Security Myth: Only Large Development Teams can Write Secure Code

I would recommend that you share this post on the with anyone that automatically cite resources as an excuse for not writing secure code.  This  is an extremely well documented example of how a small team can developer secure code and also makes a good point how the smaller business are putting themselves at…


IIS 6.0 and ASP.NET 2.0 Credentials–Part Two

The ASP.NET User Principal (HTTPContext.User) clearly depends upon the Authentication Mechanism that you selected in IIS 6.0 “Authenication Tab” and if you use Integrated Windows Authentication then it is dependant on the IIS impersonation token that get handed off in the extension control block via the ASP.NET 2.0 ISAPI API.   Part two of IIS 6.0 and…

IIS 6.0 and ASP.NET 2.0 Credentials

The one area that many developers do not have good grasp at is how Authentication tokens from IIS 6.0 is passed to ASP.NET 2.0 and how these tokens can subsequently be used for Authorization in an ASP.NET 2.0 Web Application. The one question that arises quite often is when I click on “Integrated Windows Authentication”…

SQL Server 2005 Security for Developers Webcast for on-demand viewing is available

The on-demand Webcast of SQL Server 2005 for Developers, conducted on March 22, 2006, by Rob Walters–Program Manager, SQL Server Security–and I, is now available for on-demand viewing. Post Notes from this Webcast can be found at my blog. Look forward to seeing everyone for next week webcast.


Regenerating Keys in SQL Server 2005

In my latest Webcast on SQL Server 2005 Security one of the questions that came up was: “If some fields of your table are encrypted and you are suspicious that the key has been revealed can you re-encrypt all the fields with the regenerated key”?  Currently, there is no easy way to manage a key…


Post Webcast’s Notes: Securing SQL Server 2005 for Developers

This morning was a jammed filled session covering off a lot of changes made to Microsoft SQL Server 2005.  Over the last few weeks we talk exclusively about Front End security issues such as Input trust and the creation of a Development and Design environment to better emulate your production environment.  However, today we switched…


IOSEC and Anti-Cross Site Scripting Tool

Recently, Microsoft released the latest update to Anti-Cross Site Scripting tool which is part of a bigger plan known as the Microsoft IOSEC—an internal library.    The IOSEC library currently implements encoding protection against XSS attacks conducted through vectors such as HTML, URLs, JavaScript, HtmlAttributes and Visual Basic Script.  The Anti-Cross Site Scripting Library currently…

Code Scanning Tools’ WebCast for on-demand viewing is available

The on-demand version of the Visual Studio 2005 and Code Scanning Tools, conducted on March 15, 2006,by Kevin Lam and I, is now available for on-demand viewing. Look forward to seeing everyone for next week webcast.

Webcast’s Post Notes: Visual Studio 2005 and Code Scanning Tools

In today’s webcast we had the opportunity to explore the buffer overrun attack in depth which is considered one of the worst vulnerabilities that exist.  Any code that is written in C or C++ –without proper security code reviews–on any platform is susceptible to buffer overrun.  It is becoming easier and easier to create shell…


Ops!!! SecurePasswordTextBox Update now Available

After last week WebCast–in which I talked about the new System.Security.SecureString class as well as the cool SecurePasswordTextBox that Paul Glavs wrote–he experienced an sudden increase in downloads.  You can read about it here! Recently, Paul has updated his tool and can now be downloaded.  Great tool and thanks for sharing it with everyone Paul!