security

Is Rails shared-nothing or can separate requests access the same runtime variables?

PHP runs in a shared-nothing environment, which in this context means that every web request is run in a clean environment. You can not access another request's data except through a separate persistence layer (filesystem, database, etc.). What about Ruby on Rails? I just read a blog post stating that separate requests might access ...

Transferring cryptographic initialization vectors

I want to know the best way of transferring a cryptographic initialization vector (IV) from the place where my data is encrypted to the place where my data is decrypted. In other words, the IV should be randomly generated every time you encrypt a message (right?), so there needs to be some way of finding the IV when you decrypt. I have...

How do I limit SSAS hierarchy levels to users?

I am relatively new to ssas and am having trouble with something. The scenario: A cube with a company hierarchy (region, sub-region, country, company) Dimension security is applied by filtering the company dimension by linking username to a list of allowable companies. Enable Visual Total is switched ON so that you can only see totals...

Get all operations from AzMan

Hi, I'm trying to fetch a list of operations related to user. I'm using AzMan to store the application authorization rules. How can i get list of operations per user using EntLib 4.1 SecurityApplicationBlocks or any other way? [C#] Thanks. ...

WCF - Windows authentication - Security settings require Anonymous...

Hi, I am struggling hard with getting WCF service running on IIS on our server. After deployment I end up with an error message: Security settings for this service require 'Anonymous' Authentication but it is not enabled for the IIS application that hosts this service. I want to use Windows authentication and thus I have Anonymous ac...

How much time does a developer spend reviewing logs?

PCI/DSS has a requirement indicating that an application's log should be reviewed AT LEAST daily for security events. Most network/infrastructure professionals can review network device logs but won't be familiar with actual applications. The same can be said for most security professionals. So, are developers really stepping up to this...

Security considerations when creating an email form on the web

I know I have to consider about mail header injection, and are there more thing that I need to know before I make form mail thing? I want mail, and I feel that I have to set up form mail thing in my page, but I heard that mail thing is dangerous if I do not consider all security things. ...

What is the difference between Owner and User (WindowsIdentity)?

When getting the username and/or SID of the current user, what is the preferred method? Is it using: WindowsIdentity.GetCurrent().Owner Or: WindowsIdentity.GetCurrent().User What is the difference between the two? This would be a great question for SuperUser.com, but alas, it's not live yet. Thanks! ...

"The test form is only available for requests from the local machine."

I created a Web Service in .Net and so the address of the service file has a nifty auto generated explanation about how it works. When I run the page from the machine it's hosted on it even has a form that I can use to submit test values to the service. However on remote machines it hides the form and gives the message as seen above. Is...

Is it possible to change default cloaking in COM security?

I have a number of COM services in my system and I need to change default cloaking beahvior. In particular, I want to use dynamic cloaking. Since the product is a "closed" one, meaning that no other program/service will be installed on the machine, changing system defaults is one of the options. I am not willing to go into that directio...

how to remove NTFS security from a folder ?

how to remove NTFS security from a folder ? ...

Php security question

Just had a thought post.php if (isset($_SESSION['id'])) { if (isset($_POST['comment'])) { insert() } <form method="post" action="post.php"> <textarea name="comment"></textarea> <input type="submit" class="btn" value="Submit"> </form> } $_SESSION['id'] needs to be set to access post.php. Is that safe enough? Just thinking maybe...

Public key or Diffie-Hellman Key Exchange Algorithm

Consider and client server scenario and you got two options: You can include Server's Public Key in Client and perform the exchange. You can use Diffie Hellman KeyExchange Algorithm to handshake and then exchange the key. Which one is more secure way? also if public key will come from store say from Client CA store? would it be more ...

Best way to "hold" access to users other sites

I am playing with an idea that would allow people to add tickets to unfuddle, post a message to twitter/facebook etc. all from the one site. To do this I need their username/password for these other sites but I don't really want to know that information. Is there another way of achieving the same thing without having to holding this ki...

How to programmatically figure out if a user account is a member of a particular group in Windows?

Given a group name and a user account, I would like to know if the supplied user belongs to a particular group. The user can be a local user or a domain user and the group could be a local group or a domain group and the group could also be nested inside other groups. In short I am looking for a function like bool IsUserMemberOf(User, Gr...

Which common document types can have executable code in them?

I'm working out the reasonability of a request to keep all documents with executable code of a document management system. This is above and beyond the existing protections restricting the file extensions to a short list and running the file by norton antivirus before we save it. So far .doc(x), .xls(x), and .htm are all common document...

Install client certificate for IIS App Pool account

Scenario: A client calls WebService A on the LAN. WebService A is running under an App Pool with Identity "Network Service". WebService A does some work, prepares to call WebService B. WebService B requires a client cert (*.cer) and SSL. WebService A is on a dedicated Windows 2003 server. Everything works in the Dev environment as it s...

Using ASP.NET login controls wih deny="?"

I have a website built with ASP.NET (3.5) and want add some level of security into it. I am using the login controls to help with this. I have one issue though. I have within my web.config the following. <authorization> <deny users="?"/> </authorization> This work fine when a user has not logged in before (ie. if they goto ...

encrypting web.config failed error

hi guys, I know that ppl have already asked questions regarding encrypting web.config. im also trying to encrypt my test config file, but im getting this error. aspnet_regiis -pef "connectionStrings" "C:\encryptedWeb.config" Encrypting configuration section... The configuration for physical path 'C:\EncryptedWeb.config' cannot be opene...

Does SharePoint 2007 use FrontPage Extensions?

An automated security scan was performed on my WSS 3.0 site and it came up with some warnings based on the apparent presence of FrontPage Extensions. Namely it found files like /_vti_pvt/service.cnf, /_vti_pvt/services.cnf, and /_vti_bin/_vti_aut/author.dll by appending those locations to the site's main URL over the web. These are appar...