Atlanta Custom Software Development 

   Search        Code/Page

User Login



Forgot the Password?
» Web Development
» Maintenance
» Data Integration/BI
» Information Management
VB VB (1648) (736)
C# C# (15) (779)
ASP ASP (41)
VC++ VC++ (25)
JScript JScript (5)
» SQL Server (708)
» ORACLE (5)
» MySQL (0)
» DB2 (0)
» C/C++/ASM (11)
» Microcontroller (1)
» Circuit Design (0)
» Networking (5)
» Unix/Linux (1)
» WinNT/2k/2003 (8)
» Flash (0)
» Maya (0)
» 3D max (0)
» Photoshop (0)
» (2)
» PC Interfacing (1)
» Networking (4)
» SQL Server (4)
» VB (23)
» (4)
» VC (3)
» HTML/CSS/JavaScript (10)
» Regular Expr Tester
» Free Tools


Disable .NET security
Total Hit (1639) The .NET Framework enforces secuity at several levels. For example, assemblies downloaded from the Internet have very limited permissions (especially after installing the Service Pack 1 of the Framework). This means that many operations that would be legal in some cases may throw an exception in oth ....Read More
This is a link to a different site Sample Chapter from Visual Basic .NET Code Security Handbook
Total Hit (1275) A whole chapter for .net security
This is a link to a different site Role-Based Authorization With Forms Authentication
Total Hit (1234) In Web applications, typically there exist certain parts of the site that only certain individuals, or groups of individuals, can access. For example, imagine an intranet Web site used to administer the content on a company's public Internet Web site, where the public Web site lists products sold by ....Read More
This is a link to a different site Calculating CRC32 (and MDA5 and SHA-1) From .NET
Total Hit (1972) The CRC (Cyclic Redundancy Checksum) algorithm is a highly optimised and powerful way of checking whether a large number of bytes have been modified or not. The algorithm scans through all the bytes and generates a 32 bit number to represent the contents - small changes in the file contents result i ....Read More
This is a link to a different site How Do I...Encrypt and Decrypt a file?
Total Hit (2202) The CryptoStream class in the System.Security.Cryptography namespace is used to easily define cryptographic transforms on any data stream. The constructor is defined as the following: CryptoStream (Stream argument, ICryptoTransform transform, CryptoStreamMode mode). ....Read More
This is a link to a different site How Do I...Generate and compare a hash value?
Total Hit (1811) It is easy to generate and compare hash values using the cryptographic resources contained in the System.Security.Cryptography namespace. Because all hash functions take input of type Byte[], it might be necessary to convert the source into a byte array before it is hashed. To generate a hash val ....Read More
This is a link to a different site Programmatically Set NTFS File System Folder Permissions by Using Microsoft Visual Basic .NET
Total Hit (2934) This step-by-step article describes how to programmatically set NTFS file system folder permissions by using Microsoft Visual Basic .NET.
This is a link to a different site What Is Authorization Manager
Total Hit (1002) Role-based security has been evolving on the Windows platform since the first release of Windows NT. Using roles, the operating system can make determinations, such as whether a process is privileged, by checking the security context for a group called BUILTIN\Administrators. The operating system ma ....Read More
This is a link to a different site How to run your .net application using admin privilege under Vista?
Total Hit (778) Assume you're writing some application that really - I mean really really - needs administrative privileges (does it? you must be kidding). So, you want it to run evelated as an administrator. How to tackle this requirement in a Windows Vista and UAC world where even an administrator is locked down ....Read More

Recommanded Links


Home   |  Comment   |  Contact Us   |  Privacy Policy   |  Terms & Conditions   |  BlogsZappySys

© 2008 BinaryWorld LLC. All rights reserved.