Click here to Skip to main content
Click here to Skip to main content
Add your own
alternative version
Go to top

Top 10 Application Security Vulnerabilities in Web.config Files - Part One

, 3 May 2007
In part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application.
No downloads associated with this content

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

Bryan_Sullivan
Web Developer
United States United States
Bryan Sullivan is a development manager at SPI Dynamics, a Web application security products company. Bryan manages the DevInspect and QAInspect Web security products, which help programmers maintain application security throughout the development and testing process. He has a bachelor's degree in mathematics from Georgia Tech and 12 years of experience in the information technology industry. Bryan is currently coauthoring a book with noted security expert Billy Hoffman on Ajax security, which will be published in summer 2007 by Addison-Wesley.

| Advertise | Privacy | Mobile
Web04 | 2.8.140916.1 | Last Updated 3 May 2007
Article Copyright 2007 by Bryan_Sullivan
Everything else Copyright © CodeProject, 1999-2014
Terms of Service
Layout: fixed | fluid