security

how to secure my c# program(.exe) for using on one drive only.

Hello, I have c# program (.exe), I will give it to other people, and want that exe to work only from where it was run the first time, any copy should no not work. How can I do it? VERY THANKS ...

Securely enforcing user-inputted file paths within subdirectories

I know the solid security recommendation of avoiding accepting user input that you then use to choose a path to read/write a file. However, assuming you have a base directory you want to keep within (such as the root of an ftp folder), how do you best ensure that a given user input keeps us within that folder? For instance, Path.Combi...

Code cannot search AD

I have a problem with C# accessing AD objects. The goal of the code is to retrieve a users's groups. We have 2 domains involved - the domain where the application and many users reside, plus a trusted domain that also contains users so the code must be able to get groups from both domains. I am using a DirectorySearcher object and filt...

What is your opinion on uploading HTML?

I am building a control in .net 2.0 to allow users to write HTML into a textarea and then upload it. .NET won't allow them to upload it unless I set the page ValidateRequest=false. Of course, this opens up potential security threats. But, my plan is to uplaod the code, scan it for only the basic tags I would allow (like <B>), possibly in...

Alternative to storing with CryptoAPI

Synopsis: We are making a software that will be installed on many computer of a single network. The installation will most probably be made using a machine ghost. The users group consist of students and teachers. The software has to store a license key, along with an username and a password. These information are used to retrieve some ...

Comparing security exploits between Flash/Silverlight

I am trying to put a business case together for the deployment of Silverlight within a corporate SEO. One aspect I am looking at is security. I know Flash has a terrible history of exploits, but what about Silverlight? Has there even been any Silverlight exploits that allow execution of foreign code? Anyone know where I can get some i...

Packet socket in promiscuous mode only receiving local traffic

I have a socket created with socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)), and I've set it into promiscuous mode using struct ifreq ifr; strncpy((char*)ifr.ifr_name, interface, IF_NAMESIZE); if(ioctl(sock, SIOCGIFINDEX, &ifr)<0) fail(2); struct packet_mreq mr; memset(&mr, 0, sizeof(mr)); mr.mr_ifindex = ifr.ifr_ifindex; mr.mr_type = P...

Windows DPAPI - what to do with entropy?

I'm using the Windows DPAPI to encrypt some sensitive data for me. The cipher is stored in the registry. This all works well, but I was wondering if someone could clarify my understanding of the 'entropy' bytes that are (optionally) supplied to ProtectedData.Protect() in .NET. The 'entropy' byte array appears to be analogous to an initi...

How to protect swf files from being view?

Hi, I have couple of .swf games files uploaded to my server. I want to run some test, but I dont want to expose or let public/others people to see our swf files. Currently, if I type: www.domain.com/games/game1.swf It will play the swf file. I tried to visit some other flash game based websites. When I visit one of the swf files (e.g ...

Should I use Security Manager in Java web applications?

Is it sufficient to secure a Java web application with the rights of the user that is running the application server process or is it reasonable also to use SecurityManager with a suitable policy file? I have used to do the former and not the latter, but some customers would like us to also use SecurityManager that would explicitly give...

Why are passwords with repeating substrings weak?

Many websites have password strength checking tool, which tells you how strong your password is Lets say I have st4cK0v3rFl0W which is always considered super strong, but when I do st4cK0v3rFl0Wst4cK0v3rFl0W it is suddenly super weak. I've also heard that when password have just small repeating sequence, it is much weaker. But h...

How can I add a contact to Blackberry web application using JavaScript (if possible)?

I need to develop an application, which adds telephone numbers to existing or new contacts in Blackberry. The application is preferrably a web application. Is it possible to add and read contact information on Blacberry devices using JavaScript? If yes, a code sample would be appreciated. ...

Non-role based security?

This is a moot question as I'm not on this project any more, but it continues to bug me. I wonder if anyone has a better idea for future reference and general good programming practices. The textbook approach to security is "role-based security". Every screen, report, or other task is attached to one or more roles; every user is assigne...

Why might cookies be disabled?

I heard some firewalls and browsers disable cookies, and I think I may have heard blocking POST data. What are reasons a company may want to block cookies? (and alternatively post data. Which I am not interested in ATM.) ...

How to check if Windows user account name exists in domain?

What is the simplest and most efficient way in C# to check if a Windows user account name exists? This is in a domain environment. Input: user name in [domain]/[user] format (e.g. "mycompany\bob") Output: True if the user name exists, false if not. I did find this article but the examples there are related to authenticating and mani...

How to install/run a .Net activeX control at the default IE security level? Authenticode cert not working?

So after a lot of searching, trying and failing I've finally got the recipe down for creating a COM visible .net dll file, signing it and installing it (via cab and an exe) via IE such that you can use the control inside IE. Problem now is, it won't run at the default IE security level (Vista/Windows7). I got a thawte Authenticode cert...

Implementing des-ede2 in vb.net

Can anyone help me getting started with this? We have a current keygen for a set of our apps that's using des-ede2 in C++. I need to make my vb.net app validate keys generated by that keygen. Anyone have any ideas where to start? I'm googling like mad, but hoping someone can point me in the right direction. Thank you! ...

PayPal - ASP.NET Medium Trust

Recently our Web hosting provider moved to a medium trust level for all shared ASP.NET site hosting. As a result, we're having some issues completing transactions via PayPal's SOAP API. Specifically, a SecurityException exception is being thrown with the following stack trace: [SecurityException: Request for the permission of type 'Syst...

How to prohibit the removal of any rows in a specific mysql table ?

Is there a way to configure a mysql table so that writting and reading is possible but not deleting ? Exampe is : a table that contains many log that are legally important and that must never be deleted ! ...

Who is responsible for security flaws?

If you are a programmer of an app, with potential (costly) ramifications if the security of the app is compromised, are you responsible if anything goes wrong (e.g data is leaked)? Does it depend on whether you are the manager of the project? ...