security

Securing .Net Winforms Application with hardlock dongle or a digital certificate

I'm developing a C# Winforms application for a customer. The customer wants the program secured by a hardlock, so only people having the appropriate hardlock can access the program. I know there are a ton of ways to secure accessing to a Winforms application, but he inststs on using a hardlock. I have never experienced implementing a ...

Password hashing - how to upgrade?

There's plenty of discussion on the best algorithm - but what if you're already in production? How do you upgrade without having to reset on the user? EDIT/DISCLAIMER: Although I originally wanted a "quick fix" solution and chose orip's response, I must concede that if security in your application is important enough to be even bothe...

Securing asp.net web services to be consumed from flash

Hi, my team is building a game in flash to be embeded in a asp.net application. When the game is over the player have the chance to type his name to save his score. This is done using web services called from flash. The webservice receives the name and score. Since the webservice is publicly available how can I make it only callable fr...

How can I secure memcached/beanstalkd in a hostile cloud environment?

Here's how my servers (in Amazon EC2) would look like: Server 1 Server 2 Server 3 __________________________ _____________________ _______________ | Cloud Monitor Daemon | | Memcached daemon | | beanstalkd | | | | Memcached daemon | ____...

Security of Exclusive-OR (XOR) encryption

XOR encryption is known to be quite weak. But how weak is it if I have a key that is made up of multiple keys of different (ideally prime) lengths which are combined to make a longer key. eg I have a text keys of length 5, 9 and 11. If I just apply the first key using XOR encryption then it should be easy to break as the encryption byte ...

Why do sites offer an MD5 hash of a file?

Why do sites offer an MD5 hash of a file? How does that help you verify the integrity/source of the file? Wouldn't paying attention to your URL be enough security? ...

Secure Authenticode key on a build server

I'm trying to figure out how best to set up Authenticode signing at my workplace. The security implications are stressing me out. My initial thought is that the person who controls the key should install it to the build server and secure it so that only the build account can access it. This seems reasonably secure, but it actually isn...

Is there a reason why certain sites don't allow periods in passwords?

I was just wondering why certain website don't allow anything other than letter and numbers in the password field. Is there a security reason or perhaps it's just a limitation of the DB they are using? Thanks for the info. Edit: It appears that Oracle's database doesn't acknowledge uppercase and lowercase? Is this true? I was told that...

SWT and Mark of the Web

Hi, I have a question that is somewhat similar to this one (which was never answered): http://stackoverflow.com/questions/989328/gwt-mark-of-the-web-motw I have an Online Help package built using javascript/HTML. Other teams in my company make use of this package in their apps, swapping in the content they need. One team in particular...

Strip off XMLDSIG elements from incoming XML POST to WCF RESTful Service

Folks, I am building a RESTful service that is secured by providing an XMLDSIG XML signature at the bottom of the XML document. When I send this document to the server, the WCF service is doing the XML de-serialization method on the HTTP payload to give me a C# class. Unfortunately for this de-serialization to occur properly, the C# cl...

Preventing exploits in Drupal

Is there a good resource or list of known fixes for exploits in Drupal (including common modules) that I can use to close up holes in my sites? I'm using 6.19 on all my sites, as well as making sure that any security updates for modules are installed immediately. Is there anything else I can realistically do? (Such as restricting access...

Code Access Security is a joke?

I have just read about this article about Code Access Security. It has such an example in it: using System.Security.Permissions; public class MyFileAccessor { public MyFileAccessor(String path, bool readOnly) { path = MakeFullPath(path); // helper fcn FileIOPermissionAccess desiredAccess = readOnly ? FileIOPermissionA...

How can a Safari extension know if Private Browsing mode is on?

I'm writing a Safari extension and want it to behave differently when the user turns on Private Browsing mode (I want to respect this private mode). I found no mention of this in Apple's docs. I'm aware of the discussion in this thread: Detecting if a browser is using Private Browsing mode which suggests using a (browser-agnostic) js...

OFX -- Second Level Security?

We're working on a site that will make use of the OFX standard to provide access to customer financial data. However, for security we make use of secret question/secret answer, machine tagging, etc. Does the OFX standard provide any mechanisms for security beyond just the simple username/password? I've taken a look at the schema and s...

troubling anonymous Logon events in Windows Security event log

I have a dedicated server hosted on Rackspace Cloud, and this morning as I was casually checking the Security event log, I saw a series of successful Logon events that are troubling. It appears random IPs are successfully "logging in" to my server somehow. How is this possible? I have a very strong Administrator password. Am I overre...

Help with SHA1 or MD5 in PHP

Hi, I have created a form that inserts the entered data into the database. It works perfectly except when I put SHA1('$password') into the INSERT INTO VALUSE tag. If I put only '$password it works fine. Putting SHA1 displays - You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the r...

HTTPS login not saving the JSESSIONID in a cookie

We recently changed our login to use HTTPS, and we are experiencing issues with the login. After the login, the user is redirected to an unencrypted (HTTP) page. When it reaches this page, the site checks if the user is logged in. It creates a new session and it appears that the user is not logged in, and thus our user is redirected to ...

Are Python functions "compile" and "compiler.parse" safe (sandboxed)?

I plan to use those functions in web-environment, so my concern is if those functions can be exploited and used for executing malicious software on the server. Edit: I don't execute the result. I parse the AST tree and/or catch SyntaxError. This is the code in question: try: #compile the code and check for syntax errors compil...

Ensuring user input code does not damage server when executed

I'm working on a web app that can allow the user to input some code, and it will be compiled and executed, and they can see the result. I'm coding the app in PHP and I need a way to ensure that if the user inputs some harmful code (this example is PHP), it can't execute and destroy my server. Example: <?php shell_exec('rm -rf /'); ?> ...

Rails: InvalidAuthenticityToken while token is supplied

I'm trying to use an Java Applet for uploading files to my rails application. However I keep getting the following error and I can't figure out why: Processing CategoriesController#upload_image (for 127.0.0.1 at 2010-10-18 20:32:54) [POST] Parameters: {"partitionIndex"=>"0", "fileId"=>"8278320", "lastModified"=>"2010-09-18T14:31:...