Browse by Tags

Tagged Content List
  • Blog Post: Moving to Windows 2008: smartcard slow performance?

    Suppose you have a web application which authenticates clients through a smartcard certificate and everything is working fine, then you decide to move your web application to Windows Server 2008 (which is a good decision in many ways ) but your users are suddenly complaining about slow performance, pages...
  • Blog Post: When Vista denies you access to “your” files…

    For my work I have two desktops and a laptop I always bring with me, and  despite all the online synchronization tools out there ( SkyDrive , FolderShare , Groove , Mesh etc…) I’m used to SyncToy to keep my important files and folders updated across the three machines; The same is true for my backup...
  • Blog Post: Remember to undo your impersonation

    A couple of weeks ago I got an interesting query from a customer, whom had a problem impersonating a service user account by code; the design was a bit more complicated, though: Impersonation not set in web.config By code they needed to impersonate the account logged on the client issuing the HTTP request...
  • Blog Post: Security bug in Vista recovery console? Well... not quite...

    My colleague Feliciano Intini (Chief Security Advisor here at Microsoft Italy) just pointed me to his post were he comments about a news which is (re)spreading across the web about a security hole in the recovery console in Windows Vista: if you can read Italian here is the post , otherwise go on an...
  • Blog Post: Code Access Security hosting control in IE

    PROBLEM You have a Windows Forms component hosted in Internet Explorer, and you want to catch events raised by this control from client side scripting; to avoid security errors at runtime, the control must have "Allow calls to unmanaged assemblies" permission. if you do this, you'll notice that this...
Page 1 of 1 (5 items)