Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
  • Defining Custom Entry Points5/20/2012 12:28:39 AM. In this article i am going to demonstrate how we can manipulate the IL code to change the behaviour of how the .NET programme executes.
  • Protecting IL Code from unauthorised Disassembling5/19/2012 7:41:28 AM. Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This is an excellent mechanism to abstract the high level code from the underlying hardware.
  • .NET Security in C#5/19/2012 7:39:08 AM. This article shows how to make file I/O access be denied if the user running the application did not have administrator privileges.
  • XML Signatures in Microsoft .NET5/19/2012 7:14:40 AM. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Authorization and Programmatic Impersonation5/19/2012 6:49:21 AM. By default, ASP.NET applications usually do not impersonate the original caller for design, implementation, and scalability reasons. For example, impersonating prevents effective middle-tier connection pooling, which can have a severe impact on application scalability.
  • ASP.NET Security With SQL Server 20055/19/2012 6:15:32 AM. This article focuses on security concerm when using SQL Server 2005 in ASP.NET application.
  • A Glance at Web Application Security5/19/2012 5:00:02 AM. Web application security involves implementing protective measures against potential threats, malicious or unintentional, that exploit exposed vulnerabilities. Security is best implemented using the defence-in-depth technique by applying protective measures at network, host, and web application levels. This article will focus on security at the application level by exploring IIS and ASP.net authentication, authorization and secure communication.
  • Code Access Security using C# in VS.NET 20055/19/2012 4:53:26 AM. This article will focus on the definition and configuration of the Code Access Security Policy.
  • Security in ADO.NET12/13/2005 5:36:17 PM. This article gives a sound idea how to write secure code for ADO.NET . Data Access Layer (DAL) is a common and very curtail for your application. Its very important know some of the basic security points while writing ADO.NET program.