Skip to main content

Home/ Agency Oasis Developers/ Group items tagged security

Rss Feed Group items tagged

Mark Ursino

Password Strength - Estimates brute force time - 0 views

  •  
    This plugin shows the strength of you passwords by telling you how long time it would take to brute force them.
Mark Ursino

HouseCall - Trend Micro USA - 0 views

  •  
    "HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. It is now faster, more powerful and browser independent!"
Mark Ursino

Sandboxie - 1 views

  •  
    "Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer. "
Mark Ursino

Download Remove Fake Antivirus 1.36 - 0 views

  •  
    Removes: * Personal Antivirus * Antivirus 2009 and 2010 * Antivirus 360 * MS Antispyware 2009 * Malware Doctor * Antivirus BEST
Mark Ursino

Build a Simple Password Strength Checker - 3 views

  •  
    JavaScript algo to determine password strength
Mark Ursino

Configure NTFS Permissions (IIS 6.0) - 0 views

  •  
    Use NTFS permissions to define the level of access to your directories and files that you want to grant to specific users and groups of users
mgraber

How To: Prevent Cross-Site Scripting in ASP.NET - 0 views

  •  
    "How To: Prevent Cross-Site Scripting in ASP.NET"
mgraber

How To: Protect From Injection Attacks in ASP.NET - 0 views

  •  
    "How To: Protect From Injection Attacks in ASP.NET"
mgraber

Know who to hire to help fix PCI compliance issues on a client's website? - 0 views

  •  
    "Know who to hire to help fix PCI compliance issues on a client's website?"
mgraber

James Jardine : Developer Notes - 0 views

  •  
    "Cross Site Request Forgery (CSRF) This article assumes you already understand what CSRF is and how it works. If you don't, do a quick Google search and it will clear it up. CSRF can be done using POST or GET, but GET is much easier to implement. By default, ASP.Net forms and other functionality work via the POST method. If we could submit a GET instead of a POST it would open up the attack surface a great deal. No longer do we need someone to visit a page with a form on it, but we could actually embed the GET request (a link) in emails or other medium. Fortunately for the attacker, unfortunately for the developer, .Net uses Value Shadowing for its controls. This means all server side controls, ie. Viewstate, EventValidation, EventCommand, EventArguments, etc.. It is possible to take the values that would be submitted as part of the form and just add them to the Querystring instead. Now there is a GET request that is comparable to the POST request. ASP.Net Webforms does not check whether a post back comes from GET or POST. The one thing to keep in mind is that the URL in a GET is limited in size. If the form is large and the viewstate is very large, this could block this technique from working. This depends on the way the application is configured (more later)."
mgraber

Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet - OWASP - 0 views

  •  
    "Viewstate (ASP.NET) ASP.NET has an option to maintain your ViewState. The ViewState indicates the status of a page when submitted to the server. The status is defined through a hidden field placed on each page with a control. Viewstate can be used as a CSRF defense, as it is difficult for an attacker to forge a valid Viewstate. It is not impossible to forge a valid Viewstate since it is feasible that parameter values could be obtained or guessed by the attacker. However, if the current session ID is added to the ViewState, it then makes each Viewstate unique, and thus immune to CSRF. To use the ViewStateUserKey property within the Viewstate to protect against spoofed post backs. Add the following in the OnInit virtual method of the Page-derived class (This property must be set in the Page.Init event) protected override OnInit(EventArgs e) { base.OnInit(e); if (User.Identity.IsAuthenticated) ViewStateUserKey = Session.SessionID; } The following keys the Viewstate to an individual using a unique value of your choice. (Page.ViewStateUserKey) This must be applied in Page_Init because the key has to be provided to ASP.NET before Viewstate is loaded. This option has been available since ASP.NET 1.1. However, there are limitations on this mechanism. Such as, ViewState MACs are only checked on POSTback, so any other application requests not using postbacks will happily allow CSRF. "
mgraber

asp.net - ViewStateUserKey isn't preventing CSRF? - Stack Overflow - 0 views

  •  
    "ViewStateUserKey isn't preventing CSRF?"
mgraber

Take Advantage of ASP.NET Built-in Features to Fend Off Web Attacks - 0 views

  •  
    "Take Advantage of ASP.NET Built-in Features to Fend Off Web Attacks"
« First ‹ Previous 61 - 76 of 76
Showing 20 items per page