Tutorials to .com

Tutorials to .com » Asp » Asp security encryption

Asp security encryption Articles


1: Microsoft Script Encoder (3) --- use the script encoder
Using a script encoder Script encoder script code only to encode documents and other content do not move to plain text form. To use the script encoder, based on the usual method of text development and debugging, and then use the utility to encode ...

2: Microsoft Script Encoder (4) --- Coding Example
Coding Example Contain the following is a JScript code in need of protection, a brief example: <HTML> <HEAD> Script encoder <TITLE> sample page </ TITLE> <SCRIPT LANGUAGE="JScript"> <!--// / / Copyri...

3: global.asa +. htr exposed global.asa content
Description: See asa source file Request through the browser global.asa +. Htr content global.asa will be exposed, as we all know there are global.asa saved database user name and password Of. See attack methods: http://target/global.asa +. Htr ...

4: Personal encryption methods are used
When the following For example: Input: rs.addnew rs ( "password") = encrypt (request ( "password")) rs.update Authentication: if rs ( "password") = encrypt (request ( "password")) then .... function encry...

5: ASP loophole Password Authentication procedures
In fact, this loophole is that many sites exist, in particular prepared to use ASP chat room, BBS, etc. (I do not understand other languages, but I think there will still be in this area The hole. ). In general, we verify the legality of users wil...

6: WEB pages with ASP to achieve sub-user access permissions
ASP to achieve sub-user rights WEB page access Author: Raises the question of A few days ago the Internet, to see friends on the computer at the ASP version of the Forum the following question: "I tried to use the method of ASP pages set up ...

7: Safety procedures for the preparation of the script V1.0 (1)
by Casper -------- security focus Casper@xfocus.org http://www.xfocus.org Basic ideas: Did not write a function to an independent process, the program page As small as possible so that customers know your server-side information Do not use &qu...

8: Safety procedures for the preparation of the script V1.0 (2)
The issue of 2.2 cookie 2.2.1 introduced the concept of Netscape in accordance with the definition of official documents, Cookie in the HTTP protocol, the server or script can be workstation clients a way of information. Cookie is a Web server sec...

9: Microsoft IIS 5.0 leak vulnerability index directory
Microsoft IIS 5.0 leak vulnerability index directory Release Date: 2000-10-6 Updated: 2000-10-6 Systems affected: Microsoft IIS 5.0 + Microsoft Windows NT 2000 Description: -------------------------------------------------- -------------------...

10: Win2k IIS vulnerability remotely execute commands
The procedures: Characters dealt with the use of dual-win2k system + iis Description: Win2k IIS remotely execute commands Details: Win2k as a result of certain double-byte system in dealing with certain special characters with the English versi...

11: How to use base64 encryption asp
2000-11-9 10:48:18 in bigeagle add in Joy ASP ↑: <% OPTION EXPLICIT const BASE_64_MAP_INIT = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 + /" dim nl 'Zero based arrays dim Base64EncMap (63) dim Base64De...

12: Translate: f, IIS 5.0 leak source solutions!
2000-8-18 14:06:40 add Adam in the NT system security: I do not say in English Chinese version: iisrest / stop c: cd \ WINNT \ system32 \ inetsrv cacls httpext.dll / d everyone Are you sure (Y / N)? Y iisreset / start All is ok a! Of cours...

13: iPlanet Web Server Buffer Overflow Vulnerability
The procedures: iPlanet Description: iPlanet Web Server Buffer Overflow Vulnerability Details: iPlanet Web Server 4.x, there is a buffer overflow vulnerability. The vulnerability allows a malicious remote user to execute arbitrary code or creat...

14: Asp security management (1)
Microsoft Enterprise Services White Paper Release Date: September 2000 Version 1.0 Abstract Department of the White Paper on the Microsoft © Enterprise Service (ES) framework, one of a series of articles. To learn more about the complete lis...

15: Asp Security Management (2)
Service Solutions Means the IT service solutions to offer its customers the ability to function or business. Examples of service solutions are as follows: Application hosting E-commerce Messaging Knowledge Management Based on the current appli...

16: Asp Security Management (3)
<img src=http://www.microsoft.com/china/technet/ecommerce/images/ASPSEC03.GIF> type In the MOF Model are embedded in all levels of security management. Each level must comply with established security policy, including ASP, as well as interna...

17: ASP vulnerability analysis and solutions (7)
18, MS ODBC database connection overflow resulting in denial of service attacks NT/9x Vulnerability Description: Microsoft ODBC database in the connect and disconnect when there may be a potential overflow problem (Microsoft ACCESS database-relate...

18: ASP vulnerability analysis and solutions (8)
19, ASP home page. Inc files disclosure issues Vulnerability Description: Version affected: Any system to provide ASP services Remote: YES / local: YES Abstract: Asp home page when there is not the final production testing prior to the completi...

19: ASP vulnerability analysis and solutions (9)
20, the use of Activer server explorer can read and write file access Vulnerability Description: Activer server explorer of chinaasp can be very convenient for the local file server on the online catalog to view online view the file name, size, ty...

20: ASP vulnerability analysis and solutions (10)
21 IIS4.0/IIS5.0 request long file name loopholes Vulnerability Description: Affected version: Microsoft IIS 5.0 + Microsoft Windows NT 2000 Microsoft IIS 4.0 + Microsoft Windows NT 4.0 + Microsoft BackOffice 4.5 - Microsoft Windows NT 4.0 ...


Page 1 of 8
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]