security

Understanding CAS in the .NET framework

Hi, If I provide Evidence to the .net framework on which code group my assembly belongs to, couldn't I provide false evidence stating that I belong in the Trusted Zone code group? I know what security policies are, permission sets but I don't understand how the framework checks the Evidence and then based on that evidence, determines t...

SQL Server - Storing Sensitive Data

What is a secure way of storing an a username and password (not asp.net membership details) within a database table that needs to be pulled out and decrypted to use for passing to a webservice. Each way I think about the problem I find security holes as the username and password need to be in plain text before being passed to the webse...

AccessController.doPrivileged

I am trying to figure out what some legacy code is doing. What exactly is this line doing, and why would I need it this way? String lineSeparator = (String) java.security.AccessController.doPrivileged( new sun.security.action.GetPropertyAction("line.separator")); I found it in the logger implementation of the web/ejb applicatio...

Is GlassFish Admin console (port 4848) secure?

With understanding of secure Internet connections limited to SSL, I'm doubtful about the security of GlassFish Admin console. Normal secure HTTP connections use http**s**://domain/ URLs but in GlassFish http://domain:4848/ is used to login to Admin console. Is there some kind of encryption going on between the browser and the server when...

Secure Web Services: REST over HTTPS vs SOAP + WS-Security. Which is better?

I'm not a security expert by any means, but I favor creating REST-style web services. In creating a new service which needs to have the data it transmits secure. We've entered a debate over which approach is more secure - REST with HTTPS or a SOAP WS with WS-Security. I am under the impression we could use HTTPS for all the web serv...

How do I prevent a user from seeing the entire team project list in Team Explorer?

I have a user who has access to one project on the team foundation server at my office. When they view source control, they only see the source for that single project (which is correct). The problem I have is that when they go to add a project to their team explorer, they get the entire project list from the server. Is there a way to...

Is there any way to bypass SSP (StackSmashing Protection)/Propolice ?

After some research i haven't found any paper describing method to do this (no even an unreliable one). It seems that SSP (StackSmashing Protection)/Propolice ...

Salts and Passwords - prefix or postfix

This is a question about salting phrases that need to be hashed. I was wondering if it more secure to prefix the salt to a phrase or postfix it? salt + phrase or phrase + salt My question comes from this comment on this post on MD5s. I am not sure I understand the reasoning behind the author's comment. ...

Best way to soft brute-force your own GPG/PGP passphrase?

I created a nice long passphrase, used it a few times, then forgot it ;) The twist is, I know the general theme and probably almost all of the characters. The perfectionist in me doesn't want to revoke the key or anything like that (and I think I need the passphrase to revoke it anyway, right?). I feel I should be able to have a good go ...

how to securely delete files in java

How do I securely delete files in java? I tried the code at javafaq.nu, but the problem is you can't actually delete the file on windows once it has been mapped due to this bug. Then I tried just using sysinternals sdelete on windows, but you have to click a usage agreement the first time you use it which I want to avoid. ...

Dead-simple web authentication for a single user

I wrote a small internal web app using (a subset of) pylons. As it turns out, I now need to allow a user to access it from the web. This is not an application that was written to be web facing, and it has a bunch of gaping security holes. What is the simplest way I can make sure this site is securely available to that user, but no one e...

SQL Server 2008 - Login failed. The login is from an untrusted domain and cannot be used with Windows authentication.

I've just installed SQL Server 2008 Developer edition and I'm trying to connect using SQLCMD.exe, but I get the following error: H:\>sqlcmd.exe -S ".\SQL2008" Msg 18452, Level 14, State 1, Server DEVBOX\SQL2008, Line 1 Login failed. The login is from an untrusted domain and cannot be used with Windows authentication. Has anyone seen...

Does this session/token authentication system make sense for my web api?

Today I implemented a session/token authentication system for my web api (http get/post rpc style), following this plan: legend: action (param1, param2) : returnvalue1, returnvalue2 login (username, password) : sessionkey, token requestA (sessionkey, token, paramA) : token requestB (sessionkey, token, paramB) : token logout (sessionke...

Convenient applications for Browser/POST and Browser/Artifact SAML profiles

I'm proposing the use of SAML 1.1 as technology to prove Web SSO in a customer environment, and they asked me something interesting: Which scenario Browser/POST profile is appropriate, and which scenarios Browser/Artifact profile of SAML is appropriate? In fact, SAML 1.1 Specifications don´t talk about the best neither most appropriate...

JQuery Ajax Voting

I am using this JQuery Ajax Voting system guide as a rough reference but I am a little troubled at the security of this. Right now this guide basically stores the ID of something and the vote statistics for it. I'd like to go off a similar idea but I need to include the userID as well so a user can only vote once. This is stored in a PH...

Examples of SQL Injections through addslashes()?

In PHP, I know that mysql_real_escape in much safer than using addslashes. However, I could not find an example of a situation where addslashes would let an SQL Injection happen. Can anyone give some examples? Thanks! ...

A Java Plugin Framework that supports JARs

More specifically, is there any Java plugin frameworks have all of the below features: Support for multiple JAR files JARs can be signed and/or sealed Can perform a license check for each JAR prior to instantiation Can load multiple JARs using multiple threads ...

WSS 3.0 : Retrieve user permission rights

Hi all, may I know how can i retrieve user's permission rights from its userid and group name. Help urgently needed. Thanks in advance! ...

is htmlspecialchars() in PHP or h() in Ruby on Rails good enough for defending all cases of XSS (Cross-site scripting) attacks?

Is htmlspcialchars($user_data) in PHP or h(user_data) in Ruby on Rails good enough for defending all cases of XSS (Cross-site scripting) attacks? What about encoding used or any other possible considerations? ...

Is there a "safe" subset of Python for use as an embedded scripting language?

In the many Python applications I've created, I often create simple modules containing nothing but constants to be used as config files. Additionally, because the config file is actually a Python code file, I can add simple logic for changing variables depending on a debug level, etc. While this works great for internal applications, I...