Browse by Tags

Tagged Content List
  • Blog Post: Silverlight 3.0 Datagrid - How to change a cell state?

    Hi Syam Pinnaka, Sr. SDE in Infosec tools team. Silverlight 3.0 datagrid can be used to bind to any enumerable collection and display the data in the grid. The data changes in the grid can be propagated back to the bound data using a special type in silverlight called ObservableCollection. We will discuss...
  • Blog Post: How To: Use CAT.NET 2.0 Beta

    Syed Aslam Basha here. I am a tester on the Information Security Tools Team responsible for testing CAT.NET. You can download the current Beta of CAT.NET 2.0 from https://connect.microsoft.com/site734/Downloads/DownloadDetails.aspx?DownloadID=26086&wa=wsignin1.0 * You must have Visual studio 2010...
  • Blog Post: How To: Use CAT.NET V2.0 Beta

    Syed Aslam Basha here. I am a tester on the Information Security Tools Team responsible for testing CAT.NET. You can download the current Beta of CAT.NET 2.0 from https://connect.microsoft.com/site734/Downloads/DownloadDetails.aspx?DownloadID=26086&wa=wsignin1.0 * You must have Visual studio 2010...
  • Blog Post: CAT.NET 2.0 - Beta

    Mark Curphey here… Please to announce a beta of the upcoming CAT.NET 2.0. This beta program will last for approximately 1 month.  The final released version is scheduled to release shortly after VS 2010 RTM.   The goal of this beta program is to garner feedback from the user community...
  • Blog Post: How To: View The Header of an EXE/DLL

    Syed Aslam Basha here. I am a tester on the Information Security Tools Team. At times we may want to know the target platform (i.e. x86 or x64) of an EXE/DLL. Visual studio provides a corflags.exe tool to identify the target platform. Launch visual Studio command prompt in admin mode Type CorFlags Assembly...
  • Blog Post: Delay Between Actions Feature in CUIT

    Syed Aslam Basha here. I am a tester on  the Information Security Tools Team. The CUIT code is executed at a very fast pace, at times you may want to execute the code a bit slow or with a delay between actions. We have playback API which helps to achieve this as shown below; Playback .PlaybackSettings...
  • Blog Post: How To: Data Drive CUIT Scripts

    Syed Aslam Basha here. I am a tester on  the Information Security Tools Team. One of the major feature for any automation tool is support for data driven test cases, CUIT too supports data driven testing. Let me show an example of data driving CUIT scripts. Suppose you want to validate login feature...
  • Blog Post: How To: Customize CUIT scripts

    Syed Aslam Basha here. I am a tester on  the Information Security Tools Team. In the previous blog posts I have shown how to automate functional test cases using CUIT and adding check points/ assertions to CUITs. Lets see with an example “how to customize the CUIT scripts”. Lets take a close look...
  • Blog Post: How Do I: Configure Runtime Version

    Syed Aslam Basha here. I am a tester on  the Information Security Tools Team. At times I need to test an application with different versions of the .NET framework. You can configure the application config file to force the application to use the .NET version specified in the config file. For example...
  • Blog Post: How To: Add Assertions in Coded UI Tests

    Syed Aslam Basha here. I am a tester on  the Information Security Tools Team. As continuation to my previous post, I want to show how to add assertions to coded UI test scripts. An example maybe that after launching a portal site you want to validate the user name. Press enter after this.UIMap.LaunchPortalSite...
  • Blog Post: Double Hop Windows Authentication with IIS Hosted WCF Service

    Hello, Randy Evans here.  I am a principal developer on the Information Security Tools Team.  In a recent project, we had a intranet web site that called an IIS hosted WCF service.  The WCF service, in turn, called a SQL Server Reporting Services (SSRS) web service. We wanted to utilize...
  • Blog Post: How To: Use VSTS Code Profiler

    Syed Aslam Basha here. I am a tester on the Information Security Tools team. This blog post is in continuation with website performance testing simplified blog post. The final step in performance testing is to narrow down the faulty code which is taking lot of time or memory or CPU usage. I will show...
  • Blog Post: Web Protection Library – CTP Release Coming Soon

    RV here... Over the last couple of months we have been actively developing the next version of Anti-XSS library and Security Runtime Engine (SRE). We have added new mitigations that go way beyond the original Cross Site Scripting (XSS) protections of the Anti-XSS Library hence the change in name to the...
  • Blog Post: SQL Server 2008 Security - Policy Example

    Hi, Gaurav Sharma here, I’m a developer with the Information Security Tools (IST) team. A few months ago I posted a blog, SQL Policy Based Management (PBM) and posted a follow up introductory “ How Do I” video on the same topic. Since then I’ve received a lot of feedback and questions regarding how to...
  • Blog Post: How to Manage a Product Backlog with Visual Studio Team System 2008

    Hi this is Marius Grigoriu, Program Manager of Risk Tracker and our BI system--which will both be introduced at a later time. Today I am going to share how I track and manage projects and requirements. Both my teams are Agile teams and use product backlogs to document requirements and to track progress...
  • Blog Post: Automating Windows Firewall Settings with C#

    Hi Vamsy here. I am a Developer in Information Security Tools Team. I have done some work on automating Windows Firewall settings using C# and wanted to share what I learnt. In this post, I am going to demonstrate how to programmatically access the following features of Windows Firewall using C#. I have...
  • Blog Post: Automate Security Management for VSTF Source Control

    Kathy Shieh here. I am the dev lead for the Information Security Tools team in the US. Visual Studio Team Foundation server (VSTF)  provides a pretty good GUI interface for security management. Within the VSTF UI you can create custom roles, manage membership for each role and manage security for...
  • Blog Post: Implementation Ideas for the CAT.NET 2.0 Tainted Variable Analysis Algorithm

    Andreas Fuchsberger here….. Within the Information Security Tools Group we are now really getting into a redesign of our popular Code Analysis Tool for .NET (CAT.NET). One of the biggest challenges we have is to redesign the engine so that it no longer suffers from an out of memory condition when analyzing...
  • Blog Post: C# Compiler Optimization

    Gaurav Sharma here, I’m a developer with the Information Security Tools team. A couple of months back when I was trying to understanding the .NET compilation model I encountered an interesting thing. I created a small program to print an Int32 type array to a console. The code follows. 1: using System;...
  • Blog Post: Creating Multi-Level Navigational Menu with the ASP.NET Repeater Control and CSS Styles

    Syam Pinnaka here, I am a Senior Developer on the Information Security Tools team focused mainly on building identity management software using Microsoft Forefront Identity Manager (more info about FIM can be found here and well be talking about the work we do on FIM in future post) as well as the Security...
  • Blog Post: New Build of CAT.NET (Version - 1.1.1.9) – Please Upgrade

    Syed Aslam Basha here…..I am a tester on the Information Security Tools team. There is a new build of CAT.NET Version 1.1.1.9 now available for download on MSDN ( 32 bit here and 64 bit here ). We recommend *ALL* users upgrade to this latest release, a bug fix and minor improvements build. As well as...
  • Blog Post: Debugging Addins in Visual Studio

    Syed Aslam Basha here…..I am a tester on the Information Security Tools team. As such I often find myself needing to test new tools being developed that plug-in to Visual Studio. Most of us have probably done some debugging, but debugging an Add-in in Visual Studio poses some challenges. This is how...
Page 1 of 1 (22 items)