SlideShare uma empresa Scribd logo
1 de 75
MSDN Events – January 2008 ,[object Object],[object Object],[object Object]
Today’s Topics ,[object Object],[object Object],[object Object]
Today’s Schedule – Irvine, CA (am) ,[object Object],[object Object],[object Object]
Some Housekeeping… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BUSINESS AND TECHNICAL EXECUTIVES SMALL BUSINESS IT PROFESSIONALS IT DEVELOPERS PARTNERS ,[object Object],Information for small business decision makers who want to improve productivity, efficiency, and security in their workplace “ How-To” sessions delivering highly technical content -- direct from a Microsoft technology specialist with real-world experience ,[object Object],Designed for technology providers who are seeking to enhance technical knowledge, to improve selling skills and to learn about various programs and offers for partners.
What’s on in West Region ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HP Compaq dc7800 desktop PC  with Intel ®  Core ™ 2 Processor with vPro ™  Technology Special Offer: HP Compaq dc7800 Smart Buy*: Price:   $1,059.00 Save $340! www.hp.com/go/smartbuy Intel® Core™2 Duo processor E6550 2.33 GHz  4 MB L2 cache 1333 MHz front side bus  Intel Q35 Express Chipset 2 GB 667 MHz DDR2 SDRAM 160 GB 7200 rpm SATA 3 year warranty P/N: RU026UT *HP Smart Buys are the easiest way to get the most popular, expertly pre-configured,  ready-to-ship business solutions at discounted prices.
Promotional Offer ,[object Object],[object Object]
What’s new for developers  in IIS7
What Will We cover? ,[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object]
Architecture Overview HTTP Request HTTP Response Authentication Basic NTLM Anon CGI Static File ISAPI Send Response Compression Log HTTP Request Determine Handler aspnet_isapi.dll Authentication Windows ASPX Trace … Forms Map Handler HTTP Response Basic Anon Static File ISAPI Send Response Compression Log Execute Handler aspnet_isapi.dll Authentication Windows ASPX Trace … Forms Map Handler Authorization ResolveCache UpdateCache Authentication
Windows Activation Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hosting a WCF Service in WAS Demo
Configuration Files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring IIS Demo
Agenda ,[object Object],[object Object],[object Object]
Secure by Default ,[object Object],[object Object],[object Object],[object Object]
Authentication Modules Method Security Level How Passwords are Sent Crosses Proxy Servers and Firewalls Client Requirements Anonymous authentication  None N/A Yes Any Browser ASP.NET Impersonation Medium Obscured Yes .NET Basic authentication  Low Base64 encoded clear text Yes Most Browsers Digest authentication  Medium Hashed Yes IE 5.0 or later FORMS authentication  None Plain text Yes Windows authentication  High Hashed or Kerberos ticket No, unless over VPN IE 2.0 for NTLM/ W2K and IE 5.0 for Kerberos Certificate authentication  High N/A Yes, using a SSL connection IE and Netscape
Managing modules Demo
Agenda ,[object Object],[object Object],[object Object]
Type of Extensibility ,[object Object],[object Object],[object Object],[object Object]
Modules and Handlers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extending IIS with managed code Demo
Session Summary ,[object Object],[object Object],[object Object],[object Object]
Web Security Sidebars MSDN Events
What Will We cover? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.HelloSecureWorld.com ,[object Object],[object Object],[object Object],[object Object]
How To Build Secure Web Apps
Facets Of Web Security Web Security
5 Most Common Security Risks
Cross Site Scripting ,[object Object],[object Object],[object Object]
Cross Site Scripting ,[object Object],[object Object],[object Object]
Cross Site Scripting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cross Site Scripting ,[object Object],[object Object],[object Object]
Cross Site Scripting
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection
Integer Overflow ,[object Object],[object Object]
Integer Overflow ,[object Object],[object Object],[object Object],[object Object]
Preventing Integer Overflow ,[object Object],[object Object],[object Object],[object Object],[object Object]
Integer Overflow ,[object Object],[object Object],[object Object]
Integer Overflow
Cross Site Request Forgery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cross Site Request Forgery ,[object Object],[object Object],[object Object],[object Object]
Cross Site Request Forgery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cross Site Request Forgery ,[object Object],[object Object],[object Object]
Cross Site Request Forgery
Insecure  Direct Object Reference ,[object Object],[object Object],[object Object],[object Object]
Insecure Direct Object Reference ,[object Object],[object Object],[object Object],[object Object],[object Object]
Insecure  Direct Object Reference ,[object Object],[object Object],[object Object],[object Object],[object Object]
Insecure Direct Object Reference  ,[object Object],[object Object],[object Object],[object Object]
Insecure Direct Object Reference
Session Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For More Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extending ASP.NET  Application Services MSDN Events Winter, 2007
What Will We cover? ,[object Object],[object Object],[object Object]
Helpful Experience ,[object Object],[object Object],[object Object],[object Object],Level 200
Agenda ,[object Object],[object Object],[object Object]
The Provider Model ,[object Object],MembershipProvider:ProviderBase MySQLMembershipProvider:MembershipProvider Methods and Properties Overridden Methods and Properties Methods and Properties ProviderBase ,[object Object],[object Object]
Working with Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introducing Providers
Agenda ,[object Object],[object Object],[object Object]
Application Service Flexibility ASP.NET Silverlight Web Services SOAP Clients Application Services Ajax
Application Services with Ajax ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sharing Providers with Ajax and Silverlight
Agenda ,[object Object],[object Object],[object Object]
Services in Visual Studio 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using Application Services from a Rich Client
Session Summary ,[object Object],[object Object],[object Object],[object Object]
Thanks for attending! Lynn Langit  MSDN Developer Evangelist – Southern California http://blogs.msdn.com/SoCalDevGal

Mais conteúdo relacionado

Mais procurados

Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
 
Caja "Ka-ha" Introduction
Caja "Ka-ha" IntroductionCaja "Ka-ha" Introduction
Caja "Ka-ha" Introduction
yiming he
 
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Alvaro Sanchez-Mariscal
 

Mais procurados (20)

Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1
 
How Does Code Signing Works?
How Does Code Signing Works?How Does Code Signing Works?
How Does Code Signing Works?
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
OWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risksOWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risks
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
 
Caja "Ka-ha" Introduction
Caja "Ka-ha" IntroductionCaja "Ka-ha" Introduction
Caja "Ka-ha" Introduction
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scale
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 

Destaque

8.Integer Overflows
8.Integer Overflows8.Integer Overflows
8.Integer Overflows
phanleson
 
118015425 pengertian-filsafat-objek-material-dan-formal-filsafat
118015425 pengertian-filsafat-objek-material-dan-formal-filsafat118015425 pengertian-filsafat-objek-material-dan-formal-filsafat
118015425 pengertian-filsafat-objek-material-dan-formal-filsafat
Operator Warnet Vast Raha
 
Buffer Overflows
Buffer OverflowsBuffer Overflows
Buffer Overflows
Sumit Kumar
 

Destaque (20)

Hay necesidad de Comprar un camión?¿
Hay necesidad de Comprar un camión?¿Hay necesidad de Comprar un camión?¿
Hay necesidad de Comprar un camión?¿
 
JavaSecure
JavaSecureJavaSecure
JavaSecure
 
27 Jo P Mar 09
27 Jo P Mar 0927 Jo P Mar 09
27 Jo P Mar 09
 
Harnessing Stack Overflow for the IDE - RSSE 2012
Harnessing Stack Overflow for the IDE - RSSE 2012Harnessing Stack Overflow for the IDE - RSSE 2012
Harnessing Stack Overflow for the IDE - RSSE 2012
 
8.Integer Overflows
8.Integer Overflows8.Integer Overflows
8.Integer Overflows
 
Twist and write
Twist and writeTwist and write
Twist and write
 
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
System Hacking Tutorial #1 - Introduction to Vulnerability and Type of Vulner...
 
Grokking Signed Overflows
Grokking Signed OverflowsGrokking Signed Overflows
Grokking Signed Overflows
 
When good code goes bad
When good code goes badWhen good code goes bad
When good code goes bad
 
Too Long; Didn’t Watch! Extracting Relevant Fragments from Software Developme...
Too Long; Didn’t Watch! Extracting Relevant Fragments from Software Developme...Too Long; Didn’t Watch! Extracting Relevant Fragments from Software Developme...
Too Long; Didn’t Watch! Extracting Relevant Fragments from Software Developme...
 
Exploiting 101
Exploiting 101Exploiting 101
Exploiting 101
 
BKK16-503 Undefined Behavior and Compiler Optimizations – Why Your Program St...
BKK16-503 Undefined Behavior and Compiler Optimizations – Why Your Program St...BKK16-503 Undefined Behavior and Compiler Optimizations – Why Your Program St...
BKK16-503 Undefined Behavior and Compiler Optimizations – Why Your Program St...
 
118015425 pengertian-filsafat-objek-material-dan-formal-filsafat
118015425 pengertian-filsafat-objek-material-dan-formal-filsafat118015425 pengertian-filsafat-objek-material-dan-formal-filsafat
118015425 pengertian-filsafat-objek-material-dan-formal-filsafat
 
Media Files : Android's New Nightmare
Media Files :  Android's New NightmareMedia Files :  Android's New Nightmare
Media Files : Android's New Nightmare
 
Hta t19
Hta t19Hta t19
Hta t19
 
Microsoft GDI+ JPEG Integer Underflow Vulnerability
Microsoft GDI+ JPEG Integer Underflow VulnerabilityMicrosoft GDI+ JPEG Integer Underflow Vulnerability
Microsoft GDI+ JPEG Integer Underflow Vulnerability
 
Software Security
Software SecuritySoftware Security
Software Security
 
Buffer Overflows
Buffer OverflowsBuffer Overflows
Buffer Overflows
 
Chapter 1 computer abstractions and technology
Chapter 1 computer abstractions and technologyChapter 1 computer abstractions and technology
Chapter 1 computer abstractions and technology
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Semelhante a Jan 2008 Allup

Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
rajramab
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 

Semelhante a Jan 2008 Allup (20)

Web Application Scanning 101
Web Application Scanning 101Web Application Scanning 101
Web Application Scanning 101
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
 
It's a Dangerous World
It's a Dangerous World It's a Dangerous World
It's a Dangerous World
 
Meetup DotNetCode Owasp
Meetup DotNetCode Owasp Meetup DotNetCode Owasp
Meetup DotNetCode Owasp
 
Isset Presentation @ EECI2009
Isset Presentation @ EECI2009Isset Presentation @ EECI2009
Isset Presentation @ EECI2009
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
 

Mais de llangit

Mais de llangit (20)

3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7
 
2 Win7 For Devs Ux Touch Sensors
2 Win7 For Devs Ux Touch Sensors2 Win7 For Devs Ux Touch Sensors
2 Win7 For Devs Ux Touch Sensors
 
1 Win7 For Devs Fund Search
1 Win7 For Devs Fund Search1 Win7 For Devs Fund Search
1 Win7 For Devs Fund Search
 
3 Kodu
3 Kodu3 Kodu
3 Kodu
 
5 Digigirlz Xna
5 Digigirlz Xna5 Digigirlz Xna
5 Digigirlz Xna
 
4 Making Movies
4 Making Movies4 Making Movies
4 Making Movies
 
2 Digi Girlz Small Basic
2 Digi Girlz Small Basic2 Digi Girlz Small Basic
2 Digi Girlz Small Basic
 
1 Digi Girlz So Cal Databases Kims Final
1 Digi Girlz So Cal Databases Kims Final1 Digi Girlz So Cal Databases Kims Final
1 Digi Girlz So Cal Databases Kims Final
 
SQL Server 2008 Data Mining
SQL Server 2008 Data MiningSQL Server 2008 Data Mining
SQL Server 2008 Data Mining
 
SQL Server 2008 Data Mining
SQL Server 2008 Data MiningSQL Server 2008 Data Mining
SQL Server 2008 Data Mining
 
SQL Server 2008 for Developers
SQL Server 2008 for DevelopersSQL Server 2008 for Developers
SQL Server 2008 for Developers
 
SQL Server 2008 for .NET Developers
SQL Server 2008 for .NET DevelopersSQL Server 2008 for .NET Developers
SQL Server 2008 for .NET Developers
 
Tech Days09 Sqldev
Tech Days09 SqldevTech Days09 Sqldev
Tech Days09 Sqldev
 
Windows Azure for .NET Developers
Windows Azure for .NET DevelopersWindows Azure for .NET Developers
Windows Azure for .NET Developers
 
Introduction To Sql Services
Introduction To Sql ServicesIntroduction To Sql Services
Introduction To Sql Services
 
Making of GirlGamer
Making of GirlGamerMaking of GirlGamer
Making of GirlGamer
 
Kodu
KoduKodu
Kodu
 
DigiGirlz_SoCal_Databases
DigiGirlz_SoCal_DatabasesDigiGirlz_SoCal_Databases
DigiGirlz_SoCal_Databases
 
DigiGirlzSmallBasic
DigiGirlzSmallBasicDigiGirlzSmallBasic
DigiGirlzSmallBasic
 
Bi2008 Plus Cloud Preview
Bi2008 Plus Cloud PreviewBi2008 Plus Cloud Preview
Bi2008 Plus Cloud Preview
 

Último

Último (20)

Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Fixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxFixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptx
 
2999,Vashi Fantastic Ellete Call Girls📞📞9833754194 CBD Belapur Genuine Call G...
2999,Vashi Fantastic Ellete Call Girls📞📞9833754194 CBD Belapur Genuine Call G...2999,Vashi Fantastic Ellete Call Girls📞📞9833754194 CBD Belapur Genuine Call G...
2999,Vashi Fantastic Ellete Call Girls📞📞9833754194 CBD Belapur Genuine Call G...
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
 
GIFT City Overview India's Gateway to Global Finance
GIFT City Overview  India's Gateway to Global FinanceGIFT City Overview  India's Gateway to Global Finance
GIFT City Overview India's Gateway to Global Finance
 
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
CBD Belapur((Thane)) Charming Call Girls📞❤9833754194 Kamothe Beautiful Call G...
 
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
Virar Best Sex Call Girls Number-📞📞9833754194-Poorbi Nalasopara Housewife Cal...
 

Jan 2008 Allup

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. HP Compaq dc7800 desktop PC with Intel ® Core ™ 2 Processor with vPro ™ Technology Special Offer: HP Compaq dc7800 Smart Buy*: Price:   $1,059.00 Save $340! www.hp.com/go/smartbuy Intel® Core™2 Duo processor E6550 2.33 GHz 4 MB L2 cache 1333 MHz front side bus Intel Q35 Express Chipset 2 GB 667 MHz DDR2 SDRAM 160 GB 7200 rpm SATA 3 year warranty P/N: RU026UT *HP Smart Buys are the easiest way to get the most popular, expertly pre-configured, ready-to-ship business solutions at discounted prices.
  • 8.
  • 9. What’s new for developers in IIS7
  • 10.
  • 11.
  • 12. Architecture Overview HTTP Request HTTP Response Authentication Basic NTLM Anon CGI Static File ISAPI Send Response Compression Log HTTP Request Determine Handler aspnet_isapi.dll Authentication Windows ASPX Trace … Forms Map Handler HTTP Response Basic Anon Static File ISAPI Send Response Compression Log Execute Handler aspnet_isapi.dll Authentication Windows ASPX Trace … Forms Map Handler Authorization ResolveCache UpdateCache Authentication
  • 13.
  • 14. Hosting a WCF Service in WAS Demo
  • 15.
  • 17.
  • 18.
  • 19. Authentication Modules Method Security Level How Passwords are Sent Crosses Proxy Servers and Firewalls Client Requirements Anonymous authentication None N/A Yes Any Browser ASP.NET Impersonation Medium Obscured Yes .NET Basic authentication Low Base64 encoded clear text Yes Most Browsers Digest authentication Medium Hashed Yes IE 5.0 or later FORMS authentication None Plain text Yes Windows authentication High Hashed or Kerberos ticket No, unless over VPN IE 2.0 for NTLM/ W2K and IE 5.0 for Kerberos Certificate authentication High N/A Yes, using a SSL connection IE and Netscape
  • 21.
  • 22.
  • 23.
  • 24. Extending IIS with managed code Demo
  • 25.
  • 26. Web Security Sidebars MSDN Events
  • 27.
  • 28.
  • 29.
  • 30. How To Build Secure Web Apps
  • 31. Facets Of Web Security Web Security
  • 32. 5 Most Common Security Risks
  • 33.
  • 34.
  • 35.
  • 36.
  • 38.
  • 39.
  • 40.
  • 41.
  • 43.
  • 44.
  • 45.
  • 46.
  • 48.
  • 49.
  • 50.
  • 51.
  • 53.
  • 54.
  • 55.
  • 56.
  • 58.
  • 59.
  • 60. Extending ASP.NET Application Services MSDN Events Winter, 2007
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 67.
  • 68. Application Service Flexibility ASP.NET Silverlight Web Services SOAP Clients Application Services Ajax
  • 69.
  • 70. Sharing Providers with Ajax and Silverlight
  • 71.
  • 72.
  • 73. Using Application Services from a Rich Client
  • 74.
  • 75. Thanks for attending! Lynn Langit MSDN Developer Evangelist – Southern California http://blogs.msdn.com/SoCalDevGal