Click here to Skip to main content
Click here to Skip to main content
Add your own
alternative version

Top 10 Application Security Vulnerabilities in Web.config Files - Part One

, 3 May 2007 CPOL
In part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application.

Revisions


  

Compare Revision Minor Date Status Editor
2 - publicly available No 3-May-07 8:46 Available Smitha Vijayan
1 No 19-Aug-09 20:30 Composing Chris Maunder

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

Bryan_Sullivan
Web Developer
United States United States
Bryan Sullivan is a development manager at SPI Dynamics, a Web application security products company. Bryan manages the DevInspect and QAInspect Web security products, which help programmers maintain application security throughout the development and testing process. He has a bachelor's degree in mathematics from Georgia Tech and 12 years of experience in the information technology industry. Bryan is currently coauthoring a book with noted security expert Billy Hoffman on Ajax security, which will be published in summer 2007 by Addison-Wesley.

| Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.141223.1 | Last Updated 3 May 2007
Article Copyright 2007 by Bryan_Sullivan
Everything else Copyright © CodeProject, 1999-2014
Layout: fixed | fluid