security

Cross-database view permissions

I'm working with a database (let's call it DB_data) that contains all of the tables for a series of applications. In an attempt to minimize downtime during upgrades, a facade database (let's call it DB_facade) has been created which has a view for each of the tables in DB_data. It also contains all of the functions and stored procedures,...

Mono problems with cert and mozroots

I am using this command on my mono VM sudo mozroots --import --sync It appears to be getting the cert from this site. I then try to connect to my ssl site and i get the exception that the cert is invalid. I use firefox and see the cert was issued in 2010. I looked at that file and see the last time its been updated was 2009-05-21 12...

Store Admin Password in OSX Keychain For Automating Certain Processes?

I have a whole series of commands that I need to run on login, many of which require root privileges. So, to save a few steps I put them all into one apple script so I wouldn't have to open the terminal. But still, I'd like to be able to do this without entering my password at all (I like to boot my machine early AM while I'm still sle...

How to launch a process on Linux with highly restricted privileges?

Hi everyone. I'd like to (from code) launch a process with highly restricted privileges. Can save files, but only in its own folder and limited to a quota. Can use memory, within a quota. CPU time (including any subprocesses it launches) is limited to a quota. Can't talk with any other process except it's own and the interface to my c...

Secure iframe in unsecure document?

Hello. I'm building a website for a sports center. Registrations are handled through a third-party software program. There are options to register directly through the third party's site or to integrate the registration form into my site with iframes. Since I'd rather not send people to another site, I went with the iframes option. My...

Common Bugs Book

I am looking for a book (or some other resource) where the most common bugs are explained and shown the proper fix. I am particularly interested in vulnerable bugs that trigger a CVE ...

Dynamic evaluation of functions in JS (is this safe?)

I have a website in which all the pages are processed through an index.php that includes different PHP files depending on the requested URL (this is done through mod_rewrite). I'm using the following method to execute specific functions at page load: index.php <script type="text/javascript"> readyFns = Array(); </script> <?php // Do ...

WCF service which supports several security options

Hi there I was wondering whether it's possible to configure different security options for a single web service without differentiation of the URI. The service should support authentication based on Certificate on the Transport level and based on Username on the Message level. When I define two endpoints where each references its corres...

Question regarding sitemaps

I am storing my sitemaps in my web folder. I want web crawlers (Googlebot etc) to be able to access the file, but I dont necessarily want all and sundry to have access to it. For example, this site (stackoverflow.com), has a site index - as specified by its robots.txt file (http://stackoverflow.com/robots.txt). However, when you type h...

Allow users to view items in a SharePoint Document Library, but not open the files

I have the requirement to allow users to view the content of a document library, including browsing through folders, but not actually open the individual files. There doesn't appear to be a permission to restrict users from opening files, but still display them. Naturally it is an option to create a view that doesn't have the 'open lin...

Data Access control in J2EE technologies

Hi Guys, I am working on a project that requires that i implement a mechanism for controlling data access to the content that displayed on the pages. First off to clarify, i am not refering to the ability for different users to log on to a specific page and or view specific pages. That is a different type of access control. I am more...

What is a good way to produce a random "site salt" to be used in creating password retrieval tokens?

I would like to create a site-wide hash to be used as salt in creating password retrieval tokens. I have been bouncing around stackoverflow trying to get a sense of the best way to do this. Here's the reset process: When a user requests a password reset email the code generates a retrieval token: $token = hash_hmac('sha256', $reset_h...

Is _mmServerScripts necessary?

When developing sites using Dreamweaver, it creates a _mmServerScripts directory on the root of your site. We've been reading that this folder contains SQL statements that are vulnerable to attack. We would like to avoid this all together, if possible. Is this folder even necessary? Can you do anything to Dreamweaver to tell it to never ...

Getting a trusted signature for a Java Web Start application

I'm planning to distribute an application over the internet with Java Web Start, and I'm aware that I'll need to sign the application to enable certain security privileges (network connections, dynamic class loading etc.) What is the best way to create/obtain a signature for this purpose? In particular I'm interested in: Minimising t...

secure web server asp.net

I have a graphical user interface for my company product. I want to secure the data being sent back and forth between client and server. Is SSL one of the options? if yes, Please can some1 tell me the steps on how to implement it in my application code. Do i need to buy the certificate or can i make it.. which is the best choice? Any...

Integrate Java web service with Unix security

I am hosting a Java web service on a AIX unix box using JBoss. Some of the web methods browse the unix file structure (IE GetDirectoryFiles returns all files for the directory path passed in). I want to integrate this with the unix security so that the caller would pass in a username/password at the session level and they would be limi...

Security and throwing an Exception

Hi all. I wrote a function that gets the balance from PayPal. To connect properly I'm passing the user, password and certificate as parameters. Every thing looks ok until something throws an Exception inside and php prints all the parameters (user details in this case) on the stacktrace. I'm logging everything to a file so users wouldn'...

Example of a buffer overflow leading to a security leak

I read many articles about unsafe functions like strcpy, memcpy, etc. which may lead to security problems when processing external data, like the content of a file or data coming from sockets. This may sound stupid, but I wrote a vulnerable program but I did not manage to "hack" it. I understand the problem of buffer overflow. Take this...

Signed java applet

I am creating a socket connection with an unsigned applet to a different host and I'm getting java.security.AccessControlException: access denied If I sign this applet with either "self-cert" or "CA cert" does the applet gain the permissions to create a socket connection to a different host (not the same host it was downloaded from) and...

Do I need to validate uploaded files (PHP) if they are not going to be stored on the server?

I have a wordpress theme with an options page. I have included a basic export/import options feature. The export feature allows the users to download the options to a text .dat file and store them on their own computer. The import options button reads a .dat file and overwrites the current options in the database. Then the file is delete...