In this article, you’ll drill deeper into the details of how an assembly is hosted by the CLR and come to understand the relationship between the application domain (appdomain) and processes. The appdomain, in a nutshell, comprises logical segments within a given process that host a set of related […]
In the previous article, we learnt about the runtime capabilities of an IOS App written in Objective-C which uses the Cocoa framework. In this article, we will look at how we can use a very essential tool named Cycript to analyze and modify the runtime of an IOS […]
Traditional intrusion detection systems have always relied on protocol specific analysers to extract the context of the traffic stream. Basically, an intrusion detection system checks for the pattern of packets running inside the network, checking for any anomalous behaviour in the stream of packets running within the network. Traditional […]
The OWASP Top 10 list publicizes the most critical web application security flaws as determined by Open Web Application Security Project (OWASP), a nonprofit, vendor-independent IT security organization formed in 2001. In this article, we preview the 2013 edition of this popular security resource. (This review is based on […]
In this article, you will learn how to create and manipulates Delegate types as well as C# events, which streamline the process of working with delegates types. Delegates provide a mechanism for defining and executing callbacks. Their flexibility allows you to define the exact signature of the callback, and […]
In order to overcome physical limitations of wired connections, a lot of us prefer wireless connections. It reminds me of when I had my Sony PlayStation 1, and then my neighbor’s kid would always disconnect my control pads when I was at a critical point in a game. It […]
In the previous articles, you have learned about Windows Authentication and Code Access Security. This article’s objective is to further understanding of Form Authentication mechanism in ASP.NET. The developer typically creates a custom authentication mechanism to validate a user name and password against a custom store such as own […]
Have you ever checked out an IOS app and thought it was cool, and wondered if you could find some information about the source code of the app, the third-party libraries it uses, or how the code is designed internally? Have you ever wondered if it was possible to […]
In this article series, we will be learning about the tools and techniques required to perform penetration testing and Vulnerability assessment on IOS Applications.
Jailbreaking your device
If you are serious about IOS security, then having a jailbroken device is a must. In this section, we will look at how we […]
The .NET framework caters to different types of authentication mechanisms to use within your applications – —including basic authentication, digest authentication, forms authentication, Passport, and Integrated Windows authentication. You also can develop your own custom authentication mechanisms; for instance, Windows authentication that matches web users to Windows user accounts […]
The recent major vulnerability CVE-2013-0027 flooded almost all versions of Microsoft Internet Explorer and affected operating systems like Windows XP, Vista, 7, and 8, including all the major server versions too. Some thirteen privately reported vulnerabilities were recently resolved in a security bulletin by Microsoft.
The vulnerability, now marked as […]
In this article, I would like to present the risks associated with hosting your site on a shared hosting server. I often correlate it with the analogy, “a chain is only as strong as its weakest link”. In a similar way, if your site is hosted on a shared […]
In the previous article, we’ve covered how to implement security in procurement process and vendor contracts. There are 3 different aspects to managing vendors:
We have covered Product procurement & Product support in the previous article; however, this leaves one more important aspect –Services. Also called Managed Services […]
Every organization has a procurement process. Some of the software products acquired by an organization are COTS (Commercial off The Shelf) Solutions. These products are not built or developed in house by the organization. While some of these products need to be customized to fit into the client environment, […]
Dealing with Production Data is a challenge, but most organizations around the world have safeguards in place which secure the production environment properly.However,when it comes to non-production environments like Dev (Development) environment or Test Environment etc., they still do not have proper security in place. Protecting sensitive data is […]
This article explores the core C# programming language constructs by presenting numerous stand-alone concepts such as data types, constants, iterations and conditional statements. This chapter describes on the various data type proposed by .NET frameworks. This chapter also investigates the various loops constructs in depth and takes a closer […]
In this period, security firms are publishing detailed reports on analysis conducted on principal cyber threats detected in 2012, the results proposed present a landscape dominated by explosion of menaces, especially for mobile and social media users.
Mobile technology has grown more than any other in the last few years […]
Software developers have struggled to create software components that can be called remotely over local networks and the Internet. In this process, several technologies came into light but some of them were not quite successful enough due to many limitations and hurdles such as communicating over an unreliable Internet, […]
ADO.NET uses a multilayer architecture that has components such as the Connection, Reader, Command, Adapter and DataSet objects. ADO.NET introduced data providers that are a set of special classes to access a specific database, execute SQL commands and retrieve data. Data providers are extensible; developers can create their own […]
Nunit.exe latest version 2.6 can download from here: http://nunit.org/index.php?p=download.
The installation process hardly takesa few minute to be completed once the executable is downloaded. The NUnit graphical user interface looks like as following after the installation process is complete.
After launching the NUnit.exe GUI, it is time to open a […]