security

Simple App Engine Sessions Implementation

Here is a very basic class for handling sessions on App Engine: """Lightweight implementation of cookie-based sessions for Google App Engine. Classes: Session """ import os import random import Cookie from google.appengine.api import memcache _COOKIE_NAME = 'app-sid' _COOKIE_PATH = '/' _SESSION_EXPIRE_TIME = 180 * 60 class Session...

Export TFS 2008 (Team Foundation Server) Groups and Permissions

Is there a way to export all of TFS 2008 Groups and Permissions for an Audit? ...

Getting the CVE ID Property of an update from WSUS API via Powershell

I am writing a script in Powershell to get the update information from each computer and correlate the information with another System which identifies updates by CVE ID. I have discovered that there is a "CVEIDs" property for an update in WSUS, which is documented in MSDN, but I have no idea how to access the property. Retrieving the CV...

System.Web.Services.Protocols.SoapException - Security perssmission issue

Can any one help me to resolve this error.My website hosted on shared environment. Server Error in '/' Application. System.Web.Services.Protocols.SoapException: Server was unable to process request. ---> System.Security.SecurityException: Request for the permission of type 'System.Security.Permissions.SecurityPermission, mscorlib, Versi...

Is php fileinfo sufficient to prevent upload of malicious files?

Hey guys, I have searched around a bit, and have not really found a professional type response to how to have secure fileupload capability so I wanted to get the opinion of some of the experts on this site. I am currently allowing upload of mp3s and images, and while I am pretty confident in preventing xss and injection attacks on my sit...

SSL, EV SSL, And URL Rewriting

We extensively use a third party app that we'll call thirdparty.com. thirdparty.com and mysite.com have a common navigation and look and feel, so to the users, they think they are always on mysite.com. What we're going to do is start url rewriting 3rd.mysite.com to display thirdparty.com, to make it look even more like a seamless experi...

How can I validate/secure/authenticate a JavaScript-based POST request?

A product I'm helping to develop will basically work like this: A Web publisher creates a new page on their site that includes a <script> from our server. When a visitor reaches that new page, that <script> gathers the text content of the page and sends it to our server via a POST request (cross-domain, using a <form> inside of an <ifr...

Security in API authentication

We are in the process of revamping our server side API, and we need to manage security. Our current model requires that a credentials object (containing user, password, and pin) be included in each method invocation. Our development team, however, has decided that we should have session objects instead (which is fine by me), but the new ...

Java applet loading images from external jars

I have a jar on a server, and users should be able to develop extensions for it. Therefore the jars main class should be extended and some resources should be added to a second user created jar which will be loaded from another server or locally. Now I have problems accessing the resources (images) from the user loaded jars. Heres is the...

Roles / Permissions framework for c#?

Hi there, Does anyone know of a good framework to allow me design permission and roles against users. Basically allowing me to automatically check a user can do a certain thing, and then disabling or enabling menu items etc I am not really looking for asp.net security ... as i need to use it in my own service layer and clients both WE...

Having session_id, can I bypass login form on remote server?

Third party zend encrypted system has Web API, that let's you login through it and acquire session_id (for later calls?). Then there's a task, how to bypass login form having that session_id. Is something like this possible at all? ...

How to make an Asp.net MVC 2 website have a Private Beta Mode.

I am creating an ASP.Net MVC website that I am launching soon in private beta. What I am using. ASP.NET MVC 2 ASP.NET Sql Membership Provider Authorization Attributes on ActionMethods. ex. [EditorsOnly] What I am trying to accomplish: During the private Beta period of my website, I want no anonymous users to access my site. Only ...

Rewriting Live TCP/IP (Layer 4) (i.e. Socket Layer) Streams

I have a simple problem which I'm sure someone here has done before... I want to rewrite Layer 4 TCP/IP streams (Not lower layer individual packets or frames.) Ettercap's etterfilter command lets you perform simple live replacements of Layer 4 TCP/IP streams based on fixed strings or regexes. Example ettercap scripting code: if (ip.p...

Custom security permission_types in Jetspeed

Is it possible to create and manage custom permission types in Jetspeed. In addition to the default - folder, page, link, portlet I would like to add document as a type. I want to then use the list of permissions of type "document" that a principal has to manage access to documents. Thanks ...

What's the best, Escape then store Or store then escape the output?

Hi, After doing a long search on stackoverflow i didn't find any one talked about this even if it's a big choice, the Question is what's the best in order to prevent both of XSS and SQL injection, Escaping the data then store it in the DB or Store it as it is and escape when output it? Note: it is better if you give some examples of pra...

Report Abuse in Twiki website

I want to include report abuse button in my website. But couldn't find any such thing in the twiki documentation. Read the entire stuff on twiki variables, access controls, web preferences, but couldn't find anything about such or similar type of button. ...

How to prevent arbitrary code execution vulnerability in our programs?

You always read in changelogs when your system or browser or any program updates that they fixed a bug that made possible that an attacker can execute any code in your computer with a forged website, or attacking your computer with carefully forged packets, etc... Because you read it so often that means any program can have similar vuln...

Limiting the number of variables that one can use in twiki

Can I somehow limit the number of variables that a user can have access to somehow. Thanks in advance for replying. ...

What are some good ways to prevent malicious proxy users from accessing your site?

This question has been bugging me for some time. I always picture launching my site, and some dirt bag coming on and uploading porno or spamming profanity. So I decide I don't want him using my site, I ban his account and ban his ip in my cpanel, but what if he is using a proxy and just keeps making new accounts to harass me? What can I ...

(php) how to properly 'save' info in forms completed thus far

So i have a form that on paper is 40 pages long. I was going to take the natural sections of this form, and make separate html forms for each section, with the idea that on the first page there would be a first form, then you hit 'Continue to next section' which essentially is the 'submit' button, which moves the user to section two, etc...