GeekArticles
Concepts
Security


Sponsored Links
325 Articles. Next Page
What's New in Web Services Enhancements (WSE) 3.0 By msdn.microsoft.com
Describes the driving goals behind the latest WSE 3.0 release focusing on the major feature highlights and how these can be used develop distributed applications based upon these Web service specifications....
WS-I Basic Security Profile 1.0 Sample Application: Preview release for the .NET Framework version 1.1 By msdn.microsoft.com
The Microsoft WS-I Basic Security Profile 1.0 Sample Application is a preview release of the work being done by the WS-I Sample Application Working Group members to demonstrate interoperability of secure Web services....
Windows Mobile 5.0 Application Security By msdn.microsoft.com
Learn how to develop an application for a Windows Mobile based device including how to determine what the security configuration of your device is and how to sign your application with the appropriate certificate....
Security Briefs: Security Enhancements in the .NET Framework 2.0 By msdn.microsoft.com
Security Enhancements in the .NET Framework 2.0...
Code Secure: Browsing the Web and Reading E-mail Safely as an Administrator By msdn.microsoft.com
This Article discusses how you can run as an administrator and access Internet data safely by dropping unnecessary administrative privileges when using any tool to access the Internet....
Managing Security Context Tokens in a Web Farm By msdn.microsoft.com
This Article explains the techniques for extending WSE 2.0 to manage the secure context token state across a farm hosting multiple instances of a service....
SQL Server for Developers: Writing Secure Transact-SQL By msdn.microsoft.com
This Article reviews the best practices to make your T-SQL code more bulletproof....
Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users By msdn.microsoft.com
This Article Howard discusses minimizing security risks to code through techniques such as identifying and reducing attack surface reducing the volume of...
Routing Secured SOAP Messages Through Multiple SOAP Intermediaries using WSE 2.0 By msdn.microsoft.com
Route secure SOAP messages through multiple HTTP SOAP intermediaries using Next-Hop mechanisms and use the ExtendedSecurity function to form a secured chain of SOAP nodes through which messages must pass....
The Trustworthy Computing Security Development Lifecycle By msdn.microsoft.com
To withstand malicious attack to its software Microsoft uses threat models during software design static analysis code-scanning tools during implementation and other techniques to significantly reduce external security vulnerabilities....
Code Secure: Another Look at the SafeInt Class By msdn.microsoft.com
David LeBlanc revisits the SafeInt Class and discusses relevant updates since his last article on this topic....
Article :: Living the "Least Privilege" Lifestyle: Don't Run Every Day Logged in as an Administrator By awprofessional.com
Don Kiely contends that exercising administrative rights over our computers is a major cause of insecure systems. In the first of five articles he explains the concept of least privilege and shows why software developers should be happy to operate as mere users....
Article :: The Fundamental Reasons for Protecting Your Windows Network By awprofessional.com
Networks are the lifeblood of business today; they are the nervous systems of organizations across the world. They are also the world s most interesting targets to a class of criminals who would love nothing more than to deny you the services of the technology you paid for. In this introduction to their book Steve Riley and Jesper Johansson explain...
Article :: Slamming Spam with SpamAssassin By awprofessional.com
Spam is one of the biggest headaches that network administrators face on a daily basis. It slows down the system overall eats up storage and sometimes includes dangerous worms and other nasty programs. This chapter will help you get started with SpamAssassin an interface that recognizes spam and kills it dead....
Article :: The Characteristics of Spam Email By awprofessional.com
The first step to fighting spam is knowing how to recognize it and by extension write code that recognizes it. Unfortunately spammers realize this and work hard to circumvent detection. This chapter details the many ways that spam filters recognize spam as well as the ways spammers have gotten around these filters....
325 Articles. Next Page
Sponsored Links
Sponsored Links