Latest Articles in the Category Security

Sort by: Most Comments | Avg Rating | Most Ratings | Cancel Sort

Book Review: Understanding Windows CardSpace

Tomas McGuinness, Apr 14, 2008
Views: 4,149 Avg Rating: 0/5 Votes: 0 Comments: 0

Review of the book “Understanding Windows CardSpace”.

The Diffie-Hellman Key Agreement Standard

Derek Smyth, Aug 01, 2007
Views: 15,257 Avg Rating: 3/5 Votes: 3 Comments: 4

The Diffie-Hellman Key Agreement Standard describes an algorithm which allows two individual parties to separately generate the same secret key but by only sharing non sensitive data. This article discusses the Diffie-Hellman Key Agreement algorithm, providing an implementation in .NET, before discussing areas not covered by the algorithm.

An inside look at Symmetric Encryption

Derek Smyth, Jul 18, 2007
Views: 16,915 Avg Rating: 0/5 Votes: 0 Comments: 0

This article describes the internal workings of symmetric encryption; also known as secret key encryption. Concentrating mostly on the older DES encryption method this article doesn't contain any code examples and intends to cover the internals in a manner that isn't technology specific.

Protect Code with Skater .NET Obfuscator

Rustem Soft, Feb 19, 2007
Views: 9,662 Avg Rating: 0/5 Votes: 0 Comments: 0

Application vulnerabilities, Intellectual Property theft and revenue loss are among the most serious risks facing companies today. According to Business Software Alliance statistics, four out of every ten software programs are pirated in software business, worldwide.

Microsoft’s CardSpace: Part 3 – Using a Card

Tomas McGuinness, Jan 12, 2007
Views: 13,276 Avg Rating: 5/5 Votes: 1 Comments: 2

This article is the final part in a series of articles designed to get you up and running with Microsoft's CardSpace technology. This part deals with the consuming a card that we created and accessing the details contained within the card. It assumes a good working knowledge of C# and ASP.NET.

Microsoft's CardSpace: Part 2 - Creating and using your first identity card

Tomas McGuinness, Jan 05, 2007
Views: 9,223 Avg Rating: 0/5 Votes: 0 Comments: 5

This article is part two in a series of articles designed to get you up and running with Microsoft's CardSpace technology. This part deals with the setup of a simple application that enabled users to select and submit identity cards. It assumes a basic knowledge of IIS and HTML.

Microsoft's CardSpace: Part 1 – Getting started

Tomas McGuinness, Dec 04, 2006
Views: 26,377 Avg Rating: 0/5 Votes: 0 Comments: 0

This article is part one in a series of articles designed to get you up and running with Microsoft's CardSpace technology. This part deals with the setup of a high assurance certificate to give you an environment where a CardSpace application can be hosted. It assumes a basic knowledge of IIS and HTML.

Hashing, MACs, and Digital Signatures in .NET

Derek Smyth, Nov 10, 2006
Views: 52,339 Avg Rating: 5/5 Votes: 1 Comments: 7

This article covers what the differences are between hashing, MAC and digital signatures. It presumes a certain level of knowledge about encryption methods especially the difference between symmetric and asymmetric encryption. The article does not cover how to perform encryption or about key management. There are some code examples on how to perform each of the technologies using C# in .NET v2.0.