You are 1 of 17 Active ASP.NET Visitors
 
 
Add to Del.icio.us  Add to StumbleUpon  Add to Codango Favor-It


 
Resource Menu


 More Subcategories Available


 Security      [+] Favor-It   
 
Sort By:  

 Secure Password Programming Site: India Web Development 
1
Reviews
0
Favor-It
This article takes you through the different ways how passwords are hacked, lists down the objectives of a secure password system, and finally explores how an effective password handling mechanism can be implemented with .NET Author: Rakesh Rajan Code: ASP.NET v1.1 & C#

 Request Validation Site: www.ASP.net 
0
Reviews
0
Favor-It
A new ASP.NET version 1.1 feature, request validation, prevents the server from accepting content containing un-encoded HTML. Author: asp.net Code: ASP.NET v1.1 & VB

 Group Validators by Submit Site: www.ASP.net 
0
Reviews
1
Favor-It
One weakness of the .NET validators is that they take an all or nothing approach to validation. If you have a validators on the page and you invoke validation every validator will be evaluated if it is enabled no matter which button was clicked. Author: asp.net Code: ASP.NET v1.0 & C#

0
Reviews
0
Favor-It
In a web application that allows users to edit data, different user accounts may have different data-editing privileges. In this tutorial we’ll examine how to dynamically adjust the data modification capabilities based on the visiting user. Author: Scott Mitchell Code: ASP.NET v2.0 & VB

0
Reviews
0
Favor-It
The author enumerates the pertinent features of .NET that will allow you to build safe, easily deployable controls. The features discussed include managed code, code access security, versioning control, Windows Forms classes, and isolation. Author: Jason Clark Code: ASP.NET v1.0 & C#

0
Reviews
0
Favor-It
In this model, the CLR acts as the traffic cop to assemblies, keeping track of where they came from and what security restraints should be placed on them. Author: Keith Brown Code: ASP.NET v1.0 & C#

0
Reviews
0
Favor-It
This article explains how the solution to intentional hacking was built and configured and provides best practices for software developers and systems administrators to secure their own solutions. Author: Timothy Bollefer et. al. Code: ASP.NET v1.1 & VB

0
Reviews
0
Favor-It
This chapter defines the scope and organization of the guide and highlights its goals. It also introduces key terminology and presents a set of core principles that apply to the guidance presented in later chapters. Author: J.D. Meier et. al Code: ASP.NET v1.1 & VB

0
Reviews
0
Favor-It
HTTP-based security mechanisms are currently the best way to keep your Web services secure. Learn how to secure a Web service using a combination of features found in Microsoft IIS and Microsoft ASP.NET. Author: Scott Seely Code: ASP.NET v1.1 & C#


    More Pages: 1 | 2 | 3 | 4 | 5 | 6 | 7 Next >>  




Icon Key > - Recently Updated - Showcase Listing


ASP.NET Section Stats
5078 page-views today
27378 yesterday
598512 last month
210.57 million total
since February 01, 2001
(formerly 411asp.net)
 

 

 
  
  Submit a Listing into this Category  | Update Your Listings Link to Us  |  Advertise  |  Contact Us  |  Website Help  
Write a User Review Today!
Its Fun, Fast, and Easy!

© 2014 ezd.com, All rights reserved
 

Google Analytics Alternative