¡@

Home 

c# Programming Glossary: attacks

CryptographicException: Padding is invalid and cannot be removed

http://stackoverflow.com/questions/11762/cryptographicexception-padding-is-invalid-and-cannot-be-removed

OAEP padding scheme is used which prevents some sorts of attacks such as a chosen plaintext attack or blinding . A padding scheme..

Could you explain ValidateAntiForgeryToken purpose and show me example about ValidateAntiForgeryToken

http://stackoverflow.com/questions/13621934/could-you-explain-validateantiforgerytoken-purpose-and-show-me-example-about-val

prevent any other type of data forgery or tampering based attacks. To use it decorate the action method or controller with the..

Getting incorrect decryption value using AesCryptoServiceProvider

http://stackoverflow.com/questions/14937707/getting-incorrect-decryption-value-using-aescryptoserviceprovider

decryption implementation there are a lot of side channel attacks related to modifying the ciphertext. However the problem your..

CryptographicException: Padding is invalid and cannot be removed and Validation of viewstate MAC failed

http://stackoverflow.com/questions/1821243/cryptographicexception-padding-is-invalid-and-cannot-be-removed-and-validation

try to hack test my pages. from the same ip I have and dos attacks I modify the function LoadPageStateFromPersistenceMedium that..

Alternative to “Allow service to interact with desktop”?

http://stackoverflow.com/questions/2345620/alternative-to-allow-service-to-interact-with-desktop

their interactive desktops in different sessions. Shatter attacks are the main reason why this 'interaction with desktop' was..

Algorithm to avoid SQL injection on MSSQL Server from C# code?

http://stackoverflow.com/questions/249567/algorithm-to-avoid-sql-injection-on-mssql-server-from-c-sharp-code

for fields that match any of these could reveal delayed attacks or vulnerabilties. Also logging ip banning email alerts etc.. code not just code that uses the database. Sql injection attacks specifically do rely on error messages however and so it's desirable..

Why is ValueType.GetHashCode() implemented like it is?

http://stackoverflow.com/questions/3841602/why-is-valuetype-gethashcode-implemented-like-it-is

when some of the users are mounting denial of service attacks against the table provider are beyond the scope of this discussion...

How can a Windows Service start a process when a Timer event is raised?

http://stackoverflow.com/questions/4516200/how-can-a-windows-service-start-a-process-when-a-timer-event-is-raised

other sessions. This is intended to isolate services from attacks that originate in application code. Hence no UI shown by a service..

Will using LINQ to SQL help prevent SQL injection

http://stackoverflow.com/questions/473173/will-using-linq-to-sql-help-prevent-sql-injection

against the most common cause of SQL injection attacks. Also see Eliminate SQL Injection Attacks Painlessly with LINQ..

Using a self-signed certificate with .NET's HttpWebRequest/Response

http://stackoverflow.com/questions/526711/using-a-self-signed-certificate-with-nets-httpwebrequest-response

like to just connect to the API anyway man in the middle attacks be damned. So how do I go about adding an exception for this..

The call stack does not say “where you came from”, but “where you are going next”?

http://stackoverflow.com/questions/6595473/the-call-stack-does-not-say-where-you-came-from-but-where-you-are-going-next

are obviously much more resistant to stack smashing attacks by malware because the return address is nowhere near the data...

Large WCF web service request failing with (400) HTTP Bad Request

http://stackoverflow.com/questions/784606/large-wcf-web-service-request-failing-with-400-http-bad-request

is so low is to reduce the risk of Denial of Service DoS attacks. You need to set it bigger than the maximum request size on.. If you're in an Intranet environment the risk of DoS attacks is probably low so it's probably safe to use a value much higher..

Which cryptographic hash function should I choose?

http://stackoverflow.com/questions/800685/which-cryptographic-hash-function-should-i-choose

for identification. MD5 however is vulnerable to collision attacks SHA1 is also vulnerable but to a lesser degree. Under what conditions.. created following SHA1. Currently there are no known attacks against SHA2 functions. SHA256 384 and 512 are all part of the..

How to write a scalable Tcp/Ip based server

http://stackoverflow.com/questions/869744/how-to-write-a-scalable-tcp-ip-based-server

Queue the next accept think this should be here stop attacks based on killing the waiting listeners _serverSocket.BeginAccept.. Queue the next accept think this should be here stop attacks based on killing the waiting listeners _serverSocket.BeginAccept..

Regular expression for validating names and surnames?

http://stackoverflow.com/questions/888838/regular-expression-for-validating-names-and-surnames

etc... . To get an idea of the incredible variety of attacks that can be used take a look here http ha.ckers.org xss.html..

Authentication Service using WCF

http://stackoverflow.com/questions/9584198/authentication-service-using-wcf

it should have a time component in it to prevent replay attacks. I'd suggest some something like hash value token issue time..