security

Serial number (registration key) algorithm in .NET

There have been a few timely posts about IP security and the like, but none that I can find that specifically address an algorithm. In one of my current projects, we've decided to go the route of an offline registration key system. I imagine most of our eventual user base will be honest, so I don't think we have too much to worry about....

Security of REST authentication schemes

Background: I'm designing the authentication scheme for a REST web service. This doesn't "really" need to be secure (it's more of a personal project) but I want to make it as secure as possible as an exercise/learning experience. I don't want to use SSL since I don't want the hassle and, mostly, the expense of setting it up. These SO q...

How to create a secure credit card gateway using paypal / ruby on rails / active merchant.

I am creating a store using Active Merchant and PayPal sandbox right now. It seems to be working fine, but I don't think it is even remotely secure. I don't really know too much about HTTPS and how to implement secure connections. I am currently passing the credit card and billing information in the session (probably not the smartest i...

IIS7, SQL 2008 and ASP.NET MVC security

I have an ASP.NET MVC application that I'm working on. I've been developing it on Windows Server 2003 with IIS6 and SQL 2008 Express, and everything was working great. I recently decided to try out the Windows 7 beta, so now I'm using IIS7, and have run into a problem with connectivity to my database that I can't seem to figure out. I c...

Is it safe to expose database indices to Silverlight clients?

I have a Silverlight application that communications with an ASP.NET backend through WCF. I have a set of DataContract objects that I defined that (for the most part) match my LINQ to SQL generated types that my ASP.NET backend works with. My WCF code generates instances of my DataContract objects from LINQ to SQL generator types when I ...

Any studies on the security of different CMSs?

I like to post links to Secunia search results to demonstrate (in numbers) how insecure a certain CMS (or blogging software) is. See http://stackoverflow.com/questions/447878/what-are-some-of-drupals-shortcomings#450002 But there was an interesting comment to this answer: Eaton: It's also important to note that Secunia only pub...

How can I prevent users from taking screenshots of my application window?

What are some methods to prevent screenshots from being taken, if any? I've considered setting the "Print Screen" button as a hotkey, which makes the window fuzzy. However, there would be the problem of other 3rd party screenshot tools. How can I prevent their use? Why would I want such a thing? The idea is to create a chat client wh...

How do I make sure a file path is within a given subdirectory?

I want to make sure a file path set via query string does not go outside of the desired subdirectory. Right now, I am checking that: The path does not start with "/", to prevent the user from giving an absolute path. The path does not contain "..", to prevent the user from giving a path that is outside of the desired subdirectory. The...

in the CLR, is a local copy of an exe is created when running the exe from a remote folder ?

in the CLR, is a local copy of an exe is created when running the exe from a remote folder ? if yes, where ? ...

Setting access rights for a directory - receiving exception "No flags can be set"

I am trying to progamrtaiclly allow write access to ASPNET account on a directory. I am using the following code to do this: (Please note that I want the "write access allowed" for ASPNET to be propagated to the child objects as well: static void Main(string[] args) { FileSecurity fileSecurity; ...

Password complexity strategies - any evidence for them?

On more than one occasion I've been asked to implement rules for password selection for software I'm developing. Typical suggestions include things like: Passwords must be at least N characters long; Passwords must include lowercase, uppercase and numbers; No reuse of the last M passwords (or passwords used within P days). And so on....

Subversion: unix permissions on disk for secure apache access

I moved a Subversion repository from a Windows box to a UNIX machine. In both environments I've handled authentication through Apache. On the UNIX box after the move, I could checkout source but received the following error when committing anything: svn: Can't open file '/home/brianly/svn/test/db/txn-current-lock': Permission denied ...

iPhone Security Guidelines

Silly question: Does Apple provide specific guidelines for contacting servers via http vs https? Also, what data is considered to require https (ie password, geopoint, bank data, etc.) Is there a concrete guideline from Apple on this? More specifically, does anyone know exactly how Apple checks/verifies that an application should or shou...

How are buffer overflows used to exploit computers?

How are buffer overflows used to exploit computers? How is one able to execute arbitrary code simply by causing stack or heap overflows? I understand that portions of the programs memory are overwritten that aren't supposed to be, but I don't see how this leads to one executing their own code. Also, must the 3rd party's malicious co...

Uploading data into remote database

What is the most secure and easier way to send approx. 1000 different records into database that is not directly accessible - MySQL database on Web provider's server - using Windows application . Data will be stored into different tables. Edited: The application will be distributed to users who have no idea what is database or putty or...

Where do I go to find out about security issues in some detail?

Following on from this question... I have long been of the opinion that the time and resources it would take to write a piece of malicious software, of whatever type, could better be spent on other things. However, as a developer I am constantly worried about the possible security flaws in systems I work on. Of course I know about vali...

Security in programmming?

What is the best book to read about security issues that should be kept in mind while programming? What should a c++ programmer know about security? Is it worth buying any one of the following book If so which one should I get. Secure Coding In C & C++ Secure Programming Cookbook for C and C++ Writing Secure code ...

ASP.NET - Trust Level = Full?

I recently joined a firm and when analyzing their environment I noticed that the SharePoint web.config had the trust level set to Full. I know this is an absolutely terrible practice and was hoping the stackoverflow community could help me outline the flaws in this decision. Oh, it appears this decision was made to allow the develope...

J2EE Authentication Error Handling

We are currently trying to implement a web application which is using the J2EE authentication mechanism with a FORM-based login, inside the Websphere 6.1 web container. If the authentication is successful, we have everything working; the LDAP membership groups are being retrieved, the group to role mapping is being performed, and the ro...

How can I use Performance Counter in w2k8

Hello Problem: I can add+use performance counters in w2k8 with normal user privileges. If I try to create or access a Process performance counter, i get a message that the counter does not exist. Same thing can be tried out in a powershell, a message appears that the counter does not exist. If I do the same thing as Administrator ac...