• .NET Security Blog

    MS.StrongName\VerificationResult.cs

    • 0 Comments
    1 using System; 2 3 namespace MS.StrongName 4 { 5 /// < summary > 6 /// Results of signature verification 7 /// </ summary > 8 public enum VerificationResult 9 { 10 /// < summary > 11 /// The assembly's signature did not verify 12 /...
  • .NET Security Blog

    MS.StrongName\Native\NativeMethods.cs

    • 1 Comments
    1 using System; 2 using System.Runtime.InteropServices; 3 4 namespace MS.StrongName.Native 5 { 6 /// < summary > 7 /// P/Invoke declarations for strong name APIs 8 /// </ summary > 9 internal static class NativeMethods 10 { 11 /// < summary...
  • .NET Security Blog

    MS.StrongName\Native\StrongNameInFlags.cs

    • 0 Comments
    1 using System; 2 3 namespace MS.StrongName.Native 4 { 5 /// < summary > 6 /// Input flags for use with the strong name verification functions 7 /// </ summary > 8 [Flags] 9 internal enum StrongNameInFlags : int 10 { 11 /// < summary >...
  • .NET Security Blog

    MS.StrongName\Native\StrongNameKeyGenFlags.cs

    • 0 Comments
    1 using System; 2 3 namespace MS.StrongName.Native 4 { 5 /// < summary > 6 /// Flags for use with strong name key gneeration methods 7 /// </ summary > 8 [Flags] 9 internal enum StrongNameKeyGenFlags : int 10 { 11 /// < summary > 12...
  • .NET Security Blog

    MS.StrongName\Native\StrongNameOutFlags.cs

    • 0 Comments
    1 using System; 2 3 namespace MS.StrongName.Native 4 { 5 /// < summary > 6 /// Flags output from the strong name verification functions 7 /// </ summary > 8 [Flags] 9 internal enum StrongNameOutFlags : int 10 { 11 /// < summary > 12...
  • .NET Security Blog

    msn\Command.cs

    • 0 Comments
    1 using System; 2 using System.Diagnostics; 3 4 namespace MS.StrongName.ManagedSN 5 { 6 /// < summary > 7 /// Handler for a specific command line option 8 /// </ summary > 9 /// < param name = "arguments" > List of all the...
  • .NET Security Blog

    msn\Commands.cs

    • 2 Comments
    1 using System; 2 using System.Diagnostics; 3 using System.Globalization; 4 using System.Text; 5 using MS.StrongName; 6 7 namespace MS.StrongName.ManagedSN 8 { 9 /// < summary > 10 /// Handler for each of the commands that the managed strong name...
  • .NET Security Blog

    msn\Log.cs

    • 0 Comments
    1 using System; 2 3 namespace MS.StrongName.ManagedSN 4 { 5 /// < summary > 6 /// Handles all I/O with the user 7 /// </ summary > 8 internal sealed class Log 9 { 10 private static bool quietMode = false ; 11 12 /// < summary > 13 /...
  • .NET Security Blog

    msn\msn.txt

    • 2 Comments
    1 # Error messages 2 BadFile=Invalid file specified: {0} 3 BadKeyContainer=Invakid key container specified: {0} 4 BadKeySize=Invalid key size specified: {0} 5 BadOperation=Error completing operation: {0} 6 CompareToNonCommand=Object must be of type Command...
  • .NET Security Blog

    msn\msn.cs

    • 0 Comments
    1 using System; 2 using System.Collections.Generic; 3 using System.Diagnostics; 4 using System.Globalization; 5 using System.IO; 6 using System.Reflection; 7 using System.Text; 8 9 namespace MS.StrongName.ManagedSN 10 { 11 /// < summary > 12 //...
  • .NET Security Blog

    Failing to Run in Partial Trust Gracefully

    • 2 Comments
    When you write an application that requires a high level of trust to run properly, when a user tries to run that application from a location that gives it lower levels of trust, they're greeted with a rather unfriendly unhandled SecurityException. This...
  • .NET Security Blog

    Refactoring the Managed StrongName Project

    • 1 Comments
    Looking over the Managed StrongName code for today's post, I've become dissatisfied with several things in the current code base, and I think that a bit of refactoring is in store for this project before its next addition. One of the major things is the...
  • .NET Security Blog

    Extracting Public Key Blobs

    • 2 Comments
    (Updated 12/3/04 for code refactoring ) Before letting another two months pass, its time to once again update the managed sn.exe port . Today's update adds three modes, each of which allow extraction of a public key blob from various sources: Flag Description...
  • .NET Security Blog

    Next Generation Hardware Speculation

    • 0 Comments
    Yesterday there were a couple of announcements that seem to impact the next generation of video game consoles. First, IBM, Sony and Toshiba announced that they will be making an announcement about the details of the Cell chip early next year. Not too...
  • .NET Security Blog

    Managed Hosting API Take 3: the Host SecurityManager

    • 4 Comments
    Now that we've examined how to customize the AppDomain creation process , lets go back to our EchoAppDomainManager and look at some other places the CLR lets a managed host customize its behavior. Looking back at the output of running HelloWorld with...
  • .NET Security Blog

    An Interesting Take On Two-Factor Authentication

    • 6 Comments
    (via Bruce Schneier ) Two banks in New Zealand are introducing an interesting form of two-factor authentication. Looks like anyone who tries to transfer $2,500 or more to a third party bank account via the website will be required to use their new technology...
  • .NET Security Blog

    What's the FullTrust List For Anyway?

    • 0 Comments
    Time for a quick break from managed hosting. I've been asked several times on this blog and in the newsgroups about the FullTrust list that the CLR keeps. What is it, and why does it exist? The reason for the list is due to a problem that exists when...
  • .NET Security Blog

    Customizing the AppDomain Creation Process

    • 8 Comments
    Last week, I posted about AppDomainManagers . Today, I'm going to look a little more closely at how the AppDomainManager allows you to customize the domain creation process. Specifically there are two methods that, when overridden, allow you to modify...
  • .NET Security Blog

    ZoneSandboxAppDomainManager.cs

    • 4 Comments
    1 using System; 2 using System.Reflection; 3 using System.Security; 4 using System.Security.Policy; 5 6 namespace AppDomainManagers 7 { 8 public sealed class ZoneSandboxAppDomainManager : AppDomainManager 9 { 10 private AppDomain internetDomain = null...
  • .NET Security Blog

    The Managed Hosting API

    • 12 Comments
    With v1.0 and v1.1 of the CLR, if you wanted to have much control over how the CLR was working under the covers, you needed to write an unmanaged host. The unmanaged hosting API still exists with Whidbey (in fact, its gotten quite a few improvements of...
  • .NET Security Blog

    Peter Torr Provides More Details on Sandboxing AppDomains

    • 3 Comments
    Peter Torr from the Visual Studio Tools for Office team recently expanded on my sandboxed AppDomain set of posts. Peter adds some aditional code to change the code base of the AppDomain, which prevents untrusted addin types from sneaking into the FullTrust...
  • .NET Security Blog

    Another Fix for the Infamous Calc Problem

    • 0 Comments
    Last month I wrote about replacing Calc with CalcPlus . If you'd really like to keep the default calculator around, I've stumbled across another fix for the problem. This involves editing the registry, so the standard disclaimers apply . Recall root of...
  • .NET Security Blog

    An Enhanced Version of the Sandboxed AppDomain

    • 14 Comments
    Last week I showed how to create an AppDomain with a limited set of permissions . I also presented an easy way to create a StrongNameMembershipCondition . Now I'll put the two together to make an enhanced version of the sandboxed AppDomain. Why create...
  • .NET Security Blog

    David Starts Blogging

    • 1 Comments
    David Notario has started up a blog ... he's one of the x86 JIT devs, and (since his office is right next door), is always the guy I go to when I need an issue about how the x86 JIT or the x86 JIT verifier works. His first post covers the phases of JIT...
  • .NET Security Blog

    Easily Creating a StrongNameMembershipCondition for an Assembly

    • 3 Comments
    Taking a break from sandboxing in an AppDomain for a minute, lets take a look at another aspect of policy. One situation that comes up very frequently when trying to execute code in a limited-trust sandbox is that there are some assemblies that you do...
Page 10 of 15 (368 items) «89101112»