Hacking

ActiveX Security Model

Abstract Modern browsers act as a thin client by executing untrusted or portable code called Mobile_Code. For example, windows media player too could be used to run a song file in the browser. However, it is a trusted code to be executed in browsers. Moreover, it becomes malicious when hackers run it without the consent of the end […]

Authentication

Authentication is supposedly deemed to be the first line of defense in software’s, requires a combination of passkey from the end-user to manipulate the application further. Hence, the organization ought to incorporate the befitting authentication measures from grass root level in the form of policies into their logistics infrastructure to tighten the security of software […]

ASP.NET Security

This article’s objective is to further understanding of the Form Authentication mechanism in ASP.NET. The developer typically creates a custom authentication mechanism to validate a user name and password against a custom store such as its own SQL Server database. Fortunately, ASP.NET includes a built-in infrastructure for executing such systems. ASP.NET handles and establishes the […]

Scroll to top