Search results

From Guidance Share

You searched for Contents

Jump to: navigation, search

For more information about searching Guidance Share, see Searching Guidance Share.

Showing below 43 results starting with #1.


View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).

Article title matches

  1. Encrypt the contents of the authentication cookies. (548 bytes)
    3: Encrypt the cookie contents even if you are using SSL. This prevents an attac...

Page text matches

  1. ASP.NET 1.1 Security Checklist (14,144 bytes)
    215: *** List Folder Contents
    219: *** List Folder Contents
    230: *** List Folder Contents
  2. Web Application Security Design Guidelines (6,669 bytes)
    77: ...ign Guidelines - Session Management | Encrypt the contents of the authentication cookies.]]
  3. Encrypt sensitive cookie state. (513 bytes)
    3: ...zed manipulation, use cryptography to encrypt the contents of the cookie.
  4. Encrypt the contents of the authentication cookies. (548 bytes)
    3: Encrypt the cookie contents even if you are using SSL. This prevents an attac...
  5. Explained: Forms Authentication in ASP.NET 2.0 (22,615 bytes)
    12: == Contents ==
  6. Command Injection (2,343 bytes)
    9: ...pper around the UNIX command cat which prints the contents of a file to standard out. It is also injectable:...
    23: Used normally, the output is simply the contents of the file requested:
  7. Missing Parameter (1,945 bytes)
    34: *Confidentiality: Contents of memory could be disclosed to an attacker.
  8. Countermeasures (4,794 bytes)
    106: * Encrypt the contents of the authentication cookies.
    112: * Encrypt the contents of authentication cookies.
  9. Web Application Security Design Inspection Checklist (7,684 bytes)
    88: * The contents of authentication cookies are encrypted.
  10. Web Application Security Design Guidelines - Parameter Manipulation (2,621 bytes)
    5: ...zed manipulation, use cryptography to encrypt the contents of the cookie.
  11. Web Application Security Design Guidelines - Session Management (2,743 bytes)
    11: == Encrypt the contents of the authentication cookies ==
    12: Encrypt the cookie contents even if you are using SSL. This prevents an attac...
  12. .NET Framework 2.0 Security Guidelines - Registry (4,026 bytes)
    56: ... the encrypted data from registry and decrypt the contents
  13. How To: Perform a Security Deployment Review for ASP.NET 2.0 (56,007 bytes)
    235: This is important to ensure that cookie contents are not read and not tampered with. Cookies can b...
    538: ...nd integrity checked. This makes certain that the contents of the cookie cannot be viewed or modified withou...
  14. Security Design Principles (5,583 bytes)
    75: ...ign Principles - Session Management | Encrypt the contents of the authentication cookies.]]
  15. Security Design Principles - Input/Data Validation (10,607 bytes)
    86: ...zed manipulation, use cryptography to encrypt the contents of the cookie.
  16. Security Design Principles - Session Management (2,003 bytes)
    8: == Encrypt the Contents of the Authentication Cookies ==
    9: Encrypt the cookie contents even if you are using SSL. This prevents an attac...
  17. How To Protect from Injection Attacks in ASP.NET 2.0 (29,942 bytes)
    23: Contents
  18. How To Perform a Security Deployment Inspection for ASP.NET 2.0 (56,007 bytes)
    235: This is important to ensure that cookie contents are not read and not tampered with. Cookies can b...
    538: ...nd integrity checked. This makes certain that the contents of the cookie cannot be viewed or modified withou...
  19. .NET 2.0 Performance Guidelines - What's New in 2.0 (75,048 bytes)
    910: //set contents of file into a string
    912: //set contents of file into textbox
    915: //set contents of file into a string
    918: //set contents of file into a string
  20. .NET 2.0 Performance Guidelines - Collections (6,858 bytes)
    69: Use for instead of foreach (C#) to iterate the contents of arrays or collections in performance critical ...
  21. .NET Framework 1.1 Performance Guidelines - Collections (6,857 bytes)
    69: Use for instead of foreach (C#) to iterate the contents of arrays or collections in performance critical ...
  22. .NET 2.0 Performance Guidelines - Exception Management (6,430 bytes)
    92: ... the original source of the exception because the contents of the call stack (such as local variables) are g...
  23. .NET Framework 1.1 Performance Guidelines - Exception Management (6,431 bytes)
    92: ... the original source of the exception because the contents of the call stack (such as local variables) are g...
  24. .NET 2.0 Performance Guidelines - Finalize and Dispose (16,989 bytes)
    44: String contents = myFile.ReadToEnd()
    45: '... use the contents of the file
    55: string contents = myFile.ReadToEnd();
    56: //... use the contents of the file
    64: string contents = myFile.ReadToEnd();
  25. .NET Framework 1.1 Performance Guidelines - Finalize and Dispose (16,961 bytes)
    44: String contents = myFile.ReadToEnd()
    45: '... use the contents of the file
    55: string contents = myFile.ReadToEnd();
    56: //... use the contents of the file
    64: string contents = myFile.ReadToEnd();
  26. .NET 2.0 Performance Guidelines - Iterating and Looping (5,456 bytes)
    115: Use for instead of foreach (C#) to iterate the contents of arrays or collections in performance critical ...
  27. .NET Framework 1.1 Performance Guidelines - Iterating and Looping (5,456 bytes)
    115: Use for instead of foreach (C#) to iterate the contents of arrays or collections in performance critical ...
  28. Web Application Performance Design Guidelines - Deployment (13,332 bytes)
    100: ...t across partitions. For example, you ask for the contents of user A's shopping cart but do not ask to show ...
  29. How To Improve Serialization Performance (15,605 bytes)
    9: Contents
  30. Performance Design Principles - Deployment (13,332 bytes)
    100: ...t across partitions. For example, you ask for the contents of user A's shopping cart but do not ask to show ...
  31. How To Use EIF (19,168 bytes)
    354: To view the contents of the Windows Event Log, use the Event Viewer pr...
  32. .NET Framework 1.1 Performance Guidelines - Class Design Considerations (7,558 bytes)
    97: ...estrict the way the compiler reads and writes the contents of the field. The compiler generates the code tha...
  33. .NET Framework 2.0 Performance Inspection Questions - Threading (2,136 bytes)
    16: ...estrict the way the compiler reads and writes the contents of the fields. Volatile fields are not meant for ...
  34. Code Example Template (10,856 bytes)
    5: * ''Contents''
  35. How To Template (7,661 bytes)
    5: * ''Contents''
    100: === Contents ===
  36. Web Services Security Frame (11,921 bytes)
    64: ... refers to protecting a message by converting the contents to cipher-text using cryptographic methods.
    74: ...nfirm the source of the message and detect if the contents have been tampered with (i.e. authentication and ...
  37. Chapter 6 – Managing an Agile Performance Test Cycle (32,265 bytes)
    129: ... of performance builds, a rough estimate of their contents, and an estimate of how much time to expect betwe...
  38. Application Architecture Guide - Chapter 5 - Deployment Patterns (32,278 bytes)
    90: ...t across partitions. For example, you ask for the contents of user A’s shopping cart but do not ask to sho...
  39. Application Architecture Guide - Chapter 13 - Service Layer Guidelines (38,079 bytes)
    396: ...each message to the correct consumer based on the contents of the message; such as existence of fields, spec...
  40. Application Architecture Guide - Chapter 18 - Services (48,537 bytes)
    78: ...Construction'' || * Not appreciating that message contents may be time-sensitive
  41. Application Architecture Guide - Chapter 21 - SharePoint Line-Of-Business (LOB) Applications (27,885 bytes)
    125: * Consider caching the contents of a list to a '''DataTable''' or '''DataSet''' i...
  42. Application Architecture Guide - Cheat Sheet - Presentation Technology Matrix (29,332 bytes)
    216: * Updating page contents requires a full postback and page refresh.
    248: * Updating page contents requires a full postback and page refresh.

View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).



Search in namespaces:

List redirects
Search for
Views
Personal tools