Related Reading
ARTICLES
RAIN FOREST PUPPY
"NT Web Technology Vulnerabilities"
Phrack Magazine, December 25, 1998, Vol. 8, Issue 54BOOKS
MICHAEL HOWARD, MARC LEVY, AND RICHARD WAYMIREDesigning Secure Web-Based Applications for Microsoft Win...
table.downloadBox {
width: 100%;
border: solid 1px #666;
border-collapse: collapse;
}
table.downloadBox th {
background: #276C9F;
padding: 3px;
color: #fff;
font-size: 14px;
text-align: center;
}
...
Component security has a couple terms you need to understand. Windows authentication refers to the authentication services that Windows 2000 performs for you. For instance, if user Ken logs in to a Web application with Basic or Integrated security...
The Microsoft Servers Web site (http://www.microsoft.net/servers) lists SQL Server 2000 as one of the company's new .NET Enterprise Servers. How can this be, considering that Microsoft developed and released this latest version of SQL Server...
No one likes it. No one talks about it. We live in denial of the heap building in the corner, but eventually we must deal with the garbage. I'm writing about component memory management—not the stack of pizza boxes that collected in the dark...