Learn about the differences in security measures, both claim-based and role-based access.
Latest Authentication Articles
See how easy it can be to implement Role-based Security in your Visual Basic applications.
Securing regular sockets against tampering isn't that difficult if you follow this lead.
This code snippet and document show how to connect to an FTP server with SSL enabled using ASP.NET. The code is written in C#.NET.
In this article, Michele Leroux Bustamante discusses authentication, authorization and role-based security in .NET. Along the way, he provides some best practices for implementing role-based security in some typical .NET application scenarios including rich clients, Web applications, and Web services.
With the introduction of ASP.NET 2.0 and Visual Studio 2005, many of the security tasks required to connect an application's authentication and authorization mechanisms to Active Directory have been dramatically simplified. This article shows how to perform both Active Directory (LDAP:\\) and local member server (WinNT:\\) tasks.
Latest CodeGuru Developer Columns
A pointer-to-member represents a location inside a class; selecting a member means offsetting into it. Explore this intricate idea. With examples.
Read through various ways to license and protect your .NET applications from potential pirates. You may find the perfect choice for your own work.
Explore two ways to check whether an application is already running. Example code is both in C# and VB.NET.
Discover the world of Portable Class Libraries (PCLs) and how they can work for you.