Oldest pages

From Guidance Share

Jump to: navigation, search

Showing below up to 100 results starting with #1.
View (previous 100) (next 100) (20 | 50 | 100 | 250 | 500).

  1. ASP.NET 1.1 Performance Checklist ‎(00:00, 1 January 1970)
  2. ASP.NET 2.0 Code Examples ‎(00:00, 1 January 1970)
  3. What's new in ASP.NET 2.0 in terms of Authentication? ‎(00:00, 1 January 1970)
  4. How do I decide my Authentication strategy in ASP.NET? ‎(00:00, 1 January 1970)
  5. How do I use Forms Authentication with SQL Server database? ‎(00:00, 1 January 1970)
  6. How do I use Forms Authentication with Active Directory? ‎(00:00, 1 January 1970)
  7. How do I enable Forms Authentication to work with multiple Active Directory domains? ‎(00:00, 1 January 1970)
  8. How do I protect Forms Authentication? ‎(00:00, 1 January 1970)
  9. How do I enforce strong passwords using membership feature in ASP.NET 2.0 ‎(00:00, 1 January 1970)
  10. How do I protect passwords in user store? ‎(00:00, 1 January 1970)
  11. What are the issues with Forms Authentication in Web Farm Scenario? ‎(00:00, 1 January 1970)
  12. How do I implement single sign on using forms authentication? ‎(00:00, 1 January 1970)
  13. How do I use my custom user / identity store with forms authentication? ‎(00:00, 1 January 1970)
  14. How do I configure account lockout using membership feature in ASP.Net 2.0? ‎(00:00, 1 January 1970)
  15. When and how do I use windows authentication in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  16. When and how do I use Kerberos authentication in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  17. What's new in ASP.NET 2.0 in terms of Authorization? ‎(00:00, 1 January 1970)
  18. What is the difference between URL authorization, File authorization and Role authorization?? ‎(00:00, 1 January 1970)
  19. How do I use URL Authorization in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  20. How do I use File Authorization in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  21. How do I use Role Authorization in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  22. How is the AuthorizationStoreRoleProvider different from Authorization Manager APIs? ‎(00:00, 1 January 1970)
  23. How do I use Windows Groups for role authorization in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  24. How do I use my custom role store for roles authorization? ‎(00:00, 1 January 1970)
  25. How do I cache roles in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  26. How do I protect authorization cookie when using role caching in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  27. How do I lock authorization settings? ‎(00:00, 1 January 1970)
  28. How do I use RoleManager in my application? ‎(00:00, 1 January 1970)
  29. ASP.NET 2.0 Security FAQs ‎(00:00, 1 January 1970)
  30. How do I use the Health monitoring feature in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  31. What's new in ASP.NET 2.0 in terms of Auditing and Logging? ‎(00:00, 1 January 1970)
  32. What security events does health monitoring log by default? ‎(00:00, 1 January 1970)
  33. How do I instrument my application for security? ‎(00:00, 1 January 1970)
  34. When writing to a new event source from my ASP.NET application running under the Network service security context, I get registry permission exception. Why is this and how do I correct this ‎(00:00, 1 January 1970)
  35. How do I protect audit and log files? ‎(00:00, 1 January 1970)
  36. What's new in ASP.NET 2.0 in terms of Code Access Security? ‎(00:00, 1 January 1970)
  37. How do I use code access security with ASP.NET? ‎(00:00, 1 January 1970)
  38. How do I create a custom trust level for ASP.NET? ‎(00:00, 1 January 1970)
  39. What are the permissions at the various trust levels? ‎(00:00, 1 January 1970)
  40. How do I write partial trust applications? ‎(00:00, 1 January 1970)
  41. When should I put assemblies in GAC, what are security implications? ‎(00:00, 1 January 1970)
  42. When do I use impersonation in ASP.NET 2.0? ‎(00:00, 1 January 1970)
  43. How do I impersonate the original caller? ‎(00:00, 1 January 1970)
  44. How do I temporarily impersonate the original caller? ‎(00:00, 1 January 1970)
  45. How do I impersonate a specific (fixed) identity? ‎(00:00, 1 January 1970)
  46. When should I use programmatic impersonation? ‎(00:00, 1 January 1970)
  47. How do I use programmatic impersonation? ‎(00:00, 1 January 1970)
  48. What is protocol transition and when do I care? ‎(00:00, 1 January 1970)
  49. What is Constrained Delegation? ‎(00:00, 1 January 1970)
  50. How can I retain impersonation in the new thread created from ASP.NET application? ‎(00:00, 1 January 1970)
  51. How do I flow the original user identity to different layers? ‎(00:00, 1 January 1970)
  52. Can impersonation be used with Forms authentication? ‎(00:00, 1 January 1970)
  53. What are the requirements for using Kerberos delegation? ‎(00:00, 1 January 1970)
  54. What does a secure web.config look like? ‎(00:00, 1 January 1970)
  55. How do I encrypt sensitive data in machine.config or web.config file? ‎(00:00, 1 January 1970)
  56. How do I run an ASP.NET application with a particular identity? ‎(00:00, 1 January 1970)
  57. How do I create a service account for running my ASP.NET applications? ‎(00:00, 1 January 1970)
  58. Do I need to create a unique user account for each application pool? ‎(00:00, 1 January 1970)
  59. How do I lock configuration settings? ‎(00:00, 1 January 1970)
  60. How do I handle exceptions securely? ‎(00:00, 1 January 1970)
  61. How do I prevent detailed errors from returning to the client? ‎(00:00, 1 January 1970)
  62. How do I use structured exception handling? ‎(00:00, 1 January 1970)
  63. How do I setup a global exception handler for my application? ‎(00:00, 1 January 1970)
  64. How do I enable my ASP.NET application to write to new event source? ‎(00:00, 1 January 1970)
  65. How do I protect the database connection strings in web.config file? ‎(00:00, 1 January 1970)
  66. How do I use windows authentication for connecting to SQL server? ‎(00:00, 1 January 1970)
  67. How do I use SQL authentication for connecting to SQL server? ‎(00:00, 1 January 1970)
  68. When using Windows authentication, how can I give the default ASP.NET worker process access to a remote database server? ‎(00:00, 1 January 1970)
  69. What are the types of input I need to validate in my ASP.NET application? ‎(00:00, 1 January 1970)
  70. How do I validate input in server-side controls? ‎(00:00, 1 January 1970)
  71. How do I validate input in HTML controls, QueryString, cookies, and HTTP headers? ‎(00:00, 1 January 1970)
  72. What is SQL injection and how do I protect my application from SQL injection attacks? ‎(00:00, 1 January 1970)
  73. What is cross-site scripting and how do I protect my ASP.NET application from it? ‎(00:00, 1 January 1970)
  74. How do I protect my web application's ViewState? ‎(00:00, 1 January 1970)
  75. What care should I take when securing ViewState in a web farm scenario? ‎(00:00, 1 January 1970)
  76. How do I protect sensitive data in the database? ‎(00:00, 1 January 1970)
  77. How do I protect sensitive data in configuration files? ‎(00:00, 1 January 1970)
  78. How do I protect sensitive data in memory? ‎(00:00, 1 January 1970)
  79. How do I protect passwords? ‎(00:00, 1 January 1970)
  80. How do I secure Session State information? ‎(00:00, 1 January 1970)
  81. How do I strong-name an ASP.NET application assembly? ‎(00:00, 1 January 1970)
  82. How do I delay sign an ASP.NET application assembly? ‎(00:00, 1 January 1970)
  83. When should I use .pfx files? ‎(00:00, 1 January 1970)
  84. When should I pre-compile my ASP.NET application? ‎(00:00, 1 January 1970)
  85. How do I pre-compile my ASP.NET application? ‎(00:00, 1 January 1970)
  86. How do I strong name an ASP.NET application? ‎(00:00, 1 January 1970)
  87. How do I Sign .Net assemblies with Authenticode signature? ‎(00:00, 1 January 1970)
  88. How should I prevent someone from disassembling code? ‎(00:00, 1 January 1970)
  89. How do I set up a SQL Server or SQL Express database for Membership, Profiles and Role Management? ‎(00:00, 1 January 1970)
  90. Guidance ‎(00:00, 1 January 1970)
  91. Audit and log access across application tiers. ‎(00:00, 1 January 1970)
  92. Consider identity flow. ‎(00:00, 1 January 1970)
  93. Log key events. ‎(00:00, 1 January 1970)
  94. Back up and analyze log files regularly. ‎(00:00, 1 January 1970)
  95. Separate public and restricted areas. ‎(00:00, 1 January 1970)
  96. Use account lockout policies for end-user accounts. ‎(00:00, 1 January 1970)
  97. Support password expiration periods. ‎(00:00, 1 January 1970)
  98. Be able to disable accounts. ‎(00:00, 1 January 1970)
  99. Do not store passwords in user stores. ‎(00:00, 1 January 1970)
  100. Require strong passwords. ‎(00:00, 1 January 1970)

View (previous 100) (next 100) (20 | 50 | 100 | 250 | 500).

Views
Personal tools