Results for "Category: Security"
Users can submit their Username, password, and E-Mail address to register for your site! You can then use a password/username checker from this site to see if the logged in correctly!
A file that replaces the old coder.c. Thanks to Brett Taylor. Found at http://www.cprogramming.com/source.html
This code will take the users username and password from a form and use them to authenticate them against a Windows NT/2000 domain. Unlike other examples, you do not need to switch on 'Basic' or 'Integrated Windows' permissions for the webite on IIS. You can leave the setting as Anonymous Access.
This code will enum all groups and users currently available on your local machine the pure .NET way. There is no need of declaring some APIs.
Provides your site with security. A login and password, with the ability for the user to change their own password. It uses a DSN-less Access database so that you do not need to set up a DSN on the server.
*(UPDATED)* ADDED: -Code Re-written -Now updates file size if you no the file has been changed by a program. This program makes a list of all the .ini .sys and .com files on you hard-drive in the c:\windows directory and then calculates there size and keeps them in a log. and then every time the program starts it checks the file sizes against the logged ones to see if they differ, if they do then it tells you. I made this because virusses can sometimes alter files and hide inside them so this basicly keeps a eye on them..
This is an early version of the new password program I am working on, it saves Passwords to disk with very low level encryption and it allows you to call it with-In dos prompt with arguments. Please tell me what you think.
Have you ever fogot a password, but it is still inside your program, only that it is hidden with astricks? This source will show you how to remove those astricks and show whats really there. (see screenshot)
MyLogin is created entirely in ASP. With just a few simple steps you can password protect any of your pages without knowing how to code ASP (But it Helps!) You can assign individual access levels or you can assign Group access levels. You an also assign Expiration Dates on Groups or Individual Levels. MyLogin uses a DSNLess Access database so you will not have to set up an ODBC. Best of all MyLogin is absolutely FREE!
I took this code from MSDN's November Magazine and used it in many project of mine..Its very useful security measure. I did change it to make it more understandable for all you .net coders there. Zip file includes a type lib and an example project. Hope you guys find it useful.
Authenticates a user to make sure if they have previously logged into the site. Requires Session("UserID") to be populated. This usually represents the Users ID within a data base. (Users.UserID) If a user is not loged in, they are redirected to a page to attempt a login. This is useful when the ability to "Auto-Login" has been enabled to use previously saved login information in the users cookies. When a user is redirected to the login page, The URL they were attempting to view is passed along in the Query String along with the reason why they need to login. If the user was posting data to the protected page (perhaps a session timed out), then the previous page they were posting from is sent as the URL that the user is redirected to after they have successfully logged in. This is done to help reduce errors when visiting a page that expected posted form data.
Checks the HTTP Referer header to ensure people are not posting from other websites. You can include this file if you use templates on your website, or just include it on the pages that receive form data posts. Warning - someone who knows there stuff can get around this by modifying there HOST file. this isn't 100% fool proof, but it may deter most from posting data from other websites.
Requests users to login to website with NT Account.
Create new key pairs for asymmetric encryption or copy/paste strings into text fields provided. Encrypts and decrypts text to encrypted base64 strings. Main benefit here is I got around a problem with where the key was stored and can now load keys on the fly. Asymmetric keys are usually used to encrypt Session Keys and Digital Signatures. Session Keys are used with Symmetric Encryption on the Message itself because it is much faster then Assymetric encryption. This is great for anyone beginning to learn about Security or how to Implement RSA Public Key / Private Key Infrastructure.
*UPDATED* Now uses a more recursive and less pattern oriented algorithm. Basically encrypts a text type file using a simple recursive character shift techinque. Pretty basic, but powerful.
Security issues using ".inc" include files.
Cold Steel - Defender is a file encryption/decryption utility (using 3DES) that gives you the option to use a "USB Hard drive" as a secondary means of security in addition to just using a password. A USB drive is not required to use this program, but is suggested, as it will insure that only the person who knows the password -and- has the physical USB DRIVE can decrypt a file. Nothing is stored on your USB drive; we only extract some unique information from the USB drive and create a key from it.
***Disabling CTRL-ALT-DELETE on Windows NT, Windows 2000, and Windows XP*** There is an undocumented way to disable the Ctrl Alt Del key sequence on Windows NT/2000/XP using the registry. The key, 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon : AutoAdminLogon (REG_SZ)' has only two legal values, according to Microsoft: "0" and "1". 0 disables automatic logon of the account stored, and 1 enables it. The strange thing is that if you set the key to "2"...
The .NET Framework provides a rich set of permissions and security settings that (when used properly) ensures that your programs only do what their allowed to do. After searching for articles on security and permissions and finding virtually nothing here I decided to create this tutorial to explain the basic concepts. This simple tutorial explains how the Demand and Assert methods work. It also teach's you how to create a simple code group that grants a specific assembly more access to the system. Remember to vote!
A.L.F.G is a sort of anti-leech technical, which mainly based on Browser Referrer and Cookie checking technologies. The advantage of A.L.F.G identifying to others is that A.L.F.G process file requirement as a transparence file gateway, whereas other anti-leech technologies need to cooperate with additional files. Also, A.L.F.G record every leech attempt and traffic byte, those record and setting can be viewed or checked in a Integrated console which come with the A.L.F.G. FOR DEMO OR FUTURE VERSION RELEASE PLEASE REFER TO http://www.21code.com/alfgate/index.php Please Give Me Credit Where Credit Is Due! Thanks!