Index_F


F

FAT file system, Fundamental Lockdown Principles, Format Disk Drives Using NTFS

file permissions, Format Disk Drives Using NTFS

file-based attacks, File-Based or Directory-Based Attacks, Enforce Canonical Filenames

file-sharing software, Remove File-Sharing Software

FileMon, Table 9-3: Test Tools

FileOpen function

code-access default for, It’s On By Default

isolated storage equivalent, Cooperating with the Security System

files

code-based security, Run Your Code in Different Security Zones

exceptions arising from problems with, Where Exceptions Occur

permissions, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones

Finally clauses, Try…Catch or On Error GoTo

firewalls, Step 9: Secure the Network with a Firewall

design considerations, Step 9: Secure the Network with a Firewall

installing, Install a Firewall

locking down, need for, “I’m Already Protected. I’m Using a Firewall.”

purpose of, Step 9: Secure the Network with a Firewall

recommended, If You Do Nothing Else…

Windows integrated security with, Windows Integrated Security Authentication

fixes for attacks, deploying, Prepare for a Response

folders

OS security permissions for, OS Security Restrictions Preempt Everything

footprinting, Take the Attacker’s View

Form collection, Web Application Input, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)

Forms authentication, ASP.NET

best use for, ASP.NET Authentication in the Real World

Config file for, Forms Authentication

cookies for, Forms Authentication

defined, Table 4-1: Authentication Types for ASP.NET Applications

encryption for, Forms Authentication

FormsAuthentication class, Forms Authentication

setting, Forms Authentication

FormsIdentity objects, The Identity and Principal Objects, Chapter 2: Role-Based Authorization

frmAddNew sample form, Employee Management System

frmDashboard sample form, Employee Management System

frmLogin sample form, Employee Management System

frmManage sample form, Employee Management System

frmMyInto sample form, Employee Management System

frmRemoveUser sample form, Employee Management System

Full Rights model, Microsoft Access User-Level Security Models

Full Trust

limits of, Security Zones and Trust Levels

permissions under, Security Zones and Permissions, Table 3-3: Full Trust Permissions Granted to My Computer Zone

functions

buffer overrun vulnerability, Buffer Overrun

vulnerability, Create Scenarios Based on Inroads for Attack




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net