Category ASP.Net

What is new in Ajax 4.0

jQuery Included with Web Forms and MVC The Visual Studio templates for both Web Forms and MVC include the open-source jQuery library. When you create a new website or project, a Scripts folder containing the following 3 files is created:…

Saving Image from Image URL

Overview Create image object and save it into file by URL. Depending on your needs it can be two solutions: Solution 1 when you need to make some manipulations with the image object (resize, crop, etc) before saving to disk:…

BING Maps integration

Follow the below steps to Integrate BING Maps in your ASP.Net application Step1: Create a C# ASP.NET Empty Web Application in Visual Studio 2010. Step2: Add a Default ASP.NET page into the application. Step3: Add a table to the page…

IIS 404 error when viewing ASPX pages

Root Cause By default, when IIS is installed on any version of the Windows Server 2003 family, IIS only serves static content (HTML). Resolution To permit IIS to serve dynamic content, the administrator must unlock this content in the Web…

WCF Security

Overview Services and service consumers are often on opposite sides of trust boundaries. A trust boundary is a physical or virtual boundary within which actual levels of trust can vary. A trust boundary can be an application process, a machine,…

Detect MITM attacks and Secure your clients

The following code demonstrates a dynamic URL generator written in C# for use in ASP.NET, implemented as a static class method, and its corresponding parser module that singles out MITM attackers by detecting multiple IP address mismatches originating from the…

Symmetric key Encryption and Decryption

I saw many of the applications with out basic level of security with respect to data transfer etc. Few people uses Base64 Encoding while sending data through URL which is a common practice. But a simple Javascript code can reverse…

Session Threats and Counter Measures

Session management for Web applications is an application layer responsibility. Session security is critical to the overall security of the application. Top session management threats include: ● Session hijacking ● Session replay ● Man in the middle Session Hijacking A…