Developing applications that use system types and collections

  • Use the CausesValidation property of the ImageButton class to set a value to indicate whether validation is performed on a Web server control when an ImageButton control is clicked.
  • Installation packages are created for deploying a Web application by using a Web Setup project. A merge module project is used for components to be added to the application.
  • Use the Web Setup project and Deployment project to create installation packages for the deployment of Web-based applications such as XML Web services, Web applications etc., to a Web server.
  • Use a RequiredFieldValidator control to check whether or not an input control contains a value.
  • Use a RegularExpressionValidator control to check whether or not the value entered into a form field matches the pattern specified by a regular expression.
  • Continue reading

General Security Concepts

    • Kerberos is an industry standard authentication protocol used to verify user or host identity.
    • Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization.
    • Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system.
    • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
    • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
    • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
    • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
    • Password Authentication Protocol (PAP) transmits user credentials as plaintext.
    • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.

Continue reading

e-business Infrastructure

  • File Transfer Protocol (FTP) is an Internet service that helps in transferring files from one computer to another over the Internet.
  • Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to-Point Tunneling Protocol (PPTP). It provides tunneling, address assignment, and authentication.
  • Virtual private network (VPN) uses a tunneling protocol to span public networks, such as the Internet, without security risk. VPN enables remote users to access corporate networks securely by using a tunneling protocol such as PPTP or L2TP.
  • TCP/IP is the primary protocol of the Internet.
  • SMTP uses port 25 by default.
  • Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol suite. It is responsible for the resolution of IP addresses to media access control (MAC) addresses of a network interface card (NIC).
  • FTP uses port 20 and 21 by default.
  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The TCP/IP protocol should be bound to the dial-up adapter for Internet access on a Windows 98 computer.
  • Continue reading