SQL Server 2005 Security for Developers Webcast for on-demand viewing is available

The on-demand Webcast of SQL Server 2005 for Developers, conducted on March 22, 2006, by Rob Walters–Program Manager, SQL Server Security–and I, is now available for on-demand viewing. Post Notes from this Webcast can be found at my blog. Look forward to seeing everyone for next week webcast.

1

Post Webcast’s Notes: Securing SQL Server 2005 for Developers

This morning was a jammed filled session covering off a lot of changes made to Microsoft SQL Server 2005.  Over the last few weeks we talk exclusively about Front End security issues such as Input trust and the creation of a Development and Design environment to better emulate your production environment.  However, today we switched…

4

Code Scanning Tools’ WebCast for on-demand viewing is available

The on-demand version of the Visual Studio 2005 and Code Scanning Tools, conducted on March 15, 2006,by Kevin Lam and I, is now available for on-demand viewing. Look forward to seeing everyone for next week webcast.


Webcast’s Post Notes: Visual Studio 2005 and Code Scanning Tools

In today’s webcast we had the opportunity to explore the buffer overrun attack in depth which is considered one of the worst vulnerabilities that exist.  Any code that is written in C or C++ –without proper security code reviews–on any platform is susceptible to buffer overrun.  It is becoming easier and easier to create shell…

2

On Demand WebCast: Least Privilege Development and New System.Security Features

The latest Webcast “Least Privilege Development and New System.Security Features” which is part two of a five part series on examining the new security features and tools incorporated in Visual Studio 2005 and .NET Framework 2.0 is now ready for on-demand viewing and download.


Answer to the Trivial Question

The answer to the trivial question from my blog based upon the March 8, 2006 WebCasts “Least Privilege Development and New System.Security Features” is below:   Question:  The KeyInfo element can consist of either a <KeyName/> or a <RetrievalMethod/> child element.  What is the purpose of each element and what are the differences between the…


WebCast’s Notes: Least Privilege and New System.Security Features

In today’s Webcast we first started off with a continuation from last week.  Last week we explored how to setup a development and design environment that closely emulates your production environment to make your testing more effective and efficient.  This was accomplished by enabling Debug in Zone and using tools such as permcalc.  This week…

6

The Code Room: BREAKING INTO VEGAS!

The Code Room is online ½ hour TV show focusing on developers and the programming challenges that they face.   The latest show, in a very, very cool way, will demonstrate the impact of a hacked environment (a casino in the show) that has been penetrated and compromised by a group of hackers.  More importantly…

4

SECURITY ON THE BRAIN Webcast Series

Wow!  We currently have 1800 people registered for Security on the Brain Webcasts.  There is still room, so if you want to learn more about developing secure software using Visual Studio 2005 and .NET Framework 2.0 then these five sessions for one hour every Wednesday, starting March 1, 2006 are for you.    I am…