security

Security and includes based on URL data

Does the following include statement present a security risk? include "pages/".$_GET["page"].".php"; If yes: - why? - what would be a safer approach? ...

creating password field in oracle

What is the use of "The Secure External Password Store"? And can I create password field in my Oracle table using "The Secure External Password Store"? Or how can I create password field in my Oracle table without using "The Secure External Password Store"? ...

Security issues with jLinq

I stumbled upon jLinq through the open source ads in stackoverflow. The possibilities are astonishing but I am wondering. What kind of datasets I shouldn't be using it on? As those datasets run on the client they could be modified using the URL: javascript: ... What should be done to prevent rewriting of data? How do I authenticate that ...

Security Concern about hidden from field.

I want to check the user whether they have sign in or not, so I assign a hidden from field to store the session key, and I have a post method form to submit. Can others/hackers, copy my session key from my field and send a post method to the server?? If yes, how can I do to avoid this? ...

Grails acegi plugin user recommendation

I'm about to add security to my Grails App, and I'd like to know from your experiences what's the best approach: To add fields to the Person Domain class (such as phone, address, etc.) To create an independent Domain class and map it one to one to the Person class ...

PHP: Anti-Flood/Spam system

Hello, I'm actually working on a PHP project that will feature a user system (Login,Register,Send lost password to email,..) and I think that this may be very vulnerable to Brute-Force attacks and/or Spam (Send a password to someone's email like 1000 times, etc. use your fantasy) . Do today's webservers (Apache, IIS) have some sort of...

How can I create an authentication cookie, but w/o asp.net formsauthentication?

Do we know the algorithm that asp.net uses to create the authentication cookie (when using forms authentication?) Can we basically create our own copy implementation? if so, how? What does it use to generate the encrypted cookie value, I know it uses whatever you pass into the SetAuthCookie call (which is usually the userID/username). ...

Best Java framework to manage/create dynamic security policy rules?

Typically in any web application, the major security concern is securing the resources from the malicious users who are trying to access un-authorized resources. They can change a value in the request parameter and try to access something that doesn't belong to that particular user. For Example: http://blah.com/id=foo a user can change...

C#: Overidden methods with Security Attributes in .Net 4

In .Net 4 some methods are now decorated with different security attributes than they were in previous versions (ie the new SecurityCriticalAttribute). In order to override methods with security permissions the relative security accessibilities on the derived declaration must match those on the base declaration (or else a runtime excepti...

SQL Server 2005: How Secure is SQL Server Authentication?

If you use SQL Server Authentication (2005), are the login details sent in clear text over the wire? ...

How does two party encryption work?

I am able, with pidgin otr for example, capable of communicating with anyone and it is secure. We haven't exchanged a secret passkey or anything else, the program just sets up the encryption and everyone assures me it is secure. So what I have is this: Person1 talking to Person2 (Assuming people really are who they say they are) Since...

Is using a database-level MD5 function a bigger security risk than an application level function?

I've got a chunk of code that validates a user's username and password, which goes something like this: $sql = "SELECT * FROM user WHERE username='{$_POST['username']}' AND password=MD5('{SALT}{$_POST['password']}')"; Is this any more/less secure than doing it like this? $sql = "SELECT * FROM user WHERE username='{...

.NET Folder Permission Issue

I'm making a software that tries to restore a database to sql server, but for that, i need Full Control over the folder that will host .mdf and .ldf files, I'm using the System.Security.AccessControl classes to give Full control for everyone but its not working! I just don't know why its happening... The app aplies the rules ok, but when...

Server side control hidden - possible to read values client side?

Hi, A quick question. I've got two textboxes running server side and have their visibility turned off. I'm using a couple of ASP.NET controls which require the textboxes to exist. However, I am filling them from the code behind and would not like the user to see this. Can the user turn the visibility on and see the values entered in t...

How to securely store a user's OpenID

I'm writing a web application that allows anyone to register (using their OpenID). When a user registers, their OpenID is saved in a MySQL database. My question is: In which format should I be storing a user's OpenID value? If someone were to gain access to my database (I'm planning for the worst case scenario) - would it be an issue t...

CakePHP: using Security::allowedControllers and Security::allowedActions

I'm trying to use Security::allowedControllers and Security::allowedActions. So I have a controller which look more or less like this class AppController extends Controller { var $components = array('Security'); //other components //other stuff } class BookController extends AppController { function beforeFilter() { ...

How to prevent a cross site request forgery attack using an image URL?

From ha.ckers.org/xss.html: IMG Embedded commands - this works when the webpage where this is injected (like a web-board) is behind password protection and that password protection works with other commands on the same domain. This can be used to delete users, add users (if the user who visits the page is an administr...

Are there commercially deployed and used .NET CAS (Code Access Security) based applications?

I've seen a couple threads here on SO that ask about what CAS is and how to use it.My specific is specifically focused on real-world usages of CAS. For example: DotNetNuke did some efforts in the past to be able to run under Medium Trust: is that still true? what is the % of DNN that run in partial trust (i.e. not full trust)? what &...

Is it a bad idea to use window.open and try to communicate between windows?

I'm working on a web page that will have a google-reader type scrolling list of content, and I'd like to open that content when it's clicked on in a new window. The problem is that I'd really like to be able to update the scrolling list from one of the newly opened windows. For example; I'm looking at a list of products for sale on m...

Make web application secure

I wanted to make a new php web application and if I follow the following things, it my site then safe? Escape user input ($_GET && $_POST) with addslashes Make prepared statements with PDO Check user input for the right type (e.g. int or string) ...