security

Which use of AdjustTokenPrivileges in KB131065 is correct?

KB131065 demonstrates how to activate SeDebugPrivilege to open a handle to any process. It has a function named SetPrivilege that calls AdjustTokenPrivileges, but there are two implementations and no mention why. The first implementation calls ATP in two passes: // // first pass. get current privilege setting // tp.PrivilegeCount ...

Authenticating a user over HTTP (instead of HTTPS)

INITIAL NOTE: This is just for a personal tinkering project; I'm not writing enterprise security here, and if I were, I'd know better than to try to write my own scheme. :-D EDIT: To stress the above point, I tried to tag this under "iKnowThisWouldBeABadIdeaInRealLife", but SO wouldn't accept it because it was >25 chars. Just be aware...

GWT/Javascript client side password encryption

I'm implementing authorization in my gwt app, and at the moment it's done in the following fashion: The user signs up by putting his credentials in a form, and I send them in clear text to the server The server code hashes the received password using BCrypt and puts the hash in a database When the user wishes to log in, his password is...

Logout hashes, how are they handled ?

What's the way the logout hashes are usually handled in php? on a lot of sites there's usually logout hashes to confirm that the user that's logging out is teh correct user, how is this usually handled ? Examples http://domain.com/user/logout/nil4ytwojytjwoytjwy5tw5 nil4ytwojytjwoytjwy5tw5 being the hash Just an update of my res...

PHP: Is it secure to use index.php as the bootstrap?

I ask because it seems like the only thing ever called in a proper app index.php file is the require_once bootstrap file. I'm assuming this adds a layer of security but if not, this pattern seems pointless. Why not just use the index.php file as the bootstrap? Any opinions, cautions, thoughts etc. are appreciated! (By the way, my htacce...

SQL Server security, read-only default to new databases

How do I set a Windows login on SQL Server so that it has read-only access to any database on the server, and will default to having read-only access to any subsequently added database. I would prefer T-SQL code. I am using SQL 2000 ...

Synchonous SSL certificate handling on iPhone

Hi, I was wondering if anyone can help me understand how to add SSL certificate handling to synchronous connections to a https service. I know how to do this with asynchronous connections but not synchronous. NSString *URLpath = @"https://mydomain.com/"; NSURL *myURL = [[NSURL alloc] initWithString:URLpath]; N...

Change text to dots in text field with CSS/Javascript

Hey all Is there a way to "mask" the input of a text field to act like a password field (to show dots instead of text) without making the text box of type password? We prefer CSS than javscript... any ideas? ...

Hashing function with partially-reversable part

Hello again. Is there any known hashing algorithm, which for similar input returns similar output? I need it for creating 'tickets' without checking them against DB. My idea is that I create token carrying (userID and timestamp) (not reversable), and pass this token along with userID, and be able to check, if the token has given UserID,...

Sign in with Twitter and Security for a Zend Framework App

Hi, I'm trying to replicate the functionality i've seen on a couple of sites: http://todaslistas.heroku.com http://endor.se The idea is you sign up and log in with Twitter using Oauth. Once you have authed the app at twitter you then return to their site and they keep you logged in. In the case of each one they obviously base this o...

Suggest me the some good tutorial/links or ebook to learn about Computer networking security

Hello i am a beginner in the field of computer network security but i want to learn it more, so i can enhance my knowledge in this filed. So please suggest me some good tutorials or ebooks from where i can learn it from starting to advance level. Thanks in advance ...

How does Blackberry "blackjacking" work from a developers perspective?

Blackjacking is a technique used to connect internally to a corporate network using a typical BES device. It was announced at DefCon a few years back and is hardly new. How does this work, and what are the ways to reduce risk from this exploit? ...

Force File Download prompt in IE for .NET executable?

We have a .NET executable that we are hosting on a web server. The domain for the web server is set as a "Trusted Site" on the user's IE. When the user left clicks the link for the executable, it blows up with the error: "Microsoft IE Execute shell has encountered a problem and needs to close". From what I have read, it is because IE ...

Is there any way to prevent AJAX pages from being viewed alone in a browser?

For example, when I want to update a part of my page with AJAX I would normally make the appropriate call to getPost.php which would return the markup to be inserted into my page. Is there any way to prevent a user from accessing this page directly (eg: example.com/getPost.php with the appropriate GET or POST arguments) and getting only ...

Facebook Connect vs.Twitter OAuth - Security

I'm thinking about creating a web app where users may login via Facebook Connect or Twitter OAuth. I'm wondering how secure these logins are? Are there any security issues I should be concerned about? Thanks in advance for your advice and suggestions. ...

Two almost identical WIX projects - one works fine, the other fails with security issue.

Hello, I have WIX installers for two windows services. Both are installed using the same credentials, but one works while the other fails with the error "Service "PCP Event Processor-3.9.9.0-wix' (MyServiceExeName) could not be installed. Verify that you have sufficient privileges to install system services.". I use a common wxi file f...

restricting javascript widgets to certain domains

I need to create a webservice providing javascript widgets and ajax calls, which only run on certain domains. After doing a lot of research, I only came up with a combination of HTTP-Referer and API Keys, which is pretty easy to break with tools like RefControl, or am I missing something? Are there more secure solutions for this problem?...

Django - auth user with the email domain and no password

I have a request to alter a standard Django login of email and password to allow any user login without a password, but only if they are on a certain domain ... e.g. [email protected] ... where the user is allowed in due to them being on the correct domain. Any suggestions? Thanks ...

C#.NET: Acquire administrator rights?

Is it possible in a C#.NET application to request administrative rights on a Windows 7 PC? I want to be able to deploy the application via Click Once and have users use it to perform administrative tasks (in this case it is writing registry entries for the main application). ...

What is the best way to store a secure information for further usage?

My desktop application asks a user for proxy-server credentials to use it later. But what is the best way to store this secure information for further usage? ...