December, 2005

  • .NET Security Blog

    Happy Holidays

    It's that time of year again when most of the offices around Microsoft start going dark, and I'll be adding 42/2221 to that list for the next couple of weeks as I head off to New York for Christmas. My traditional check shows that I should...
  • .NET Security Blog

    What Do You Want to See in Crypto / ClickOnce?

    Now that Whidbey's out the door, it's time to look at what we want to do in future releases. If you've run into any issues with the crypto classes or with ClickOnce let me know! You can leave comments here or file requests in the MSDN Product Feedback...
  • .NET Security Blog

    New and Improved Security in the .NET Framework 2.0

    To add to our other lists of "What's New in Whidbey Security", Rudolph Araujo and Shanit Gupta have a nice roundup of new security features posted on the Microsoft .NET Framework Developer Center. They've got them categorized, summarized, and provide...
  • .NET Security Blog

    Process Requires FullTrust

    The Process class has a LinkDemand and an InheritenceDemand for FullTrust on it. This means that if your assembly is not fully trusted, it will be unable to kick off new Processes or get information about running processes. One implication is that assemblies...
  • .NET Security Blog

    Authenticode and Assemblies

    The general concepts of Authenticode signing an assembly are well understood -- they mostly correlate directly to the standard Win32 concept of a signed catalog. However, there are a few places where managed code plays differently, and sometimes these...
  • .NET Security Blog

    A Look at the Xbox 360 CPU Design

    Jeffery Brown has posted his paper on the Xbox 360 CPU Design from the Fall Processor Forum over on IBM's DeveloperWorks. Since I have my degree in hardware design , I always find these types of things interesting. While this paper is at a relatively...
  • .NET Security Blog

    CryptEncrypt and RSACryptoServiceProvider::Encrypt

    The RSACryptoServiceProvider class provides two methods, Encrypt and Decrypt which seem to be the managed counterparts to CAPI's CryptEncrypt and CryptDecrypt functions. However, if you try to encrypt using CAPI and decrypt using managed code, you'll...
Page 1 of 1 (7 items)