|
FAT file system, Fundamental Lockdown Principles, Format Disk Drives Using NTFS
file permissions, Format Disk Drives Using NTFS
file-based attacks, File-Based or Directory-Based Attacks, Enforce Canonical Filenames
file-sharing software, Remove File-Sharing Software
FileMon, Table 9-3: Test Tools
FileOpen function
code-access default for, It’s On By Default
isolated storage equivalent, Cooperating with the Security System
files
code-based security, Run Your Code in Different Security Zones
exceptions arising from problems with, Where Exceptions Occur
permissions, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones
Finally clauses, Try…Catch or On Error GoTo
firewalls, Step 9: Secure the Network with a Firewall
design considerations, Step 9: Secure the Network with a Firewall
installing, Install a Firewall
locking down, need for, “I’m Already Protected. I’m Using a Firewall.”
purpose of, Step 9: Secure the Network with a Firewall
recommended, If You Do Nothing Else…
Windows integrated security with, Windows Integrated Security Authentication
fixes for attacks, deploying, Prepare for a Response
folders
OS security permissions for, OS Security Restrictions Preempt Everything
footprinting, Take the Attacker’s View
Form collection, Web Application Input, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)
Forms authentication, ASP.NET
best use for, ASP.NET Authentication in the Real World
Config file for, Forms Authentication
cookies for, Forms Authentication
defined, Table 4-1: Authentication Types for ASP.NET Applications
encryption for, Forms Authentication
FormsAuthentication class, Forms Authentication
setting, Forms Authentication
FormsIdentity objects, The Identity and Principal Objects, Chapter 2: Role-Based Authorization
frmAddNew sample form, Employee Management System
frmDashboard sample form, Employee Management System
frmLogin sample form, Employee Management System
frmManage sample form, Employee Management System
frmMyInto sample form, Employee Management System
frmRemoveUser sample form, Employee Management System
Full Rights model, Microsoft Access User-Level Security Models
Full Trust
limits of, Security Zones and Trust Levels
permissions under, Security Zones and Permissions, Table 3-3: Full Trust Permissions Granted to My Computer Zone
functions
buffer overrun vulnerability, Buffer Overrun
vulnerability, Create Scenarios Based on Inroads for Attack
|