Trying to understand security management in ASP.NET
Hi,I've been requested to develop a website, which will be most probably used only in a intranet...after a lot of search I've final come up with setting the connection correctly to a local SQL Server (no way to the remote), but I don't understand now the fllwoing:-- I cannot add any user...ok, that's fine because it depends on the Windows Authentication...-- On the other hand, I've got no user (not even mine!) listed in the user list...so I cannot add anything to any role I'm trying to define..Why I cann't see my user, the one I use to log in to this machine, wher...
Software [In]Security: Twitter SecurityMaking Your Thoughts as Small and Incomplete as Possible
Just for the record, I don't use Twitter. But if this column were a Twitter
entry, it might read something like:
http://www.informit.com/articles/article.aspx?p=1350268&cid=nl_DR_DAILY_T
--
"If U know neither the enemy nor yourself,U will succumb in every battle"
...
Open software, secure software Monday, 1 March 2004, 1:51 PM CET
Fifty-plus years ago Grace Hopper used her experiences with programming the
UNIVAC with FLOW-MATIC (an open-source project) to write her first compiler
paper and the modern era of computing programming began. Some would also say
that things haven't improved much since her day.
Indeed, the National Institute of Standards and Technology (NIST) estimated
that in 2001 $59.5 billion annually, about 0.6 percent of the gross domestic
product was being lost because of software bugs. The Sustainable Computing
Consortium (SCC), an academic, gove...
Newbie Needs Help: Trying to understand wireless network securityI have been reading posts and websites and I feel like I'm getting bits and
pieces of the story. I'm trying to understand security over a wireless
network. I have read a few people saying that they are confident that they
have a secure wireless network. I was wondering if there is a good resource
for beginners who would like to set up a secure network. I understand up to
using WPA, that disabling SSID doesn't really make a difference and that's
about it.
I want to also know if one sets up a home network system, will the
transmission between the desktop and ...
Is security software becoming a security risk?"Due to bugs in antivirus software, the security suite becomes a risk
by itself, and adding multiple pieces of security software makes the
problem worse, not better "...
<http://www.infoworld.com/article/07/11/21/Is-security-software-becoming-a-security-risk_1.html>
or
http://preview.tinyurl.com/2nkk9r
--
js
http://justheadlines.exofire.net
john s. smith wrote:
> "Due to bugs in antivirus software, the security suite becomes a risk
> by itself, and adding multiple pieces of security software makes the
> problem worse, not better "...
>
...
Security software to secure USB flash drives?Hello,
does anyone know of some software (preferably freeware that would
password protect access to a USB flash drive?)
Currentlty the drive I have is open wide as soon as it is plugged in.
Any help would be appreciated.
Paul
--
Calculating in binary code is as easy as 01,10,11.
Paul Jackson wrote:
> Hello,
>
> does anyone know of some software (preferably freeware that would
> password protect access to a USB flash drive?)
>
> Currentlty the drive I have is open wide as soon as it is plugged in.
>
> Any help would be appreciated.
>...
F-Secure Readies Security Software For LinuxF-Secure Corp. on Tuesday unveiled security software for open-source Samba
file servers and Linux, addressing a need that's growing within the
enterprise market.
The Finnish company announced the availability of antivirus software for
Samba that automatically detects and removes viruses from files stored on
the server. The new product is meant to protect all Samba-attached computers
from malicious code that could enter the network from a Windows or Linux
machine.
Next month, F-Secure plans to ship a Linux version of F-Secure Policy
Manager, which will extend centrally managed ...
Book Review: Software SecurityI'm jealous. No seriously. If Cigital is actually ran as depicted in the
book Software Security - Building Security In, I have to give kudos to Gary
and the gang for making an impressive environment for software security.
I'm a fan of Gary's writing. If you are a regular reader, you know I loved
both his books on Building Secure Software and Exploiting Software. This
latest book is, in my mind at least, a balancing act between the two
previous books on the topic. Gary calls it the "Ying and Yang". Which makes
total sense, since the book cover is of exactly that, ...
What do security guards and computer security software have in common???http://www.securitynewsportal.com/article.php?sid=920&mode=thread&order=0
--
Regard: Joh@nnes�
1216771 Ont.Inc.
"Nothing is more damaging to a new truth than an old error"
...
trying and tryingName: otto de koningh
Email: ottodotdedotkoninghatskynetdotbe
Product: Firefox Release Candidate
Summary: trying and trying
Comments:
what a weird robot !! please refrain from using these horrendous figures
i like the motorcycle though shown on the add-ons page
i am having trouble because there is an unknown dump on firefox - never
encountered this ! your browser is otherwise top of the bill !!
from Firefox Setup 1.5.0.3 onwards in May 2006 Firefox has become a true
companion ! now with Firefox Setup 3.0 RC1 i have error reports ! how come ?
Browser Details: Mozilla/5.0 (...
How secure is secure?Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
mail?
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...
when is secure, secure?Lo everyone,
I wrote a custom authentication handler for PureFTPD, using a combination of
authentication methods, for about 4 different types of users.
So far, from testing it, it does look to work properly, and does it's job
pretty well (and fast). I use #!/usr/bin/perl -W as well as use Strict, and
use warnings, and the code returns no errors or warnings when run.
I am right to presume that this basically only really tells me the my syntax
and structure of the application is right? What's a good way to see whether
it is actually SECURE... There is a couple of lines of...
Try this softwareName: Bambang Rudiyanto
Email: roediekbrdatyahoodotcom
Product: Firefox
Summary: Try this software
Comments:
I'm very thank you for try this Software Browser and i think The Mozila
Fire Fox is The Best Browser Software,Good Luck
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.6) Gecko/2009011913 Firefox/3.0.6
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
see it.
...
security softwareName: Roland Hanke
Email: roland_h5atmywaydotcom
Product: Firefox
Summary: security software
Comments:
Have you ever thought about doing security software? I would have more
confidence in it than most of what is out there.
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 (.NET CLR 3.5.30729)
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
see it.
...