security

Deploying CAS policies in Sharepoint using the solution framework

Hi, I'm deploying my web parts using the sharepoint solution mechanism. Untul now, everything worked fine, but when i added CAS policies to the manifest.xml file, the deployment doesn't work as it should. When deploying the solution with the CAS policies, there are no errors, but the policy file isn't created, the dll isn't copied, an...

Hacking and exploiting - How do you deal with any security holes you find?

Today online security is a very important factor. Many businesses are completely based online, and there is tons of sensitive data available to check out only by using your web browser. Seeking knowledge to secure my own applications Ive found that Im often testing others applications for exploits and security holes, maybe just for cur...

heap overflow attacks

How heap overflow attacks are done? In case of stackoverflow attacks, the attacker replaces the function return address with his address. How this is done in heap overflow attacks? Also, is it possible to run code from heap? ...

how Stop strange users from trying to connect to my SQL server db?

I have an asp.net website on a server and the db MS SQL 2005 on another server, the last few days the website show me this error message: "A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that S...

Java embedded applet page security, how to properly meet its recquirements?

If I have an applet embedded in a webpage and I want it to connect to server side software (also written in Java) how can I do this properly on a windows machine running local host? Would I have to run the java application from within the localhost directory and access the applet html from a browser (i.e. localhost/applet.html)? From wh...

Where to log from a .net web app? - Can't use %APPDATA% because of privileges

I need a path I could specify in log4net file appender so that the log files would go there. However, aspnet or whatever account does not have write privileges to %APPDATA% folder. Is there any place I can write to without asking customer admins to give extra access privileges? Path.GetTempFile() is probably not a good idea. I need some...

How to get the lists of file and directory names of a site?

How exactly do you do this? The reason is my CMS has been breached, well, mainly because the username and password is fairly common (my bad). But I've always thought that it is save, since the directory name is pretty un-common and hard to guess (not the usual /cms/ or /admin/). Brute-forcing from a script? or maybe some Google tricks? ...

Unsafe use of user-supplied GString:s in Groovy/Grails

The GString concept in Groovy is pretty powerful (see http://groovy.codehaus.org/Strings+and+GString). GStrings let you do things like: world = "World" println "Hello ${world}" # Output: Hello World println "1+2 = ${1+2}" # Output: 1+2 = 3 println "${System.exit(-1)}" # Program terminated I'm trying to figure out if using Groovy GStr...

How can I programatically limit access to a Webservice?

I am writing a traditional ASMX webservice using C# with .Net 2.0 for deployment on IIS. The webservice will be deployed in a shared hosting environment where each client has their own copy of the application sitting in a separate virtual directory (I know, I know - it's a legacy app). There will be an individual copy of the Webservice s...

What's the point of JAAS

What's the point of JAAS if I have to write my own {whatever}LoginModule and everything else? ...

Is more than 100 active connection to SQL server db not normal in an ASP.NET website?

While tracing the active connection on my db i found that some times the connections exceeds 100, is that normal? and after few minutes it return back to 20 or 25 active connection more details about my problem Traffic on the site is around 200 visitor per day. Why i am asking? because the default MaxPool in the asp.net connection strin...

What are the minimum permissions for connectionUsername when using ActiveDirectoryMembershipProvider

I am writing an ASP.NET application using ActiveDirectoryMembershipProvider, similar to the scenario outlined here: http://channel9.msdn.com/wiki/securitywiki/aspnet2formsauthtoadrolesinadintranet/ As part of this setup, I configured ASP.NET Membership as follows: <membership defaultProvider="MyADMembershipProvider"> <providers> ...

Does disabling anonymous access in IIS create a security risk?

If I uncheck the "Enable anonymous access" checkbox in IIS, so as to password protect a site, i.e. by restricting read access to designated Windows accounts, does the resulting password dialogue which is then presented to all anonymous http requests, represent a security risk in that it (seemingly) offers all and sundry an unlimited numb...

how do i impersonate a windows authenticated web user over a .net remoting call?

I have an web application that uses windows integrated security. I also have a windows service that runs as local system. The web application uses .NET remoting to execute a method on the serivce through tcpip channel. Is there a way, on .NET 2.0, to pass the windows identity to the service? ...

Codeigniter security - mysql database

I'm in the final stages of implementing a codeigniter site which requires a really simple login system: one user and one password, to protect the admin area. I think I will be using one of the many CI authentication libraries, which should allow me to ensure that people can't read from the database without being logged in as admin(I hop...

What are good programming practices to prevent malware in standalone applications?

Does anyone have any thoughts on how to prevent malware attacks on standalone applications. Let's say this is a program on a Windows machine connected to the internet, this is the most common scenario. I'm also wondering what type of attacks are possible. I believe .NET will do some type of static check on the code before it runs it, ...

internal code review tool for web developers? Both for security and QC.

I feel fortunate that I have been given an opportunity to improve code practices in my office by starting to implement some internal code reviews which could start out as some simple checklist. I need suggestions on tools and general tips. I went to school for SoftE and understand the process of classic software development. I then wo...

SecurityException when using Registry.LocalMachine.OpenSubKey

I'm developing an application that needs to write to the registry. It works fine on XP, but when I run it on Vista, from Visual Studio, I get a security exception in: Registry.LocalMachine.OpenSubKey("SOFTWARE", true); I'm trying to write a new key into that branch of the registry. What's the right way to do this, firstly so that I ca...

Is it more secure to store using a database or a file?

This question is from a decomposition of http://stackoverflow.com/questions/678471/what-are-good-programming-practices-to-prevent-malware-in-standalone-applications The question has to do with malware dynamically getting into a program by infecting data files which the program reads/writes. Is it safer to require data be stored in a...

Limiting user login attempts in PHP

Hi there, I'm seeing web apps implementing limitations for user login attempts. Is it a security necessity and, if so, why? For example: you had three failed login attempts, let's try again in 10 minutes!! thanks :) ...