Related Reading
ARTICLES
RAIN FOREST PUPPY
"NT Web Technology Vulnerabilities"
Phrack Magazine, December 25, 1998, Vol. 8, Issue 54BOOKS
MICHAEL HOWARD, MARC LEVY, AND RICHARD WAYMIREDesigning Secure Web-Based Applications for Microsoft Win...
table.downloadBox {
width: 100%;
border: solid 1px #666;
border-collapse: collapse;
}
table.downloadBox th {
background: #276C9F;
padding: 3px;
color: #fff;
font-size: 14px;
text-align: center;
}
...
Component security has a couple terms you need to understand. Windows authentication refers to the authentication services that Windows 2000 performs for you. For instance, if user Ken logs in to a Web application with Basic or Integrated security...
The Microsoft Servers Web site (http://www.microsoft.net/servers) lists SQL Server 2000 as one of the company's new .NET Enterprise Servers. How can this be, considering that Microsoft developed and released this latest version of SQL Server...
No one likes it. No one talks about it. We live in denial of the heap building in the corner, but eventually we must deal with the garbage. I'm writing about component memory management—not the stack of pizza boxes that collected in the dark...
If you don't know about Microsoft's Software Assurance (SA) program, now's the time to start learning. This fall, SA is coming to a SQL Server near you...
A US Senate committee is currently debating the ability of individual companies to self-regulate Internet privacy. The question is whether more legislation will better control what companies collect and disseminate of an online user's private...
In my June 21 commentary, I discussed SQL Server 2000 Service Pack 1 (SP1) and shared some thoughts about service packs in general. I heard from many readers who disagreed with my advice. Crafty consultants never admit they were wrong. Let's just...