Click here to Skip to main content
13,356,787 members (85,572 online)

Articles by Bryan_Sullivan (Articles: 6)

Articles: 6

RSS Feed

Average article rating: 3.75

Posted: 28 Sep 2006   Updated: 28 Sep 2006   Views: 22,220   Rating: 3.11/5    Votes: 3   Popularity: 1.48
Licence: Not specified      Bookmarked: 30   Downloaded: 0
Learn more about securing your website's AJAX programming.
Web Security
Posted: 2 May 2007   Updated: 3 May 2007   Views: 63,490   Rating: 4.20/5    Votes: 26   Popularity: 5.92
Licence: The Code Project Open License (CPOL)      Bookmarked: 95   Downloaded: 0
In part one of this two part article, you will learn about five of the top ten “worst offenders” of misconfigurations of application security that can cause overall problems for ASP.NET Web-based applications. Learn more about how to secure the Web.config files of an ASP.NET application.
Posted: 22 May 2007   Updated: 22 May 2007   Views: 50,280   Rating: 4.79/5    Votes: 19   Popularity: 6.12
Licence: The Code Project Open License (CPOL)      Bookmarked: 84   Downloaded: 0
In this second part of a two-part series, you will learn about application security issues related to authentication and authorization, as well as five vulnerabilities commonly found in ASP.NET web-based applications.
Design and Architecture
Posted: 31 Aug 2006   Updated: 31 Aug 2006   Views: 19,870   Rating: 1.90/5    Votes: 7   Popularity: 1.61
Licence: The Code Project Open License (CPOL)      Bookmarked: 8   Downloaded: 0
Learn about the best practices that should be followed when creating error messages, including important guidelines that should be taken into consideration.
Posted: 19 Oct 2006   Updated: 19 Oct 2006   Views: 95,090   Rating: 4.50/5    Votes: 17   Popularity: 5.46
Licence: The Code Project Open License (CPOL)      Bookmarked: 36   Downloaded: 1
While many developers are aware of the threats posed by malicious code, and by SQL injection attacks in particular, there are other forms of code injection that are equally dangerous. Learn more about XPath injection, LDAP injection, and command execution injection, and view examples of each type.
Posted: 11 Jan 2007   Updated: 11 Jan 2007   Views: 49,450   Rating: 4.00/5    Votes: 7   Popularity: 3.38
Licence: The Code Project Open License (CPOL)      Bookmarked: 20   Downloaded: 0
A brute force attack, also known as a dictionary attack, is one of the more uncomplicated attacks available to a hacker. However, the odds of this type of attack succeeding can be very high if a site is not configured properly.
No blogs have been submitted.
No tips have been posted.
No reference articles have been posted.

Web Developer
United States United States
Bryan Sullivan is a development manager at SPI Dynamics, a Web application security products company. Bryan manages the DevInspect and QAInspect Web security products, which help programmers maintain application security throughout the development and testing process. He has a bachelor's degree in mathematics from Georgia Tech and 12 years of experience in the information technology industry. Bryan is currently coauthoring a book with noted security expert Billy Hoffman on Ajax security, which will be published in summer 2007 by Addison-Wesley.

Advertise | Privacy |
Web03 | 2.8.180111.1 | Last Updated 23 Jan 2018
Copyright © CodeProject, 1999-2018
All Rights Reserved. Terms of Service
Layout: fixed | fluid