¡@

Home 

c# Programming Glossary: attack

CryptographicException: Padding is invalid and cannot be removed

http://stackoverflow.com/questions/11762/cryptographicexception-padding-is-invalid-and-cannot-be-removed

OAEP padding scheme is used which prevents some sorts of attacks such as a chosen plaintext attack or blinding . A padding scheme.. prevents some sorts of attacks such as a chosen plaintext attack or blinding . A padding scheme appends some usually random garbage..

How to secure an ASP.NET Web API

http://stackoverflow.com/questions/11775594/how-to-secure-an-asp-net-web-api

hash return hashString So how to prevent relay attack Add constraint for the timestamp something like servertime X..

Intercept messages in a WCF Client

http://stackoverflow.com/questions/1217374/intercept-messages-in-a-wcf-client

of references to Web Service Extensions but am having an attack of the tired and just cant get my extensions to fire. I've used..

Could you explain ValidateAntiForgeryToken purpose and show me example about ValidateAntiForgeryToken

http://stackoverflow.com/questions/13621934/could-you-explain-validateantiforgerytoken-purpose-and-show-me-example-about-val

content using an authenticated user's credentials. The attack involves tricking the logged in user into submitting a form... prevent any other type of data forgery or tampering based attacks. To use it decorate the action method or controller with the..

How to bind to a PasswordBox in MVVM

http://stackoverflow.com/questions/1483892/how-to-bind-to-a-passwordbox-in-mvvm

memory. Which is considered quite a troublesome security attack vector. The PasswordBox uses encrypted memory of sorts and the..

What technique can protect a secret from a fully trusted user?

http://stackoverflow.com/questions/2150912/what-technique-can-protect-a-secret-from-a-fully-trusted-user

to solve bad people have a real financial motive to attack your system. A multi pronged approach is usually best for these.. data estimate its value to you estimate its value to an attacker think of what vulnerabilities expose the resource to attack.. think of what vulnerabilities expose the resource to attack characterize the threat who is the attacker and what is their..

When is it better to write “ad hoc sql” vs stored procedures [duplicate]

http://stackoverflow.com/questions/2734007/when-is-it-better-to-write-ad-hoc-sql-vs-stored-procedures

do although this will only expose you to a SQL injection attack if you're concatenating user input . Obviously ad hoc queries.. to prevent the monster under the bed of a sql injection attack but also just to make your life as a programmer generally easier..

Is BCrypt a good hashing algorithm to use in C#? Where can I find it?

http://stackoverflow.com/questions/481160/is-bcrypt-a-good-hashing-algorithm-to-use-in-c-where-can-i-find-it

security practices . If they can successfully use another attack vector XSS SQL Injection CSRF et. al. on your site good password..

SQL injection on INSERT

http://stackoverflow.com/questions/681583/sql-injection-on-insert

a description of how you could perform an SQL Injection attack. You need to use parameterized SQL statements to prevent this...

Erratic Invalid Viewstate issue in a .NET application

http://stackoverflow.com/questions/728513/erratic-invalid-viewstate-issue-in-a-net-application

using the HTTP header helps mitigate certain XSS attack vectors. NOTE There have been reports that this problem still..

Which cryptographic hash function should I choose?

http://stackoverflow.com/questions/800685/which-cryptographic-hash-function-should-i-choose

for identification. MD5 however is vulnerable to collision attacks SHA1 is also vulnerable but to a lesser degree. Under what.. a secure hash function of its length would require. The attack is continually being revised and currently can be done in ~2^63.. created following SHA1. Currently there are no known attacks against SHA2 functions. SHA256 384 and 512 are all part of..

How to protect dlls?

http://stackoverflow.com/questions/805461/how-to-protect-dlls

plausibility include Static link so there is no DLL to attack. Strip all symbols. Use a .DEF file and an import library to.. don't know how effective they are against a determined attack. A lot is going to depend on your use case. If you merely want..

Why is JsonRequestBehavior needed?

http://stackoverflow.com/questions/8464677/why-is-jsonrequestbehavior-needed

this question This is to protect against a very specific attack with JSON requests that return data using HTTP GET. Basically.. in with DenyGet as the default to protect you against this attack. It makes you consider the implications of what data you are..

SQL Injection attack prevention: where do I start

http://stackoverflow.com/questions/9162862/sql-injection-attack-prevention-where-do-i-start

Injection attack prevention where do I start I'm looking to make my site secure.. I'm looking to make my site secure against SQL injection attacks. Does anyone have any good links to make the site secure against.. good links to make the site secure against these types of attacks in an ASP.NET site c# web forms EDIT I should point out at..