October, 2006

  • .NET Security Blog

    The Differences Between Rijndael and AES

    • 9 Comments
    When you need to write managed code that encrypts or decrypts data according to the AES standard, most people just plug the RijndaelManaged class in and go on their way. After all, Rijndael was the winner of the NIST competition to select the algorithm...
  • .NET Security Blog

    Using Lightweight CodeGen from Partial Trust

    • 0 Comments
    Last time I talked about the new Orcas feature allowing you to use reflection from partial trust . Specifically we talked about standard reflection and Reflection.Emit, putting off Lightweight CodeGen until today. Before we start, if you're new to...
  • .NET Security Blog

    XML Digital Signature Verification with Unknown URI Schemes

    • 0 Comments
    A few years back, there was a discussion thread on one of my XML digital signature posts about verifying an XML digital signature which had references to a URI prefixed with cid:. Recently Mattias Lindberg ran into this problem as well, and devised a...
  • .NET Security Blog

    Quickly Testing Code Under Different Cultures

    • 1 Comments
    Earlier this week, a situation came up where we needed to make sure a new feature worked when it was used with a non-English culture. Normally we'd run some tests on a Japanese machine, but one wasn't readily available at the time. Instead, I put together...
  • .NET Security Blog

    Kenny Kerr Explores UAC

    • 0 Comments
    Kenny Kerr , one of our Security MVPs, has updated his Windows Vista for Developers series with Part4 - User Account Control. Kenny takes an in-depth look at what UAC means for developers and covers areas that a lot of other sources don't touch on, such...
Page 1 of 1 (5 items)