Geeks With Blogs
Welcome to
Geeks with Blogs
Login
Chris J. Breisch
My Other Recent Posts
Denis Gobo's SQL Teaser #5
Fairness Doctrine Watch
ClickOnce in FireFox
Don't Run as an Admin, yada, yada, yada
Silently Installing .NET
Incremental Search
SQL Myth: Truncate Cannot Be Rolled Back Because It Is Not Logged
What's Going to Happen in "Harry Potter and the Deathly Hallows"?
Roy Osherove's Tips for a Successful Team Lead
Publishing Exec 'Steals' Google Laptops in Demonstration at BookExpo
Post Categories
HTML5
CSS3
JavaScript
JQuery
Web Application
contest
book
free
TypeScript
Programming
Enum
touch
Archives
July 2007 (17)
June 2007 (6)
May 2007 (24)
April 2007 (18)
March 2007 (14)
February 2007 (15)
November 2006 (21)
October 2006 (47)
September 2006 (67)
August 2006 (60)
May 2006 (21)
April 2006 (33)
March 2006 (23)
February 2006 (55)
January 2006 (44)
October 2005 (30)
September 2005 (31)
August 2005 (25)
July 2005 (14)
June 2005 (26)
May 2005 (12)
April 2005 (13)
December 2004 (2)
July 2004 (2)
June 2004 (15)
May 2004 (3)
Chris Breisch
.NET Data Practices
Search this Blog!
<< Building a Better WaitScreen
|
Home
|
Prioritizing Software Requirements >>
How Tos for .NET
Comments
|
Share
A great set of “HOWTO”’s from the p&p group at Microsoft. They cover quite a bit of territory:
How To: Call a Web Service Using Client Certificates from ASP.NET
How To: Call a Web Service Using SSL
How To: Create a Custom Account to Run ASP.NET
How To: Create a Custom Encryption Permission
How To: Create a DPAPI Library
How To: Create an Encryption Library
How To: Create GenericPrincipal Objects with Forms Authentication
How To: Configure the Machine Key in ASP.NET 2.0
How To: Connect to SQL Server Using SQL Authentication in ASP.NET 2.0
How To: Connect to SQL Server Using Windows Authentication in ASP.NET 2.0
How To: Create a Service Account for an ASP.NET 2.0 Application
How To: Create a Threat Model for a Web Application at Design Time
How To: Encrypt Configuration Sections in ASP.NET 2.0 Using DPAPI
How To: Encrypt Configuration Sections in ASP.NET 2.0 Using RSA
How To: Harden the TCP/IP Stack
How To: Host a Remote Object in a Windows Service
How To: Implement IPrincipal
How To: Implement Kerberos Delegation for Windows 2000
How To: Implement Patch Management
How To: Improve Security When Hosting Multiple Applications in ASP.NET 2.0
How To: Instrument ASP.NET 2.0 Applications for Security
How To: Perform a Security Code Review for Managed Code (Baseline Activity)
How To: Perform a Security Deployment Review for ASP.NET 2.0
How To: Prevent Cross-Site Scripting in ASP.NET
How To: Protect Forms Authentication in ASP.NET 2.0
How To: Protect From Injection Attacks in ASP.NET
How To: Protect From SQL Injection in ASP.NET
How To: Secure Your Developer Workstation
How To: Set Up SSL on a Web Server
How To: Set Up Client Certificates
How To: Store an Encrypted Connection String in the Registry
How To: Use ADAM for Roles in ASP.NET 2.0
How To: Use Authorization Manager (AzMan) with ASP.NET 2.0
How To: Use Code Access Security in ASP.NET 2.0
How To: Use Code Access Security Policy to Constrain an Assembly
How To: Use DPAPI (Machine Store) from ASP.NET
How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services
How To: Use Forms Authentication with Active Directory
How To: Use Forms Authentication with Active Directory in ASP.NET 2.0
How To: Use Forms Authentication with Active Directory in Multiple Domains in ASP.NET 2.0
How To: Use Forms Authentication with SQL Server 2000
How To: Use Forms Authentication with SQL Server in ASP.NET 2.0
How To: Use Health Monitoring in ASP.NET 2.0
How To: Use IISLockdown.exe
How To: Use Impersonation and Delegation in ASP.NET 2.0
How To: Use IPSec for Filtering Ports and Authentication
How To: Use IPSec to Provide Secure Communication Between Two Servers
How To: Use Medium Trust in ASP.NET 2.0
How To: Use Membership in ASP.NET 2.0
How To: Use the Microsoft Security Baseline Analyzer
How To: Use the Network Service Account to Access Resources in ASP.NET
How To: Use Protocol Transition and Constrained Delegation in ASP.NET 2.0
How To: Use Regular Expressions to Constrain Input in ASP.NET
How To: Use Role-based Security with Enterprise Services
How To: Use Role Manager in ASP.NET 2.0
How To: Use SSL to Secure Communication with SQL Server 2000
How To: Use URLScan
How To: Use Windows Authentication in ASP.NET 2.0
Posted on Thursday, March 9, 2006 5:27 AM
.NET Development
|
Back to top
Related Posts on Geeks With Blogs
Matching Categories
Benefits of customized .NET Application Developmen...
.NET development
APIMASH CNorris Windows 8 VB Starter Kit
.NET Development
Carolina Code Camp 2013: Introduction to SharePoin...
.NET Development
I’m presenting “Modern Web Development...
.NET Development
Windows 8 Developer Camp - Raleigh September 25th
.NET Development
Comments on this post: How Tos for .NET
No comments posted yet.
Your comment:
Title:
Name:
Email: (never displayed)
(will show your
gravatar
)
Comment:
Allowed tags: blockquote, a, strong, em, p, u, strike, super, sub, code
Verification:
Copyright © Chris J. Breisch | Powered by:
GeeksWithBlogs.net
Popular Posts on Geeks with Blogs
0
Code Monkey Projectiles - Index
Geeks With Blogs Content Categories
ASP.Net
SQL Server
Apple
Google
SharePoint
Windows
Visual Studio
Team Foundation Server
Agile
Office
Design Patterns
Web
Azure
Brand New Posts on Geeks with Blogs
0
How do you run multiple instances of Microsoft Teams?
Need Something to Do over the Break? How About 25 Free JavaScript Courses?
Benefits of Apple Cider Vinegar
Shaking down the Raspberry Pi 400
Blog is Moving