Monday, December 29, 2008

Connected Information Security Group

http://blogs.msdn.com/cisg/

Friday, December 26, 2008

Microsoft ACE

http://blogs.msdn.com/ace_team/

Thursday, December 25, 2008

Learning Manager

http://www.microsoft.com/learning/vstudio/2008/thankyou/default.mspx
Develop your career with Microsoft.NET
http://www.microsoft.com/learning/training/roadmap/default.mspx
Information For Developers
http://www.microsoft.com/learning/developer/default.mspx
MSDN Architecture Centre
http://msdn.microsoft.com/en-us/architecture/default.aspx
MSDN Forum
http://forums.microsoft.com/MSDN/default.aspx?SiteId=1
Authentication in ASP.NET
http://msdn.microsoft.com/en-us/library/ms978378.aspx
Download Details Pattern and Practices
http://www.microsoft.com/downloads/details.aspx?FamilyID=6724e09b-ca2e-425a-8d71-8febad3ba203&displaylang=en

CRM Roles

http://www.democrmonline.com/SecurityRoles/

Threat Modelling

http://blogs.msdn.com/threatmodeling/archive/2007/06/18/create-a-good-threat-model-in-10-simple-steps.aspx

Thursday, December 18, 2008

Important Web Security Links

http://technet.microsoft.com/en-us/security/default.aspx
http://www.microsoft.com/security/default.mspx
http://technet.microsoft.com/hi-in/security/cc297185(en-us).aspx
http://msdn.microsoft.com/en-us/library/ms998325.aspx
http://www.asp.net/learn/whitepapers/

http://msdn.microsoft.com/hi-in/library/ms995349(en-us).aspx


Locate Assemblies by Using DEVPATH

http://msdn.microsoft.com/en-us/library/cskzh7h6.aspx

Specifying an Assembly's Location

http://msdn.microsoft.com/en-us/library/4191fzwb.aspx


Disable Concurrent Garbage Collection

http://msdn.microsoft.com/en-us/library/at1stbec.aspx


Security Policy Management

http://msdn.microsoft.com/en-us/library/c1k0eed6.aspx


ASP.NET whitepapers

http://www.asp.net/learn/whitepapers/

Web Goats

Download books

http://www.lulu.com/content/1416452


Session Fixation

http://www.acros.si/papers/session_fixation.pdf


Authentication Diagram

http://cwe.mitre.org/documents/sources/WASCThreatClassificationTaxonomyGraphic.pdf


New Web Application Attacks and Protection.

http://www.nethemba.com/new_web_attacks-nethemba.pdf


CSRF

http://www.gnucitizen.org/blog/cross-site-request-forgery/


Http Response splitting.

http://www.securiteam.com/securityreviews/5WP0E2KFGK.html

Google Search Operators

http://www.googleguide.com/advanced_operators.html


Format String attack

http://muse.linuxmafia.org/lost+found/format-string-attacks.pdf


Secure SDLC

https://buildsecurityin.us-cert.gov/daisy/bsi/articles/knowledge/sdlc/326-BSI.html

Application Security Firewall - ModSecurity

https://www.owasp.org/images/7/78/OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf

ASP.NET Forums

http://forums.asp.net/

The economics of Ecommerce

http://www.conerlyconsulting.com/ecommerce.pdf

Rolling Your Own Website Administration Tool

http://aspnet.4guysfromrolla.com/articles/052307-1.aspx

Sunday, June 15, 2008

Module Window in VS 2008

To Open the Module window in VS 2008 press ctrl+Alt+U.

Saturday, May 17, 2008

Friday, May 16, 2008

Validation in Dropdown

To validate a dropdown list simply put the InitialValue="0" in the requiredfieldvalidator.

Friday, May 09, 2008

Finding the DLL using CLSID

Open Regedit (Run -> "regedit"), move to the key:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSIDAnd perform a search for the given CLSID.

Monday, April 21, 2008

Dynamically number rows in SQL Statement

select rank() OVER (ORDER BY a.au_lname, a.au_fname) as rank, a.au_lname, a.au_fname from authors a order by rank

Courtesy: http://support.microsoft.com/kb/186133

JAD Session

"JAD stands for Joint Application Development. It's one of those software engineering techniques that some folks with lots of time on their hands sat around and dreamed up. Sit down with the client and design a paper UI that they can see what the application will look like and behave like. Give the user a chance to work through common scenarios and see if the application will work for them. Keep refining until the user feels the application is doing what they want it to do. As you get functionality implemented, bring the user in and have them work through those scenarios and see if it still works. If they want a change, have a solid estimate of how long the change will add to the schedule and how much it will cost. I've shipped plenty of very successful applications following these simple rules. I never bothered with JAD or anything else, just treated the clients like I wanted to be treated and kept them clearly in the decision loop.
"
Courtesy: http://expertanswercenter.techtarget.com/eac/knowledgebaseAnswer/0,295199,sid63_gci986072,00.html

Thursday, March 13, 2008

Technology Tips

Minimize a Window to your taskbar
If you’re tired of using the mouse over and over again to minimize a window, here’s a handy tip. To minimize a window using just the keyboard, press Alt, Spacebar and N together.

More Tips : http://computing.in.msn.com/