Dan Sellers's WebLog

A Passion for .NET Security

Browse by Tags

Tagged Content List
  • Blog Post: SQL Server 2005 Security for Developers Webcast for on-demand viewing is available

    The on-demand Webcast of SQL Server 2005 for Developers, conducted on March 22, 2006, by Rob Walters--Program Manager, SQL Server Security-- and I, is now available for on-demand viewing . Post Notes from this Webcast can be found at my blog . Look forward to seeing everyone for next week webcast...
  • Blog Post: Post Webcast’s Notes: Securing SQL Server 2005 for Developers

    This morning was a jammed filled session covering off a lot of changes made to Microsoft SQL Server 2005. Over the last few weeks we talk exclusively about Front End security issues such as Input trust and the creation of a Development and Design environment to better emulate your production environment...
  • Blog Post: Code Scanning Tools' WebCast for on-demand viewing is available

    The on-demand version of the Visual Studio 2005 and Code Scanning Tools, conducted on March 15, 2006,by Kevin Lam and I, is now available for on-demand viewing . Look forward to seeing everyone for next week webcast .
  • Blog Post: Webcast's Post Notes: Visual Studio 2005 and Code Scanning Tools

    In today’s webcast we had the opportunity to explore the buffer overrun attack in depth which is considered one of the worst vulnerabilities that exist. Any code that is written in C or C++ --without proper security code reviews--on any platform is susceptible to buffer overrun. It is becoming easier...
  • Blog Post: On Demand WebCast: Least Privilege Development and New System.Security Features

    The latest Webcast "Least Privilege Development and New System.Security Features" which is part two of a five part series on examining the new security features and tools incorporated in Visual Studio 2005 and .NET Framework 2.0 is now ready for on-demand viewing and download .
  • Blog Post: Answer to the Trivial Question

    The answer to the trivial question from my blog based upon the March 8, 2006 WebCasts “Least Privilege Development and New System.Security Features” is below: Question: The KeyInfo element can consist of either a <KeyName/> or a <RetrievalMethod/> child element. What is the purpose...
  • Blog Post: WebCast's Notes: Least Privilege and New System.Security Features

    In today’s Webcast we first started off with a continuation from last week . Last week we explored how to setup a development and design environment that closely emulates your production environment to make your testing more effective and efficient. This was accomplished by enabling Debug in Zone and...
  • Blog Post: Partial Trust Development WebCast's Recording is now available for on-demand viewing

    Last Wednesday--March 1, 2006--I delivered part one of my five part WebCasts ' series on the new tools and Security features in Visual Studio 2005 or .NET Framework 2.0. The recording of Part one--Partial Trust Development--is now available for viewing .
  • Blog Post: The Code Room: BREAKING INTO VEGAS!

    The Code Room is online ½ hour TV show focusing on developers and the programming challenges that they face. The latest show, in a very, very cool way, will demonstrate the impact of a hacked environment (a casino in the show) that has been penetrated and compromised by a group of hackers. More...
  • Blog Post: SECURITY ON THE BRAIN Webcast Series

    Wow! We currently have 1800 people registered for Security on the Brain Webcasts . There is still room, so if you want to learn more about developing secure software using Visual Studio 2005 and .NET Framework 2.0 then these five sessions for one hour every Wednesday, starting March 1, 2006 are for you...
Page 1 of 1 (10 items)