Latest Articles in the Category Security

Sort by: Most Comments | Avg Rating | Most Ratings | Cancel Sort

Hashing, MACs, and Digital Signatures in .NET

Derek Smyth, Nov 10, 2006
Views: 50,733 Avg Rating: 5/5 Votes: 1 Comments: 7

This article covers what the differences are between hashing, MAC and digital signatures. It presumes a certain level of knowledge about encryption methods especially the difference between symmetric and asymmetric encryption. The article does not cover how to perform encryption or about key management. There are some code examples on how to perform each of the technologies using C# in .NET v2.0.

Microsoft's CardSpace: Part 2 - Creating and using your first identity card

Tomas McGuinness, Jan 05, 2007
Views: 8,959 Avg Rating: 0/5 Votes: 0 Comments: 5

This article is part two in a series of articles designed to get you up and running with Microsoft's CardSpace technology. This part deals with the setup of a simple application that enabled users to select and submit identity cards. It assumes a basic knowledge of IIS and HTML.

The Diffie-Hellman Key Agreement Standard

Derek Smyth, Aug 01, 2007
Views: 14,776 Avg Rating: 3/5 Votes: 3 Comments: 4

The Diffie-Hellman Key Agreement Standard describes an algorithm which allows two individual parties to separately generate the same secret key but by only sharing non sensitive data. This article discusses the Diffie-Hellman Key Agreement algorithm, providing an implementation in .NET, before discussing areas not covered by the algorithm.

Microsoft’s CardSpace: Part 3 – Using a Card

Tomas McGuinness, Jan 12, 2007
Views: 13,070 Avg Rating: 5/5 Votes: 1 Comments: 2

This article is the final part in a series of articles designed to get you up and running with Microsoft's CardSpace technology. This part deals with the consuming a card that we created and accessing the details contained within the card. It assumes a good working knowledge of C# and ASP.NET.

Book Review: Understanding Windows CardSpace

Tomas McGuinness, Apr 14, 2008
Views: 4,058 Avg Rating: 0/5 Votes: 0 Comments: 0

Review of the book “Understanding Windows CardSpace”.

An inside look at Symmetric Encryption

Derek Smyth, Jul 18, 2007
Views: 16,492 Avg Rating: 0/5 Votes: 0 Comments: 0

This article describes the internal workings of symmetric encryption; also known as secret key encryption. Concentrating mostly on the older DES encryption method this article doesn't contain any code examples and intends to cover the internals in a manner that isn't technology specific.

Protect Code with Skater .NET Obfuscator

Rustem Soft, Feb 19, 2007
Views: 9,406 Avg Rating: 0/5 Votes: 0 Comments: 0

Application vulnerabilities, Intellectual Property theft and revenue loss are among the most serious risks facing companies today. According to Business Software Alliance statistics, four out of every ten software programs are pirated in software business, worldwide.

Microsoft's CardSpace: Part 1 – Getting started

Tomas McGuinness, Dec 04, 2006
Views: 25,987 Avg Rating: 0/5 Votes: 0 Comments: 0

This article is part one in a series of articles designed to get you up and running with Microsoft's CardSpace technology. This part deals with the setup of a high assurance certificate to give you an environment where a CardSpace application can be hosted. It assumes a basic knowledge of IIS and HTML.