security

Secure information contained on iPhone SQLite DB

I am working on an iPhone app that uses CoreData(with SQLite) to stores some sensitive biographical data that is downloaded via a Restful Web Services for offline use in the device. I am worried that the competition could pay a subscription and extract the .sql file via SSH with a jailbroken device, and make copies of the data that has...

Attacking synchronized clock protocol (Kerberos)

If we assume that an attacker is able to control the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol? ...

Rhino Mocks mocking WindowsImpersonationContext

Is it possible to use Rhino Mocks to mock WindowsImpersonationContext? I get: System.MissingMethodException : Can't find a constructor with matching arguments ----> System.MissingMethodException : Constructor on type 'WindowsImpersonationContextProxy04bee852de914d5b8a47d6776edc4cb3' var windowsImpersonationContext = mockRepository....

What is a SharePoint Server Side File Hander?

In SharePoint, the definition of the 'View Only' permissions level is as follows: Members of this group can view pages, list items, and documents. If the document has a server-side file handler available, they can only view the document using the server-side file handler. What is considered to be a server-side file handle...

PHP AJAX login, is this method secure?

I have just started PHP and mySQL and need to know if this is "safe". The login information is passed into the following PHP file through AJAX (jQuery). jQuery AJAX $("#login_form").submit(function(){ $.post("login.php",{user:$('#username').val(),pass:$('#password').val()} ,function(data) PHP ob_start(); mysql_connect("-", "-", ...

Have Java Web Service execute under different context

We have a Java 1.4 web service running on AIX 5. We want to have the web service methods execute under the context of the caller, not the hosting web server. How would we go about this? ...

what does this script do? - hacked site

I just came accross a site that has been hacked and I'm wondering what this javascript does. so far as I can tell it attempts to redirect the page somewhere but fails. It looks like it made its way into every last file on the server. <script> function sF() { }; var sMN = new Array(); sF.prototype = { b: function () { ...

Query TFS for permissions

Is there a way to list which users and AD groups have permissions to a folder and all sub folders in a TFS project? EDIT: We are using TFS 2008 ...

PHP secure Session Check ?

Example, i have a session that i gave to users that have maching password = stored password, like all simple login system : if ($pSys->checkPassword($AccountData['password'], $StoredData['password'])) { // Checks Password and Username $_SESSION['login'] = true; } so the question is, is this secure enough? function loginChec...

Securely storing user data in MySQL?

Hello, I'm creating a service that will gather user data such as username, name, email, login password. How do I securely store this data? One thing I was thinking is store it encrypted in the DB so that if anyone gets access to the DB they won't be able to use the data. But that arises two issues - #1 - much much slower search of the ...

T-SQL schemata to organize code

Hi, I have a ms sql server database with a growing number of stored procedures and user defined functions and I see some need to organize the code better. My idea was to split sps and functions over several schemata. The default schema would hold the the sps called from the outside. The API of the database in other words. A second schem...

How can you encrypt users' data server-side without ruining the experience?

Many users – myself included – would like the security of having everything they do on a web service encrypted. That is, they don't won't any one at the web service to be able to look at their: posts, info, tasks, etc... This is also major complaint in this discussion of an otherwise cool service: http://news.ycombinator.com/item?id=154...

Use SimpleHtmlDOM + Login?

I am using SimpleHtmlDOM PHP quite successfully to scrape some of my favorite webpages. Some of these pages, however, require me to log in before I can get at the information that I really care about. Does anyone know how (or if it's possible) to get this library to access a page that requires a username and password be enterred before y...

Securing a .NET framework

The NSA provides a guide to securing version 2.0 of the .NET framework here: http://www.nsa.gov/ia/_files/app/I731-008R-2006.pdf I was wondering if they provide guides for later versions e.g. version 3.0 or 3.5? Also, I'm interested in any other links especially those from NIST or NSA on .NET security. ...

How can Malroy impersonate Alice in the Wide Mouth Frog protocol?

How can Malroy impersonate Alice in the Wide Mouth Frog protocol? Notation: A: Alice B: Bob S: Trusted server Ta: Timestamp A Ts: Timestamp S Kab: Session key between A and B Kas: Session key between A and S Kbs: Session key between B and S Protocol: step 1: A->S:A,{Ta,Kab,B}Kas step 2: S->B:{Ts,Kab,A}Kbs ...

j2ee webapp A using authentication facility of web app B

Any user that tries to access some secure resources on my webapp A needs to be authenticated with a webapp B. B has access to the user credentials password etc., I am wondering about the right way to go about this. One alternative would be to have a filter protecting my secure pages. If a user that is unauthenticated access A secure res...

Is this a secure authentication system for an ajax-driven app?

I apologize ahead of time, becuase I'm neither great at explaining things nor flow charts. This is not a specific code problem, but a general question on session security. I'm trying to eliminate as many potential problems as possible at once. I think this takes care of: CSRF Session fixation Session prediction Cookie theft (through b...

What is best practice for dealing with passwords and configuration files?

I'm writing an internal business application that needs to access a number of different databases. Each database needs a different password. I'm loathed to actually hard-code my passwords because if they change then Ill be forever having to modify them in my code. Not to mention the fact that there is no attempt at security in this situa...

Why is using a URL containing a colon considered as a "potentially dangerous request"?

Someone (probably a bot) sent a request with the following URL to my ASP.NET 4.0 web forms application (running on IIS 7.0): http://ipaddress-of-my-applications-domain/bla1.bla2.bla3.bla4.bla5:) This caused an System.Web.HttpException. I received a logging email from ASP.NET HealthMonitoring I had configured, telling me: A potentially...

Why does the Kerberos protocol not feature perfect forward secrecy?

Why does the Kerberos protocol not feature perfect forward secrecy? ...