. NET Security Secrets series blog Index
1). NET Architecture
2)Hosting PE files
3)Introduction to metadata and IL
4)Basic Assembly concepts
5)Basic emit (I) Operations
6)Emit (medium) ILGenerator
7) application domain Basics
8) CLR boarding (on) MSCOREE. DLL
9) CLR host (in) host the loading and execution of exe files
10) CLR host (bottom) Hosting host
11) code group (1) Management of code groups
12) code group (2) member Conditions
13) code group (3) attributes
14) Role-based security programming example
15) symmetric encryption (1) Basic principles of symmetric encryption
16) symmetric encryption (2) symmetric encryption algorithm
17) symmetric encryption (3) NET symmetric encryption system
18) symmetric encryption (4) NET symmetric encryption practices
19) asymmetric encryption (1) Principle of asymmetric encryption
20) asymmetric encryption (2) asymmetric encryption algorithm
21) asymmetric encryption (3). NET asymmetric encryption system
22) asymmetric encryption (4). NET asymmetric encryption practices
23) file and directory access control (1) Access Control List
24) file and directory access control (2) Add Access Control
25) file and directory access control (3) access rules
26) file and directory access control (4) audit rules
27) SSL Principles and Applications (1) architecture of the SSL protocol
28) SSL principles and applications (2) configuring https
29) SSL Principles and Applications (3) Handling HTTPS in. Net Development
30) Strong names (1) Use strong names to protect code integrity
31) Strong name (2) reference assembly with strong name Signature
32) Strong name (3) weak name
33) WCF Authentication Service
34) WCF role Service
35) WCF nettcpbinding transport security mode (1) nettcpsecurity Definition
36) WCF nettcpbinding transport security mode (2) Default Security Configuration
37) WCF nettcpbinding transport security mode (3) protectionlevel setting protection level
38) WCF nettcpbinding transport security mode (4) clientcredentialtype certificate authentication mode-basic configuration
39) WCF nettcpbinding transport security mode (5) clientcredentialtype certificate authentication mode-None Authentication Mode
40) WCF NetTcpBinding Transport security mode (6) ClientCredentialType certificate authentication mode ---- PeerTrust Authentication Mode
41) WCF NetTcpBinding Transport security mode (7) ClientCredentialType certificate authentication mode ---- ChainTrust Authentication Mode
42) WCF NetTcpBinding Transport security mode (8) ClientCredentialType certificate authentication mode ---- PeerOrChainTrust Authentication Mode
43) WCF NetTcpBinding Transport security mode (9) ClientCredentialType certificate authentication mode ---- Custom Authentication Mode
44) Open XML application security (1) macro security
45) Open XML application security (2) OLE Mechanism
46) Open XML application security (3) Hide data
47) Open XML application security (4) document verification
48) Open XML application security (5) Digital Signature
49) Basic WIF principles (1) Identification Library
50) Basic WIF principles (2) declarative identity Model
51) Basic principles of WIF (3) Security token service
52) Basic principles of WIF (4) Identity Verification instances
53) Basic WIF principles (5) features of WIF
54) process injection and CLR host hosting code
55) Unfinished .........