Atlanta Custom Software Development 

 
   Search        Code/Page
 

User Login
Email

Password

 

Forgot the Password?
Services
» Web Development
» Maintenance
» Data Integration/BI
» Information Management
Programming
VB VB (1648)
VB.net VB.net (736)
C# C# (15)
ASP.net ASP.net (779)
ASP ASP (41)
VC++ VC++ (25)
PHP PHP (0)
JAVA JAVA (4)
JScript JScript (5)
  Database
» SQL Server (708)
» ORACLE (5)
» MySQL (0)
» DB2 (0)
Automation
» C/C++/ASM (11)
» Microcontroller (1)
» Circuit Design (0)
OS/Networking
» Networking (5)
» Unix/Linux (1)
» WinNT/2k/2003 (8)
Graphics
» Flash (0)
» Maya (0)
» 3D max (0)
» Photoshop (0)
Links
» ASP.net (2)
» PC Interfacing (1)
» Networking (4)
» SQL Server (4)
» VB (23)
» VB.net (4)
» VC (3)
» HTML/CSS/JavaScript (10)
Tools
» Regular Expr Tester
» Free Tools

 

Disable .NET security
Total Hit (1405) The .NET Framework enforces secuity at several levels. For example, assemblies downloaded from the Internet have very limited permissions (especially after installing the Service Pack 1 of the Framework). This means that many operations that would be legal in some cases may throw an exception in oth ....Read More
Rating
This is a link to a different site Sample Chapter from Visual Basic .NET Code Security Handbook
Total Hit (1075) A whole chapter for .net security
Rating
This is a link to a different site Role-Based Authorization With Forms Authentication
Total Hit (1061) In Web applications, typically there exist certain parts of the site that only certain individuals, or groups of individuals, can access. For example, imagine an intranet Web site used to administer the content on a company's public Internet Web site, where the public Web site lists products sold by ....Read More
Rating
This is a link to a different site Calculating CRC32 (and MDA5 and SHA-1) From .NET
Total Hit (1683) The CRC (Cyclic Redundancy Checksum) algorithm is a highly optimised and powerful way of checking whether a large number of bytes have been modified or not. The algorithm scans through all the bytes and generates a 32 bit number to represent the contents - small changes in the file contents result i ....Read More
Rating
This is a link to a different site How Do I...Encrypt and Decrypt a file?
Total Hit (1839) The CryptoStream class in the System.Security.Cryptography namespace is used to easily define cryptographic transforms on any data stream. The constructor is defined as the following: CryptoStream (Stream argument, ICryptoTransform transform, CryptoStreamMode mode). ....Read More
Rating
This is a link to a different site How Do I...Generate and compare a hash value?
Total Hit (1477) It is easy to generate and compare hash values using the cryptographic resources contained in the System.Security.Cryptography namespace. Because all hash functions take input of type Byte[], it might be necessary to convert the source into a byte array before it is hashed. To generate a hash val ....Read More
Rating
This is a link to a different site Programmatically Set NTFS File System Folder Permissions by Using Microsoft Visual Basic .NET
Total Hit (2637) This step-by-step article describes how to programmatically set NTFS file system folder permissions by using Microsoft Visual Basic .NET.
Rating
This is a link to a different site What Is Authorization Manager
Total Hit (932) Role-based security has been evolving on the Windows platform since the first release of Windows NT. Using roles, the operating system can make determinations, such as whether a process is privileged, by checking the security context for a group called BUILTIN\Administrators. The operating system ma ....Read More
Rating
This is a link to a different site How to run your .net application using admin privilege under Vista?
Total Hit (684) Assume you're writing some application that really - I mean really really - needs administrative privileges (does it? you must be kidding). So, you want it to run evelated as an administrator. How to tackle this requirement in a Windows Vista and UAC world where even an administrator is locked down ....Read More
Rating


Recommanded Links

 

Home   |  Comment   |  Contact Us   |  Privacy Policy   |  Terms & Conditions   |  BlogsZappySys

© 2008 BinaryWorld LLC. All rights reserved.