<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-904470033638481177</id><updated>2024-11-21T23:30:18.572+01:00</updated><category term="security"/><category term="ASP.NET"/><category term="AppSec"/><category term="Ninja tricks"/><category term="Privacy"/><category term="fail"/><category term="Windows 7"/><category term=".NET"/><category term="Azure"/><category term="Browser security"/><category term="Firefox"/><category term="Google"/><category term="WIF"/><category term="server 2008"/><category term="Authentication"/><category term="Configuration"/><category term="Facebook"/><category term="IIS 7.5"/><category term="TLS"/><category term="server 2003"/><category term="vulnerability"/><category term="NWebsec"/><category term="Talks"/><category term="TransformTool"/><category term="VS2010"/><category term="XSS"/><category term="clickjacking"/><category term="Android"/><category term="Chrome"/><category term="Doh"/><category term="IE"/><category term="Opera"/><category term="Safari"/><category term="encoding"/><category term="nuffsaid"/><category term="Finnish disco"/><category term="Java"/><category term="MSSDL"/><category term="Passwords"/><category term="Session fixation"/><category term="VSOnline"/><category term="firesheep"/><category term="floppydisk"/><category term="iphone4"/><category term="logparser"/><category term="rsac"/><category term="youarenext"/><title type='text'>The .NET n00b</title><subtitle type='html'>Software security blog by André N. Klingsheim, who&#39;s learning to love .NET and Microsoft servers.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>76</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-5638497215945366195</id><published>2015-10-01T17:33:00.000+02:00</published><updated>2015-10-01T17:33:21.701+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Doh"/><title type='text'>When you just can&#39;t copy autorun.inf</title><summary type="text">
I just ran into a weird problem while creating a bootable USB-stick, it was impossible to do a full copy of the files from an .iso. I tried robocopy, xcopy, and even resorted to a file copy through the file explorer. Robocopy consistently reported the following error though:

2015/10/01 17:10:49 ERROR 5 (0x00000005) Copying File g:\autorun.infAccess is denied.
It turned out that the antivirus </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/5638497215945366195/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2015/10/when-you-just-cant-copy-autoruninf.html#comment-form' title='472 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/5638497215945366195'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/5638497215945366195'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2015/10/when-you-just-cant-copy-autoruninf.html' title='When you just can&#39;t copy autorun.inf'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>472</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-8322899832500396982</id><published>2014-04-24T23:51:00.000+02:00</published><updated>2014-04-24T23:51:40.489+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="VSOnline"/><title type='text'>NUnit and Visual Studio Online</title><summary type="text">Visual Studio Online looks pretty cool so I’ve decided that I&#39;ll use it for the next NWebsec release. The project setup was relatively straightforward and painless, but I hit a speed bump when I ran the first build of NWebsec.

The first build was successful, but it didn’t run the unit tests. The build log contained the following warning:

No test found. Make sure that installed test discoverers </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/8322899832500396982/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2014/04/nunit-and-visual-studio-online.html#comment-form' title='211 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/8322899832500396982'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/8322899832500396982'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2014/04/nunit-and-visual-studio-online.html' title='NUnit and Visual Studio Online'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtP7xe_ZlgtIG0ML94ZCcpVZgMN6S0RaZwZGHiw7VQQKhul0vIM8RSyzLnBNIh4N5gNa6MK3yv0Sx_6pvmqnhPWwADQfbIYVJPblCSjnsvWBQoXxbc53t4CgjybP36RcEOLldcbwId3u0C/s72-c/build.PNG" height="72" width="72"/><thr:total>211</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-1383079067722383355</id><published>2013-10-13T15:39:00.000+02:00</published><updated>2015-02-16T21:30:35.045+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Azure"/><category scheme="http://www.blogger.com/atom/ns#" term="Configuration"/><category scheme="http://www.blogger.com/atom/ns#" term="IIS 7.5"/><category scheme="http://www.blogger.com/atom/ns#" term="MSSDL"/><category scheme="http://www.blogger.com/atom/ns#" term="NWebsec"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="server 2008"/><category scheme="http://www.blogger.com/atom/ns#" term="TLS"/><title type='text'>Hardening Windows Server 2008/2012 and Azure SSL/TLS configuration</title><summary type="text">



I guess it was long
overdue for me to follow up on my Hardening Windows Server 2003 SSL/TLS configuration and Windows server 2003 vs 2008, SSL/TLS comparison posts. They
were two of my very first blog posts and they still receive a
decent amount of traffic. The world has fortunately moved forward since then,
so in this blog post we’ll have a look at the default configuration of recent
Windows</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/1383079067722383355/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2013/10/hardening-windows-server-20082012-and.html#comment-form' title='963 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1383079067722383355'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1383079067722383355'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2013/10/hardening-windows-server-20082012-and.html' title='Hardening Windows Server 2008/2012 and Azure SSL/TLS configuration'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIQ6kQUv3siyG1IrYFco76Bjsp-70RmaMZi96TOtSpU29SOUvkQUBTC5lRhwu9C58sQyPsFOlu-o9-wNKty0jd-Pd5ZVcCehImJiRi-7ok2QIyPCx2gPYtz4CcGM7fmQ7JaP4bCYR-MRYx/s72-c/ssllabs_a_rating.png" height="72" width="72"/><thr:total>963</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-8404920427180431439</id><published>2013-09-14T23:50:00.000+02:00</published><updated>2013-09-14T23:50:14.089+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Azure"/><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><title type='text'>The &quot;Unable to remove directory &quot;bin\Release\app.publish\&quot; Azure packaging error</title><summary type="text">Just a quick note on an error I often run into when I&#39;m working on my Azure applications. I usually create Azure packages and upload them by hand through the Azure management portal. Ever so often I get the following error when I create the package in Visual Studio (2012).

Unable to remove directory &quot;bin\Release\app.publish\&quot;. Access to the path &#39;AzureStartupTest.Azure.cspkg&#39; is denied. 
&amp;nbsp;</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/8404920427180431439/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2013/09/the-unable-to-remove-directory.html#comment-form' title='168 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/8404920427180431439'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/8404920427180431439'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2013/09/the-unable-to-remove-directory.html' title='The &quot;Unable to remove directory &quot;bin\Release\app.publish\&quot; Azure packaging error'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>168</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-2272928393756110113</id><published>2013-07-17T02:50:00.000+02:00</published><updated>2013-11-07T22:22:54.242+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="NWebsec"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Session fixation"/><title type='text'>Ramping up ASP.NET session security</title><summary type="text">OWASP recently released their Top Ten 2013 list of web application vulnerabilities. If you compare the list to the 2010 version you’ll see that Broken Authentication and Session Management&amp;nbsp;has moved up to second place, pushing Cross Site Scripting (XSS) down to third place. Apparently authentication and session related issues are moving up in the world!

It’s not that surprising, there’s so </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/2272928393756110113/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2013/07/ramping-up-aspnet-session-security.html#comment-form' title='241 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/2272928393756110113'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/2272928393756110113'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2013/07/ramping-up-aspnet-session-security.html' title='Ramping up ASP.NET session security'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg08wrT53ZTTQzo1Cb7tG9nWOVhBM9vDWRRmVP2rl4YlIjD55uMhFFkCwtu6GgrNSknSF8GlkA4XeHu6Oe1Yp4b2MoX1cl7NXq3lezMy5HcIiz3yYpYf1iwKUHSlWNMpxdPYVPYJg6jIR2Y/s72-c/session_fixation1.png" height="72" width="72"/><thr:total>241</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-4147091770044819952</id><published>2013-06-29T17:50:00.000+02:00</published><updated>2013-09-28T15:42:00.747+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><title type='text'>Outlook.com, custom domains, and ActiveSync</title><summary type="text">Microsoft&#39;s widely used e-mail service Hotmail was recently overhauled and rebranded Outlook.com. One of the less known services they provide is the support for custom domains. A couple of months ago, I was looking for a new (preferably free) e-mail service for my personal domain. It turned out Outlook.com had everything I needed!

To set up a custom domain, you&#39;ll first have to log in to the </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/4147091770044819952/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2013/06/outlookcom-custom-domains-and-activesync.html#comment-form' title='167 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4147091770044819952'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4147091770044819952'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2013/06/outlookcom-custom-domains-and-activesync.html' title='Outlook.com, custom domains, and ActiveSync'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEZx4HbsqrVgcGJNqWOAHPX6giJWh-8ymZoTBxOGPrOfhYd1C-1dqXpyDdy5xIG2LmrLcnymwXs658HfIvL_fTO3X6H_RpAT7LfQFsJc2EwVGaNLT1PBJmwKdFAK27M88UnvHcuGnAp_33/s72-c/Outlook+accounts.png" height="72" width="72"/><thr:total>167</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-1015049831771518152</id><published>2013-03-03T23:46:00.000+01:00</published><updated>2013-03-03T23:46:09.533+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="WIF"/><title type='text'>Some important ASP.NET 4.5 security improvements</title><summary type="text">The .NET 4.5 framework was released a couple of months ago and it included several improvements in the security area. To benefit from these improvements you need to do a few changes to you application&#39;s configuration file. The documentation is a bit scattered over MSDN and MSFT blogs, I figured I&#39;d collect them here for easy reference.

The ASP.NET team published a nice article on&amp;nbsp;What&#39;s New</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/1015049831771518152/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2013/03/some-important-aspnet-45-security.html#comment-form' title='251 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1015049831771518152'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1015049831771518152'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2013/03/some-important-aspnet-45-security.html' title='Some important ASP.NET 4.5 security improvements'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>251</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-4373648730401310699</id><published>2013-01-09T23:07:00.000+01:00</published><updated>2013-09-28T17:15:19.504+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>How to encrypt a custom configuration section in ASP.NET</title><summary type="text">Recently I wrote a piece of software that needed some configurable secrets — and they needed to be VERY secret. Consequently, I had to encrypt a custom configuration section. Unfortunately, I quickly ran into trouble and got an error message along the lines of:


Encrypting configuration section...
An error occurred creating the configuration section handler for myConfigSection: Could not load </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/4373648730401310699/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2013/01/how-to-encrypt-custom-configuration.html#comment-form' title='185 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4373648730401310699'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4373648730401310699'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2013/01/how-to-encrypt-custom-configuration.html' title='How to encrypt a custom configuration section in ASP.NET'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4IZurE1LuknkWDfY9BL0vLAvjj0r9D4UJ_iExbNRhA26JmOyOf95Oc2yG4X-bWoAFs0MkYp0myhZ3y2HffyZGTpgwGJdeZHl7LjruZCVrISGzQ22Tt5kxoxaHKZ9EzzgzwxIh3i1qKf5p/s72-c/Encrypted+configuration.png" height="72" width="72"/><thr:total>185</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-2404773848952206755</id><published>2012-09-06T23:31:00.000+02:00</published><updated>2015-02-16T21:33:53.507+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Browser security"/><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="clickjacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Firefox"/><category scheme="http://www.blogger.com/atom/ns#" term="IE"/><category scheme="http://www.blogger.com/atom/ns#" term="NWebsec"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="XSS"/><title type='text'>Security through HTTP response headers</title><summary type="text">

Security headers in an HTTP response

There are many things to consider when securing a web application but a definite &quot;quick win&quot; is to start taking advantage of the security HTTP response headers that are supported in most modern browser. It doesn&#39;t matter which development platform you use to build your application, these headers will make a notable difference for the security of your </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/2404773848952206755/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/09/security-through-http-response-headers.html#comment-form' title='792 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/2404773848952206755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/2404773848952206755'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/09/security-through-http-response-headers.html' title='Security through HTTP response headers'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzFdITqN3IlG14Mr2cK_Z6G8fZOwcWKaBkx20TcoEUJWrEfrqpHKuY2ob4J_0_5-VVjjDC4N72PH3IKYmATIpTnrHtjNv0Xb5_aAk712kYvFGt5G9zIKcAixWUjD1rqqDG1NAsge6vdTEl/s72-c/securityheaders.png" height="72" width="72"/><thr:total>792</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-6113245597342267938</id><published>2012-07-29T19:07:00.000+02:00</published><updated>2012-07-29T19:11:27.811+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".NET"/><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Generating secure Guids</title><summary type="text">Guids are used extensively throughout Microsoft systems and developers tend to turn to Guid.NewGuid() whenever they need to create a value to uniquely identify something. Guids might also be used as keys or identifiers in security critical operations — under the assumption that they are hard to guess for an attacker. I&#39;ve been looking around the Internet to see if I could find some guidance on </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/6113245597342267938/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/07/generating-secure-guids.html#comment-form' title='154 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/6113245597342267938'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/6113245597342267938'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/07/generating-secure-guids.html' title='Generating secure Guids'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>154</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-2541457499047272470</id><published>2012-05-15T18:57:00.000+02:00</published><updated>2012-05-15T19:08:39.007+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Authentication"/><category scheme="http://www.blogger.com/atom/ns#" term="Passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Towards more secure password hashing in ASP.NET</title><summary type="text">A couple of weeks ago I was remotely involved in a discussion on password hashing in .NET with @thorsheim, @skradel, and @troyhunt. (Follow them if you&#39;re on Twitter). The background for the discussion was that password hashing using MD5/SHA-1/SHA-256 isn&#39;t quite the state of the art anymore. All the recent password breaches have triggered recommendations to make password cracking harder. The </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/2541457499047272470/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/05/towards-more-secure-password-hashing-in.html#comment-form' title='76 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/2541457499047272470'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/2541457499047272470'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/05/towards-more-secure-password-hashing-in.html' title='Towards more secure password hashing in ASP.NET'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>76</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-59739456195304960</id><published>2012-05-13T19:51:00.000+02:00</published><updated>2012-05-13T19:51:54.363+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Finnish disco"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><title type='text'>How Finnish disco killed my privacy</title><summary type="text">I noticed some unexpected activity on my Facebook wall the other day. I have a special list of &quot;friends,&quot; who aren&#39;t really friends but more aquaintances. I have used that list to block them from seing much of what&#39;s going on on my Facebook wall (hey, we can still be &quot;friends&quot; right?).&amp;nbsp;Now suddenly some of these people started &quot;Liking&quot; stuff I posted. And that struck me as..... weird.



</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/59739456195304960/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/05/how-finnish-disco-killed-my-privacy.html#comment-form' title='42 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/59739456195304960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/59739456195304960'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/05/how-finnish-disco-killed-my-privacy.html' title='How Finnish disco killed my privacy'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwnn6dFXl3mz_A_9FwzW2D73c6BM-uqr_FBMsq7alLt8Ry2SWkMxutWiPF83YGNY0KIz4fRQRWvUN0jF7ff9Jk99hS7hvI3NXakcRTRXMJF-mLCuUpIXAQA2AdBVtw8zeTDKeiqFPSJaWq/s72-c/facebook_privacyfail.png" height="72" width="72"/><thr:total>42</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-7756982189342476844</id><published>2012-04-17T19:02:00.000+02:00</published><updated>2012-04-17T19:02:21.902+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 7"/><title type='text'>Get the UNIX feel in Windows 7</title><summary type="text">Every once in a while I&#39;ve really missed having a Unix shell on my Windows box.&amp;nbsp;When your e.g. monitoring a log file, Notepad just doesn&#39;t cut it.&amp;nbsp;I&#39;ve been using Cygwin on and off as an alternative to get access to&amp;nbsp;handy tools such as&amp;nbsp;cat,&amp;nbsp;grep,&amp;nbsp;less,&amp;nbsp;tail,&amp;nbsp;vi&amp;nbsp;and so on. But I haven&#39;t really been too excited about Cygwin.

I discovered recently that </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/7756982189342476844/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/04/get-unix-feel-in-windows-7.html#comment-form' title='45 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/7756982189342476844'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/7756982189342476844'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/04/get-unix-feel-in-windows-7.html' title='Get the UNIX feel in Windows 7'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQdJB9eHEGMbZQvOHvqynN4dcfDC-mup_nVQLgjzLvhho8sfU_wE917tyb4wmbzjZwe53MoTp3wl7lnUwCti30GoJys7225bSXx84vw7shJ3R6Ge6ht70hjszBk0fVWHAhzzylxm1_u8Up/s72-c/unix_subsystem.png" height="72" width="72"/><thr:total>45</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-5334833367535674694</id><published>2012-03-19T10:45:00.000+01:00</published><updated>2012-03-19T10:45:04.227+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WIF"/><title type='text'>Promising new WIF tools</title><summary type="text">Vittorio Bertocci has shared some exciting news about the upcoming WIF tools for Visual Studio 11 on his blog. The tools look really nice, especially the local development STS. Here are the direct links (for future reference):


WIF Tools for Visual Studio 11 Part I: Using The Local Development STS
WIF Tools for Visual Studio 11 Part II: Manipulating Common WIF Settings From the UI
WIF Tools for </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/5334833367535674694/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/03/promising-new-wif-tools.html#comment-form' title='43 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/5334833367535674694'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/5334833367535674694'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/03/promising-new-wif-tools.html' title='Promising new WIF tools'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>43</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-4131421596567168950</id><published>2012-03-06T17:08:00.000+01:00</published><updated>2013-09-28T16:13:21.839+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="IIS 7.5"/><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="server 2008"/><title type='text'>IIS 500 errors leave clues in the log</title><summary type="text">
Yesterday I was playing around with the&amp;nbsp;validateIntegratedModeConfiguration=&quot;true&quot; setting on IIS 7.5. To my surprise I got an empty response back, with no indication of what went wrong.


Looking at the response with Fiddler yields:


HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Mon, 05 Mar 2012 15:59:52 GMT
Content-Length: 0


There&#39;s not much </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/4131421596567168950/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/03/iis-500-errors-leave-clues-in-log.html#comment-form' title='331 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4131421596567168950'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4131421596567168950'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/03/iis-500-errors-leave-clues-in-log.html' title='IIS 500 errors leave clues in the log'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpqmP4nNGZssQAoC_blAX9j6DcA9QlawhcobctNTNcMC1ea6DfjqY7KQYNmEto3abMjtjEXp_ug7CGFde6CUSlU5b11M3wgWlz-QYZ5PT1ZLMZ9ic6OQWf6SUGw2fDDn7i65RkGcPoAhfH/s72-c/IIS500.png" height="72" width="72"/><thr:total>331</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-1705226414450203378</id><published>2012-03-02T18:11:00.000+01:00</published><updated>2012-03-04T16:20:26.950+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Configuration"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="WIF"/><title type='text'>How to enable WIF token replay detection</title><summary type="text">Windows Identity Foundation (WIF) is vulnerable to replay of security tokens&amp;nbsp;in its default configuration.&amp;nbsp;The &quot;Replay Detection&quot; article on MSDN presents a good example of how things can go wrong without the replay detection (why do everyone have to use online banking as their example?):

As another example, suppose that a user opens a browser on a public kiosk, logs on to a bank </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/1705226414450203378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/03/how-to-enable-wif-token-replay.html#comment-form' title='82 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1705226414450203378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1705226414450203378'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/03/how-to-enable-wif-token-replay.html' title='How to enable WIF token replay detection'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>82</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-6832594432134386534</id><published>2012-02-20T18:22:00.000+01:00</published><updated>2012-09-25T22:35:36.374+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ninja tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="VS2010"/><title type='text'>Multiline search and replace in Visual Studio</title><summary type="text">Today I had to add a new HttpModule to A LOT of web.configs. Adding it manually would be too tedious, so I had to figure out how to search for a single line in Visual Studio 2010 and replace it with two lines of text. If I could only find a way to search for some text, and replace it with several lines of text!

Google turned up some hints about the Regex search, but no apparent solutions. After </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/6832594432134386534/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/02/multiline-search-and-replace-in-visual.html#comment-form' title='32 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/6832594432134386534'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/6832594432134386534'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/02/multiline-search-and-replace-in-visual.html' title='Multiline search and replace in Visual Studio'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSAXS2BbBn86-JEKGk4qB8PtyPN3vtZje6G0EToNawJBG1fIkQOm2lv7Xz4KXWhL3BGWSqdRSL_-ZTVKaSrB0-jKtPh-l9OKotygbf_h0gpsS5s76rVFT31l-y_ox69hwgG2w-8EEDNxZ0/s72-c/multiline_regex.png" height="72" width="72"/><thr:total>32</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-4715289917882769716</id><published>2012-01-11T20:15:00.000+01:00</published><updated>2013-09-28T16:20:28.029+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".NET"/><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="ASP.NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Authentication"/><category scheme="http://www.blogger.com/atom/ns#" term="encoding"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>How not to hash passwords in .NET</title><summary type="text">In connection with a bug in TransformTool, I&#39;ve been looking into how text encoding is handled in the .NET framework. Turns out there are some caveats that can affect the correctness of a program, and when used in e.g. password validation they might turn out to be severe security issues.

This post assumes you are somewhat familiar with how character encodings work. You might want to check out my</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/4715289917882769716/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2012/01/how-not-to-hash-passwords-in-net.html#comment-form' title='29 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4715289917882769716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/4715289917882769716'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2012/01/how-not-to-hash-passwords-in-net.html' title='How not to hash passwords in .NET'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqijTQvO9Hl4ePUBvop0i8biXUQul5eCydglH6XS6ImNhHSfqt8q0ytMHZn4BSXDrot3FsYPsp_BfyUl1E1v4mNJxQB0EKqgQ1RIYxFn0wpLnzowDuymNcQKjEcTJvqO7tsQFNcRIFdU7f/s72-c/encodingdemo.png" height="72" width="72"/><thr:total>29</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-3003087488480660968</id><published>2012-01-08T20:58:00.000+01:00</published><updated>2013-09-28T16:35:35.084+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="encoding"/><category scheme="http://www.blogger.com/atom/ns#" term="TransformTool"/><title type='text'>Introduction to character encoding</title><summary type="text">

&quot;FACE WITH TEARS OF JOY&quot; (U+1F602)

Text encoding is a persistent source of pain and problems, especially when you need to communicate textual information across different systems.&amp;nbsp;Every time you read or create an xml-file, a text file, a web page, or an e-mail, the text is encoded in some way. If the encoding is messed up along the way, the receiver will be looking at strange characters </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/3003087488480660968/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/12/introduction-to-character-encoding.html#comment-form' title='31 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/3003087488480660968'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/3003087488480660968'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/12/introduction-to-character-encoding.html' title='Introduction to character encoding'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKmdELV1u-gcNU9boCVtfsxGzT-Me_1XpjEfhQUCT31UK24T9gzz9y5vl6sDo3l6Bj0B1c-K4WZyK7YPaZW6GOT9Y3H81LkenHShxESvsq2Wmn8DkiqfP2pReMMGzs-DPTryqZJIumcFTX/s72-c/tearsofjoy.png" height="72" width="72"/><thr:total>31</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-6085395941847521726</id><published>2011-12-16T13:18:00.000+01:00</published><updated>2011-12-19T16:01:23.054+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser security"/><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="Firefox"/><category scheme="http://www.blogger.com/atom/ns#" term="IE"/><category scheme="http://www.blogger.com/atom/ns#" term="Opera"/><category scheme="http://www.blogger.com/atom/ns#" term="Safari"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>IE auto-upgrades, plugins next?</title><summary type="text">Last week the IE team announced that they&#39;ll soon start to automatically upgrade IE across Windows 7, XP, and Vista through Windows Update. A follow up from Microsoft&#39;s IT pro team&amp;nbsp;details that IE 6 and IE 7 will be upgraded to IE 8 on Windows XP, while Vista and Windows 7 users will get IE 9.&amp;nbsp;With Microsoft joining the herd of auto-upgraders the final pieces of the puzzle start to fall</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/6085395941847521726/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/12/ie-auto-upgrades-plugins-next.html#comment-form' title='31 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/6085395941847521726'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/6085395941847521726'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/12/ie-auto-upgrades-plugins-next.html' title='IE auto-upgrades, plugins next?'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>31</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-1742620284079319374</id><published>2011-12-13T14:42:00.000+01:00</published><updated>2011-12-13T14:42:28.987+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fail"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><title type='text'>See pics of women, free</title><summary type="text">Just now on Facebook I got the following advertisement:


I didn&#39;t quite react at the first glance, since every once in a while you get served the ads for &quot;Russian ladies looking for love&quot; etc. (hope I&#39;m not the only one getting those). Then I realized that this ad was for Match.com! That&#39;s amazing. I clicked on it, and yes, it led me to:&amp;nbsp;no.match.com.



The title of the ad suggests that it</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/1742620284079319374/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/12/see-pics-of-women-free.html#comment-form' title='39 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1742620284079319374'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/1742620284079319374'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/12/see-pics-of-women-free.html' title='See pics of women, free'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPhXArb-kYuENEfT-DIt8dTJVKuMKJnPf7bVt5dYlNfUMKL_qH51dvPdL-R7FLmgib6UizSCmnstaOMc-X4kCQbTN4JCsB209DcIrMKNOfl2zdYtnldOQHmH1r1w2URR4s_AiARMCbV8gV/s72-c/see+pics+of+women+free.png" height="72" width="72"/><thr:total>39</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-5932997034049723955</id><published>2011-11-05T15:14:00.000+01:00</published><updated>2011-11-05T15:14:13.711+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><title type='text'>Twitter app privacy, there just might be hope!</title><summary type="text">A couple of months ago I blogged about&amp;nbsp;Giving up your privacy for nothing at Yahoo News,&amp;nbsp;ranting about how the Tweet button on a Yahoo News article&amp;nbsp;required you to give complete control of &amp;nbsp;your Twitter account to some Twitter application. Well, I just had a more encouraging experience!

You&#39;ve probably heard about this Klout thing. On Twitter there has lately been several </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/5932997034049723955/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/11/twitter-app-privacy-there-just-might-be.html#comment-form' title='108 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/5932997034049723955'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/5932997034049723955'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/11/twitter-app-privacy-there-just-might-be.html' title='Twitter app privacy, there just might be hope!'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga6-60LbwgZ34w0chdpfTeIXr4Rk1M3NkJ9zqxj_W5ocb06z3VH6CXqmG8MkxqpEOknZEmiNZX_G7mzNeu2uZguMRqSwCjCsCaiDFarg9VReJJFEZKo1IO-DjE2isE_AfldYqqu3byV3A1/s72-c/twitter_signup+-+cropped.png" height="72" width="72"/><thr:total>108</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-3319932576877784529</id><published>2011-11-02T20:01:00.000+01:00</published><updated>2011-11-02T20:10:52.324+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="TransformTool"/><title type='text'>Base64 decode online — are you sure?</title><summary type="text">Are you using one of the many&amp;nbsp;web pages&amp;nbsp;that let you base64 decode data? In that case you should take a moment to think about the nature of the data you want to decode and what those pages could be doing with the data — apart from showing you the decoded version.

tl;dr: Check out transformtool.codeplex.com for an offline alternative to the online Base64 decoders.
Google&#39;s keyword tool </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/3319932576877784529/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/11/base64-decode-online-are-you-sure.html#comment-form' title='34 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/3319932576877784529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/3319932576877784529'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/11/base64-decode-online-are-you-sure.html' title='Base64 decode online — are you sure?'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrh3BYxMsQ8mtOhuIIU9J9puVrwm7qRgwuctBRT3t7eA4BByF-rEbZ-SFruCbEByNcdavLXxcqo7cPz-bBnzCk1SKRmq__HEIEr7BvWFd3JdY9RhDPVI06qK8OEZyWxbBpkxm9a0pYHv2e/s72-c/gsearch.png" height="72" width="72"/><thr:total>34</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-3063256459428256494</id><published>2011-10-22T13:40:00.000+02:00</published><updated>2011-10-22T13:40:57.575+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Browser security"/><category scheme="http://www.blogger.com/atom/ns#" term="Java"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Update Java — or just remove it</title><summary type="text">Oracle recently released an update to its Java software, fixing more than 20 critical security issues in the software. Krebs has a good post&amp;nbsp;on the update, briefly discussing the vulnerabilities and the fact that Java vulnerabilities are exploited for real.

I have to say that in recent years I&#39;ve installed Java more due to habit than because of an actual need for the software. So when I got</summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/3063256459428256494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/10/update-java-or-just-remove-it.html#comment-form' title='110 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/3063256459428256494'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/3063256459428256494'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/10/update-java-or-just-remove-it.html' title='Update Java — or just remove it'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Nu-ugHvrW7-ubShJLjpUS9-VGJBw41wvo1tfKRM5IOAsA3Ynj5n9yA3ZE_jFftyNPfKUF-NxWexdd_KWFqX0d2N8IYuDtxceAdwUIVRtug7trtBzQtp9yKg7-pxJ-JU9xa-ItNiQXpzw/s72-c/Welcome.png" height="72" width="72"/><thr:total>110</thr:total></entry><entry><id>tag:blogger.com,1999:blog-904470033638481177.post-7607416396940715735</id><published>2011-10-09T22:50:00.000+02:00</published><updated>2011-10-09T22:50:04.329+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>A Google 2-step verification vulnerability</title><summary type="text">Early this year Google started rolling out their new&amp;nbsp;two-factor authentication&amp;nbsp;procedure, which they refer to as 2-step verification.&amp;nbsp;On their corporate blog they provided a few hints on why they were rolling out a new authentication procedure — mentioning risks associated with password reuse and phishing&amp;nbsp;attacks. 2-step verification is now widely deployed, by June it was </summary><link rel='replies' type='application/atom+xml' href='http://www.dotnetnoob.com/feeds/7607416396940715735/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.dotnetnoob.com/2011/10/google-2-step-verification.html#comment-form' title='70 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/7607416396940715735'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/904470033638481177/posts/default/7607416396940715735'/><link rel='alternate' type='text/html' href='http://www.dotnetnoob.com/2011/10/google-2-step-verification.html' title='A Google 2-step verification vulnerability'/><author><name>Klings</name><uri>http://www.blogger.com/profile/18038484174148191761</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/zMabEyrtPRg/default.jpg" height="72" width="72"/><thr:total>70</thr:total></entry></feed>