security

Ruby on Rails source code security / obfuscation

I'm just getting started with Ruby on Rails development and I have a question concerning source code "privacy". From what I know so far (i have not done a deployment yet, only used RoR in a local development environment), that when a RoR application is deployed, all the source code is "visible" on the server? How can I protect my code;...

Difference between SSL & TLS

According to wikipedia: http://en.wikipedia.org/wiki/Transport_Layer_Security Seems like TLS is a replacement to SSL, but most websites are still using SSL? ...

need help understanding nonce

i have a question about nonce. ok i undertstand its to prevent replay attacks but what happens if the hacker somehow got the nonce and uses it before the user does? ...

Should password reset pages automatically authenticate users?

Many lost password workflows usually result in a page which is reached by a temporary link emailed to the user. This link then takes them to a page that asks for a new password. Upon entering the new password should a user be forced to logon manually, or should the password reset page authenticate the user automatically which would redu...

Zend Framework Admin Module structure

I am creating a large web application with Zend Framework 1.10. A am new in Zend Framework(1 month experiance). Can you explain me how to create a admin module in the best way?(with own authentication). How to make this with good security? Thanks a lot. ...

Missing directive or assembly reference using WMI ManagementObjectSearcher?

I have found this link: http://stackoverflow.com/questions/1331887/detect-antivirus-on-windows-using-c However when I try this code in visual c# express edition 2008 it says : Error 1 The type or namespace name 'ManagementObjectSearcher' could not be found (are you missing a using directive or an assembly reference?) C:\Users\Andy\D...

Security considerations - office website/portal on GAE

If one needs to create an office website (that serves as a platform for clients/customers/employees) to login and access shared data, what are the security considerations. to give you some more detail, The office portal has been developed in django/python and hosted through GAE. Essentially, the end point comes with a login/password to...

User-Contributed Code Security

I've seen some websites that can run code from the browser, and the code is evaluated on the server. What is the security best-practice for applications that run user-contributed code? Besides of accessing and changing the server's sensitive information. (for example, using a Python with a stripped-down version of the standard library) ...

storing passwords in class variables in python

I'm working on a python script that stores ssh passwords only during the current session. What I'm doing is declaring a class variable credentials = {}. When the script needs access to a specific server, it checks in credentials to see if credentials['server'] exists. If it does, it uses the password there, if it doesn't, it prompts the ...

Should I remove a cache entry which I didn't put there?

Precondition: There's a web application that leverages ASP.NET security model. There's also an Active Directory (AD) integration component. It provides AD users and roles as if those are application's own users and roles. The relations like "is in role" between AD user and AD role are stored in AD domain, of course, but are cached by the...

C# code for adaptive authentication

Is there any C# code/classes/open-source/tools that is recommended for adaptive authentication? Some functions of our app utilize a Captcha to avoid spamming or inappropriate behavior, which unfortunately also slows down our genuine users. I would like display the Captcha only if certain parameters look 'shady', such as unusual IP addre...

For business, which OS is more secure: Windows 7 or OSX 10.6?

I've seen the outcomes of certain hacking competitions yield varied results and the argument over which OS is currently more secure has never seemed to go beyond an anecdotal level. I currently split my development (PHP, MySQL web applications which handle sensitive transcript information, among others) 50% between OSX Snow Leopard and ...

What's the difference between Message Digest, Message Authentication Code, and HMAC?

My understanding of a message digest is that it's an encrypted hash of some data sent along with the encrypted data so you may verify that the data has not been tampered with. What is the difference then between this and message authentication codes (MAC) and hash MACs (HMAC)? ...

Sanitize HTML data.

I'm fetching data from different RSS / ATOM feeds and sometimes the HTML data I receive contains HTML tags but they dont have close tags or some other issues and it screws up the page layout / styling. Somethings there is class name / id clash. Is there any way to sanitize it? If anybody can point me to some reliable Javascript / Java ...

Html Browser: best practice to pass user SID to server-side

Legacy application (win32 clients + centralized db) has 40+ installations in a company & lacks the ability to be extended by plugins. Legacy authentication system relies on computer name, user name & user SID (there is no single DOMAIN server in a company, there are dozens of workgroups). I'm going to build stand-alone intranet site th...

sharing authentication across multiple plugins in Grails

I have modularized a large Grails project into several plugins and want to share access to the spring security plugin to manage authentication across my project - is there an easy way to do this? I'm not sure how to share access to core project plugins from sub plugins ...

Securely viewing files over HTTPS on Android

Hello everyone, I'm trying to view files found over HTTPS reasonably securely on Android ("reasonably" here means "not on the SD card"). I can't seem to find anything in the documentation that seems to answer this. My current app prototype downloads the file from the server and puts it somewhere (currently, the SD card), and then laun...

Encrypt outgoing data? (any mobile platform)

Would it be possible for me to build an application that enables people to encrypt call coming to me with my public key and then for me to decrypt the call data at my end using my own private key. This way I basically have a more secure communication channel which I am assuming because RSA is hard to crack would be difficult to monitor. ...

How to secure CouchDB in the Admin Party mode

Hi! I am using BigCouch which is a very good implementation of scalable CouchDB cluster. But it has a small problem - it doesn't support CouchDB 1.0-style Security features very well. So it must stay in the Admin Party mode. What are the options to secure a CouchDB instance in the Admin Party mode. Each user should have their own datab...

XSRF protection GET .net mvc

I have a site which will show sensitive information. I am using Anti Forgery Tokens etc to protect against XSRF in POSTS. However I am worried about someone being able to view sensitive info from a GET. What is the recommended practice for protecting read only data sent via a GET in .Net MVC 2? ...