. NET Security Secrets series blog index CLR boarding (on) MSCOREE. DLL managed code process Injection & CLR host

Source: Internet
Author: User
Tags asymmetric encryption
. NET Security Secrets series blog Index

1). NET Architecture

2)Hosting PE files

3)Introduction to metadata and IL

4)Basic Assembly concepts

5)Basic emit (I) Operations

6)Emit (medium) ILGenerator

7) application domain Basics

8) CLR boarding (on) MSCOREE. DLL

9) CLR host (in) host the loading and execution of exe files

10) CLR host (bottom) Hosting host

11) code group (1) Management of code groups

12) code group (2) member Conditions

13) code group (3) attributes

14) Role-based security programming example

15) symmetric encryption (1) Basic principles of symmetric encryption

16) symmetric encryption (2) symmetric encryption algorithm

17) symmetric encryption (3) NET symmetric encryption system

18) symmetric encryption (4) NET symmetric encryption practices

19) asymmetric encryption (1) Principle of asymmetric encryption

20) asymmetric encryption (2) asymmetric encryption algorithm

21) asymmetric encryption (3). NET asymmetric encryption system

22) asymmetric encryption (4). NET asymmetric encryption practices

23) file and directory access control (1) Access Control List

24) file and directory access control (2) Add Access Control

25) file and directory access control (3) access rules

26) file and directory access control (4) audit rules

27) SSL Principles and Applications (1) architecture of the SSL protocol

28) SSL principles and applications (2) configuring https

29) SSL Principles and Applications (3) Handling HTTPS in. Net Development

30) Strong names (1) Use strong names to protect code integrity

31) Strong name (2) reference assembly with strong name Signature

32) Strong name (3) weak name

33) WCF Authentication Service

34) WCF role Service

35) WCF nettcpbinding transport security mode (1) nettcpsecurity Definition

36) WCF nettcpbinding transport security mode (2) Default Security Configuration

37) WCF nettcpbinding transport security mode (3) protectionlevel setting protection level

38) WCF nettcpbinding transport security mode (4) clientcredentialtype certificate authentication mode-basic configuration

39) WCF nettcpbinding transport security mode (5) clientcredentialtype certificate authentication mode-None Authentication Mode

40) WCF NetTcpBinding Transport security mode (6) ClientCredentialType certificate authentication mode ---- PeerTrust Authentication Mode

41) WCF NetTcpBinding Transport security mode (7) ClientCredentialType certificate authentication mode ---- ChainTrust Authentication Mode

42) WCF NetTcpBinding Transport security mode (8) ClientCredentialType certificate authentication mode ---- PeerOrChainTrust Authentication Mode

43) WCF NetTcpBinding Transport security mode (9) ClientCredentialType certificate authentication mode ---- Custom Authentication Mode

44) Open XML application security (1) macro security

45) Open XML application security (2) OLE Mechanism

46) Open XML application security (3) Hide data

47) Open XML application security (4) document verification

48) Open XML application security (5) Digital Signature

49) Basic WIF principles (1) Identification Library

50) Basic WIF principles (2) declarative identity Model

51) Basic principles of WIF (3) Security token service

52) Basic principles of WIF (4) Identity Verification instances

53) Basic WIF principles (5) features of WIF

54) process injection and CLR host hosting code

55) Unfinished .........

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.