《為Windows Vista編寫安全的代碼》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
TinyLogin is a suite of tiny Unix utilities for handling logging into,
being authenticated by, changing one s password for, and otherwise
maintaining users and groups on an embedded system. It also provides
shadow password support to enhance system security. TinyLogin is, as the
name implies, very small, and makes an excellent complement to BusyBox
on an embedded System. It can be used without BusyBox, of course, but I
envision them being used together most of the time.
A distributed, peer-to-peer, server-less communication & messaging solution for JAVA (JMS), C++ and .NET applications, integrates with JBoss, WebLogic & WebSphere. Offers guaranteed delivery, security and transactions. Supports TCP, SSL & HTTP protocols
Apache 2.0.63 is the current stable version of the 2.0 series, and is recommended over any previous 2.0 release. This release fixes a few potential security vulnerabilites.
The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enables the Java(TM) platform to host applications on any computer or operating system without rewriting or recompiling. Anyone interested in designing a language or writing a compiler for the Java virtual machine must have an in-depth understanding of its binary class format and instruction set. If you are programming with the Java programming language, knowledge of the Java virtual machine will give you valuable insight into the Java platform s security capabilities and cross-platform portability. It will increase your understanding of the Java programming language, enabling you to improve the security and performance of your programs.
微軟DNS服務器遠程溢出漏洞測試代碼
Microsoft DNS Server Remote Code execution Exploit and analysis
Advisory: http://www.microsoft.com/technet/security/advisory/935964.mspx
This remote exploit works against port 445 (also Microsoft RPC api used)
* Mario Ballano ( mballano~gmail.com )
* Andres Tarasco ( atarasco~gmail.com )
As information technology is more and more in-depth and wide range of applications, management information system has been gradually implemented in the technical maturity. Management Information System is a continuous development of new disciplines. Library Management System is a typical management information system (MIS), the development includes the background of the establishment and maintenance of database and front-end application development aspects. Database requested data consistency, integrity and the security of the data, and front-end applications require complete functions, such as easy-to-use.
After analysis, I chose companies MICROSOFT VISUAL BASIC and Access prospects were as database development tools and background. With the provision of the various object-oriented development tools, in particular the data window convenient and simple objects developed intelligent customer satisfaction systems.