News in the Category: Security Subscribe to the rss of this category.

Total posts: 1254 | Sort by Views | Sort by Hits

Connecting EventHubs to API Management

<ChristophDotNet, June 19, 2015
Views: 106 | Hits 3

In the previous posts, we looked at: Authenticating callers using Groups in API Management Policies Exposing Strongly Typed APIs for Azure Queues with API Management Policies In the third article of...

Safe(r) Custom User-Authentication

Simple Talk, June 12, 2015
Views: 74 | Hits 3

If you are still storing passwords with MD5 hashing you're doing it wrong. The .NET platform provides a Cryptography library that allows you to develop PBKDF2 user authentication to the standards of t...

Microsoft Releases 2 'Critical' Bulletins for June Patch Tuesday

Microsoft Certified Professional Magazine Online | Todays Top Picks, June 9, 2015
Views: 2 | Hits

Microsoft on Tuesday released two security bulletin items for Internet Explorer and Windows Media Player labeled as "critical" and six "important."...

Microsoft's Advanced Threat Protection Service for E-Mail Goes Live

Microsoft Certified Professional Magazine Online | Todays Top Picks, June 8, 2015
Views: 2 | Hits

Exchange Online e-mail security feature Advanced Threat Protection (ATP) is now live....

Azure API Management - Who's calling?

<ChristophDotNet, June 5, 2015
Views: 131 | Hits 2

API Management is one of the lesser explored areas of Azure. Regardless, it's a very powerful service to layer onto your service to add:   Governance Throttling Analytics Authentication develope...

Study Finds Average Cost of Enterprise Breaches on the Rise

Microsoft Certified Professional Magazine Online | Todays Top Picks, May 28, 2015
Views: 2 | Hits

The average cost of corporate security breaches has raised 23 percent over the last two years, according to a report by IBM and Ponemon Institute....

Preventing XSS Attacks in ASP.NET MVC using ValidateInput and AllowHTML

The Code Project Latest Articles, May 28, 2015
Views: 109 | Hits 6

In this blog we will try to understand how we can prevent and fine tune XSS(Cross Site Security) security attacks in ASP.NET MVC....

Outlook, Intune and OneDrive for Business Security Enhancements Rolling Out

Microsoft Certified Professional Magazine Online | Todays Top Picks, May 21, 2015
Views: 2 | Hits

A new "managed Outlook app" that will increase enhanced data security for businesses is expected to be released sometime this quarter, Microsoft announced....

May Patch Tuesday: Internet Explorer Gets 'Critical' Fix

Microsoft Certified Professional Magazine Online | Todays Top Picks, May 12, 2015
Views: 4 | Hits

The company released on Tuesday its May security update, packed with three bulletins rated "critical" and 10 "important."...

The First Chrome Extension - A "How-to"

The Code Project Latest Articles, May 4, 2015
Views: 164 | Hits 7

A simple first-step Extension for the Chrome Browser with a How-to of event-hooks in javascript, as the google security policy does not allow inline-scripts and events....

How to Get SQL Server Security Horribly Wrong

Simple Talk, April 29, 2015
Views: 154 | Hits 6

It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fai...

Microsoft Releases 4 'Critical' Bulletins for April's Security Update

Microsoft Certified Professional Magazine Online | Todays Top Picks, April 14, 2015
Views: 162 | Hits 2

Microsoft released today its monthly security patch with four bulletins rated "critical" and seven rated "important."...

Microsoft To Boost Office 365 Security with Advance E-Mail Threat Protection

Microsoft Certified Professional Magazine Online | Todays Top Picks, April 9, 2015
Views: 238 | Hits 2

New security tools for Office 365 that will protect e-mails from harmful links and phishing attacks was announced by Microsoft this week....

SSL now in public beta on MongoLab

MongoLab - MongoDB Hosting, April 8, 2015
Views: 201 | Hits 1

Our team at MongoLab is excited to announce the public beta of SSL-enabled* (Secure Sockets Layer) MongoDB connections on Dedicated deployments**. This feature adds an extra level of security by encry...

Organizations Being Hit by the 'Dyre Wolf' Trojan

Microsoft Certified Professional Magazine Online | Todays Top Picks, April 7, 2015
Views: 176 | Hits 6

According to a security report by IBM, an active attack campain is currently being used to steal millions from overseas enterprises....

Spring security in java

The Code Project Latest Articles, April 2, 2015
Views: 196 | Hits 1

In this article I'm going to tell a line about what is a Security in the application, what is Spring Security, and how to integrate Spring Security in your application....

Microsoft Unveils Windows 10 Security Features That Avoid Passwords

Microsoft Certified Professional Magazine Online | Todays Top Picks, March 17, 2015
Views: 191 | Hits 12

Microsoft today named two security features that will appear in Windows 10 that will diminish the importance of using passwords to ensure device security....

Intune Mobile Management Features Added to Office 365 Apps

Microsoft Certified Professional Magazine Online | Todays Top Picks, March 4, 2015
Views: 274 | Hits 1

Microsoft's layered security approach for mobile management was discussed during a Web broadcast this week....

OAuth is so insecure

Sahil Malik - blah.winsmarts.com, March 4, 2015
Views: 218 | Hits 15

SharePoint Training: more information Let me preface this by saying, the p...

MDM and Mobile platforms of choice

Sahil Malik - blah.winsmarts.com, March 2, 2015
Views: 197 | Hits 4

SharePoint Training: more information There are 3 main platforms (ignoring...

Adding security to our NoteKeeper JQuery Mobile App

The Code Project Latest Articles, February 27, 2015
Views: 303 | Hits 1

Provide functionality to Sign In and Sign Up to enable security for our NoteKeeper JQuery Mobile App....

ASP.NET Web Api: Understanding OWIN/Katana Authentication/Authorization Part I: Concepts

The Code Project Latest Articles, February 16, 2015
Views: 268 | Hits 72

Identity is fully compatible with the OWIN Authorization model, and when used in this manner, represents a very useful, ready-to go concrete implementation. But we can perhaps better understand the st...

Privacy Issues Discovered in Microsoft Outloook App for iOS and Android

Microsoft Certified Professional Magazine Online | Todays Top Picks, February 11, 2015
Views: 170 | Hits 3

Vulnerabilities in the newly released iOS and Android versions of Outlook have been discovered, with one causing the app to bypass custom Exchange ActiveSync security policies in organizations....

Microsoft February Patch Tuesday: 41 IE Flaws Fixed

Microsoft Certified Professional Magazine Online | Todays Top Picks, February 10, 2015
Views: 169 | Hits 2

This month's Microsoft security update has been released, packed with three "critical bulletins and six "important" items....

Health Insurance Anthem Discloses Massive Breach

Microsoft Certified Professional Magazine Online | Todays Top Picks, February 5, 2015
Views: 196 | Hits 3

Anthem alerted customers that its system had been compromised information, including names, addresses, birthdays and Social Security numbers of millions of its customers....

AppSec Dont Trust the Network

The Code Project Latest Articles, February 5, 2015
Views: 210 | Hits 4

Long gone are the days when networks could be relied upon to provide security for your organization, old theories about applications and databases, and servers being behind the firewall and therefore ...

Using Spring Security and create custom login dialog

The Code Project Latest Articles, February 1, 2015
Views: 311 | Hits 5

This is articule is about the spring security and how to create a custom jsp page to login with....

Security Update Support Ending for Windows Server 2003 in July

Microsoft Certified Professional Magazine Online | Todays Top Picks, January 27, 2015
Views: 182 | Hits

Windows Server 2003 lose security support when the product's lifecycle ends this summer....

WebAPI Security Custom Authorization Filters

The Code Project Latest Articles, January 19, 2015
Views: 275 | Hits 34

Implementing custom security authorization using Web API Filters...

Using JSON Web Tokens with Katana and WebAPI

K. Scott Allen, January 15, 2015
Views: 679 | Hits 15

A common question Ive been getting is how to use tokens with ASP.NET, specifically JSON Web Tokens (JWT) with ASP.NET WebAPI where the OAuth server and the resource server are the same. In other words...

January Patch Tuesday: MS Releases 1 'Critical' Windows Fix

Microsoft Certified Professional Magazine Online | Todays Top Picks, January 13, 2015
Views: 197 | Hits 8

Microsoft released January's security update today, which includes one security bulletin rated "critical" and seven rated "important" to address a total of eight flaws....

Windows 8.1 Zero-Day Flaw Disclosed by Google

Microsoft Certified Professional Magazine Online | Todays Top Picks, January 6, 2015
Views: 190 | Hits 11

Information pertaining to a vulnerability in Windows 8.1 that could allow for a malicious application from bypassing security was released last week by Google....

PageObjects and Protractor

K. Scott Allen, January 6, 2015
Views: 213 | Hits 6

I’m a fan of the PageObject pattern when writing Protractor tests, because PageObjects make the test code more expressive and readable. When I sit down to write some Protractor tests, I usually ...

Example of a transform for unit testing something tricky

Rico Marianis Performance Tidbits, November 27, 2014
Views: 236 | Hits 7

There were some requests for an example of my unit testing strategy so made up this fragment and included some things that would make your testing annoying. This is the initial fragment.&nbs...

Developing secure web applications: XSS attack, the Confused Deputy and Over-Posting

The Code Project Latest Articles, November 24, 2014
Views: 402 | Hits 13

The reality is that securing applications is not as much fun as we would like it to be. Nobody comes and says "Wow! Thumbs up for securing my personal data!". However, security is undoubtedly import...

Query string encryption for ASP.NET

The Code Project Latest Articles, November 15, 2014
Views: 258 | Hits 20

Clear text query strings are a potential security threat for your web application. Thus, query strings should always be encrypted....

On Honesty

Peter Brombergs UnBlog, November 12, 2014
Views: 175 | Hits 2

Honesty refers to a facet of moral character and connotes positive and virtuous attributes such as integrity, truthfulness, and straightforwardness, including straightforwardness of conduct, along wit...

On Honesty

Peter Brombergs UnBlog, November 12, 2014
Views: 233 | Hits 1

Honesty refers to a facet of moral character and connotes positive and virtuous attributes such as integrity, truthfulness, and straightforwardness, including straightforwardness of conduct, along wit...

Survey: Security Threat Increase Predicted

Microsoft Certified Professional Magazine Online | Todays Top Picks, November 6, 2014
Views: 219 | Hits 3

The sophistication of attackers is outstripping chief information security officers' (CISOs) ability to fend them off and the number of threats has increased markedly....

MongoDB LDAP and Kerberos Authentication with Centrify

The MongoDB NoSQL Database Blog, November 4, 2014
Views: 212 | Hits 2

By Alex Komyagin at MongoDB with the help of Felderi Santiago at Centrify and Robertson Pimentel at CentrifyOverviewCentrify provides unified identity management solutions that result in single sign-o...

Azure: New Marketplace, Network Improvements, New Batch Service, Automation Service, more

ScottGus Blog, October 28, 2014
Views: 374 | Hits 1

Today we released a major set of updates to Microsoft Azure. Todays updates include: Marketplace: Announcing Azure Marketplace and partnerships with key technology partners Networking: Network Secur...

New Office 365 Manangement Controls Previewed at TechEd Europe

Microsoft Certified Professional Magazine Online | Todays Top Picks, October 28, 2014
Views: 366 | Hits 1

Microsoft showed off some management and security improvements to Office 365 today, including new device management (MDM) controls and data loss protection (DLP) features....

Why the "Tsu" social network may not be a good idea at all

Peter Brombergs UnBlog, October 27, 2014
Views: 186 | Hits 3

People on social media are usually pretty quick to jump on the ""latest new thing"", often without doing any real research. That's why when invited to join ""tsu"", I declined. Now I feel even...

Why the "Tsu" social network may not be a good idea at all

Peter Brombergs UnBlog, October 27, 2014
Views: 252 | Hits 9

People on social media are usually pretty quick to jump on the ""latest new thing"", often without doing any real research. That's why when invited to join ""tsu"", I declined. Now I feel even...

Windows 10's ID Management and Security Controls

Microsoft Certified Professional Magazine Online | Todays Top Picks, October 23, 2014
Views: 366 | Hits 4

Microsoft outlined some of the new security features making its way to the company's next OS....

The Mindset of the Enterprise DBA: Delegating Work

Simple Talk, October 17, 2014
Views: 236 | Hits 2

A lot of the routine jobs demanded of a DBA can be automated, but a tougher prospect is to automate these jobs in a way that the requestor rather than the DBA can actually set of the job running them...

MongoDB Management Service Re-imagined: The Easiest Way to Run MongoDB

The MongoDB NoSQL Database Blog, October 14, 2014
Views: 398 | Hits 10

Discuss on Hacker NewsWe consistently hear that getting started with MongoDB is easy, but scaling to large configurations that include replication and sharding can be challenging. With MMS, it is now ...

Sharding Pitfalls Part II: Running a Sharded Cluster

The MongoDB NoSQL Database Blog, October 8, 2014
Views: 484 | Hits 3

By Adam Comerford, Senior Solutions EngineerIn Part I we discussed important considerations when picking a shard key. In this post we will go through some recommendations when running a sharded cluste...

Authentication, Authorization and OWIN - Who Moved My Cheese?

The Code Project Latest Articles, October 6, 2014
Views: 515 | Hits 14

With the introduction of OWIN-based security and Identity management in ASP.NET 4.5, the configuration of authentication and authorization have changed a bit for web forms developers. In this article,...

Acunetix WVS Audit Your Website Security

The Code Project Latest Articles, September 29, 2014
Views: 681 | Hits 5

Acunetix WVS audits your website security by running a host of tests. It then provides a concise report of issues it found. Not only does it do this, but it also suggests changes you need to make to f...