Tech Tutorials Database
 GeekArticles Concepts Security

Sponsored Links

 
322 Articles.    Next Page   

Describes the driving goals behind the latest WSE 3.0 release focusing on the major feature highlights and how these can be used develop distributed applications based upon these Web service specifications....

The Microsoft WS-I Basic Security Profile 1.0 Sample Application is a preview release of the work being done by the WS-I Sample Application Working Group members to demonstrate interoperability of secure Web services....

Windows Mobile 5.0 Application Security   By msdn.microsoft.com
Learn how to develop an application for a Windows Mobile based device including how to determine what the security configuration of your device is and how to sign your application with the appropriate certificate....

Security Enhancements in the .NET Framework 2.0...

This Article discusses how you can run as an administrator and access Internet data safely by dropping unnecessary administrative privileges when using any tool to access the Internet....

This Article explains the techniques for extending WSE 2.0 to manage the secure context token state across a farm hosting multiple instances of a service....

This Article reviews the best practices to make your T-SQL code more bulletproof....

This Article Howard discusses minimizing security risks to code through techniques such as identifying and reducing attack surface reducing the volume of...

Route secure SOAP messages through multiple HTTP SOAP intermediaries using Next-Hop mechanisms and use the ExtendedSecurity function to form a secured chain of SOAP nodes through which messages must pass....

To withstand malicious attack to its software Microsoft uses threat models during software design static analysis code-scanning tools during implementation and other techniques to significantly reduce external security vulnerabilities....

David LeBlanc revisits the SafeInt Class and discusses relevant updates since his last article on this topic....

Don Kiely contends that exercising administrative rights over our computers is a major cause of insecure systems. In the first of five articles he explains the concept of least privilege and shows why software developers should be happy to operate as mere users....

Networks are the lifeblood of business today; they are the nervous systems of organizations across the world. They are also the world s most interesting targets to a class of criminals who would love nothing more than to deny you the services of the technology you paid for. In this introduction to their book Steve Riley and Jesper Johansson explain...

Spam is one of the biggest headaches that network administrators face on a daily basis. It slows down the system overall eats up storage and sometimes includes dangerous worms and other nasty programs. This chapter will help you get started with SpamAssassin an interface that recognizes spam and kills it dead....

The first step to fighting spam is knowing how to recognize it and by extension write code that recognizes it. Unfortunately spammers realize this and work hard to circumvent detection. This chapter details the many ways that spam filters recognize spam as well as the ways spammers have gotten around these filters....

322 Articles.    Next Page   

Sponsored Links

Sponsored Links

Subscribe via RSS

Subscribe to GeekArticles.com by Email

Enter your email address:

 Subscribe in a reader



 
 
 

Latest Comments

Sponsored Links