Tom Hollander's blog

patterns, practices and pontification

Browse by Tags

Tagged Content List
  • Blog Post: Using Windows Firewall to restrict access to Windows Azure instances

    Summary : If you ever have a need to restrict access to your Windows Azure deployment to known IP address ranges, you can do this by programmatically modifying the Windows Firewall. You’ll need to do this both at startup, and whenever your role topology changes, as the Windows Azure guest agent...
  • Blog Post: Protecting against XML Entity Expansion attacks

    One of the critical responsibilities of every developer and architect is to understand, and know how to prevent, as many kinds of security attacks as possible. While there are many types of attacks and many weapons at our disposal to thwart them, the most basic defence we have is input validation. The...
Page 1 of 1 (2 items)