|
DACL (Discretionary Access Control List), See also Win32 API security overview
accessing ACEs in directly, 408–411
ACE order in, 400, 435
functions for, 395, 396, 397, 399
getting/setting in registry, 431
obtaining privilege information, 414–417, 417
overview of, 390, 414
setting properties, 401, 401
Daemen, Joan, 440
Data Encryption Standard. See DES
data entry errors. See avoiding
data formats/types, defining, 63–64
data formatter/deformatter classes, 36
data, ordering/parsing, 64
data ranges, 53–55, 55, 442
data streams, 286, 301, 442
database security. See Web data security
DBMS (Database Management System), 264, 442–443
DCOM Configuration Tool, See also Win32 API advanced security
authentication levels, 436–437
component options, 435
default options, 434–435
defined, 432
dialog box tabs, 432–433
impersonation levels, 433–434
overview of, 212
starting, 432
uses, 432
warning, 434
DCOM (Distributed Component Object Model) protocol, See also COM+; LAN security
calling components from unmanaged code, 217–219
COM interface attributes, 214–215, 217
creating managed COM interfaces, 216–217
defined, 213, 444
GUIDs and, 215
overview of, 212, 213
security risks, 301
DDOS (denial-of-service) attacks, See also Web server security
defined, 253–254, 444
OOB messages and, 254
performance counters and, 254–258, 257
debugger attribute in SoapHttpClientProtocol class, 306, 307
debugging, remote, enabling, 238–241, 239–240
declarative security, See also code access security
defined, 443
defining effectively, 92
implementing permissions, 136–137
managing AD access, 353–354
overview of, 9, 19, 87
using Permission View Tool, 83–87, 86–87
reasons to use, 72, 73, 83, 92–93
decryption. See cryptography techniques
default code groups, 119–120, 119–120
default database values, 273
default DCOM configuration options, 434–435
default policies, 140
Default Web Site Properties dialog box, 238–239, 239, 294–295, 295
Delegate impersonation level, 434
Deny() method, 97
Der Keiler Web sites, 26, 58, 260
DES (Data Encryption Standard)
cracking, 185–186
defined, 442
overview of, 36, 180
TripleDES, 185, 186
deserialization, 280–281, 443
digital certificates. See CA; CAs; certificates, digital
digital rights management (DRM), 278
Digital Signature Algorithm (DSA), 36, 185, 186, 443
digital signatures, 72–73, 99, 153
directory services. See AD
DiscoveryClientProtocol class, 308, 310–312
Discretionary Access Control List. See DACL
distributed applications
defined, 443–444
using principal/identity objects in, 81–83, 82
security problems, 13–14, 16
Web services security and, 302
domain controllers, calling via Win32 API, 346–353, 352
domain trust relationships, 345–346, See also AD
domains, 444
domains, application, 6, 160, See also AppDomain class
Dotfuscator tool, 156–159, 156–159
DRM (digital rights management), 278
DSA (Digital Signature Algorithm), 36, 185, 186, 443
DTD (document type definition), 63
|