473,396 Members | 2,061 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Question about secured website

Joe
Hi,

We want to build a couple of secured pages which will be viewable only to
those who have an account. One way of implementing the security is using
session cookies (temporary cookies). When a user logs in a session cookie is
created. When the browser window is closed the session cookie disappears.
This way when the browser is closed the session is over. So that even if one
tries to copy and past the URL of a secured page, they won’t be able to view
the page unless they log in.

Is there any other way of building a secured website that will work just
like I described above ( session should be over as soon as browser window is
close)?

Thanks,

Joe

Nov 19 '05 #1
1 885
Option number is going to work just fine. You could
always use windows authentication for your protected
folders but not all browsers will support that. That
really works best in an intranet scenario though.

--
Robbe Morris - 2004/2005 Microsoft MVP C#
Free Source Code for ADO.NET Object Mapper To DataBase Tables And Stored
Procedures
http://www.eggheadcafe.com/articles/..._generator.asp


"Joe" <Jo*@discussions.microsoft.com> wrote in message
news:B8**********************************@microsof t.com...
Hi,

We want to build a couple of secured pages which will be viewable only to
those who have an account. One way of implementing the security is using
session cookies (temporary cookies). When a user logs in a session cookie
is
created. When the browser window is closed the session cookie disappears.
This way when the browser is closed the session is over. So that even if
one
tries to copy and past the URL of a secured page, they won't be able to
view
the page unless they log in.

Is there any other way of building a secured website that will work just
like I described above ( session should be over as soon as browser window
is
close)?

Thanks,

Joe

Nov 19 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Ed Jaffe | last post by:
All: 1) Could any one show me any website which is using asp, ssl, sql server? 2) Is ASP/IIS technology good enough to create a commerical secured internet web application? 3) People said most...
2
by: Amit D.Shinde | last post by:
Hello Experts.. I need some help regarding cookies and session objects and also global.asa file I am creating one cookie when a user logs in on my website. The cookie stores the login name of...
2
by: Joe | last post by:
Hi, We want to build a couple of secured pages which will be viewable only to those who have an account. One way of implementing the security is using session cookies (temporary cookies). When...
2
by: VB Programmer | last post by:
I want to write a file to the "secured" dir that is on my website. The full path is: C:\inetpub\wwwroot\MyWebSite\Secured I tried this, but it didn't work: Dim strFileName As String =...
2
by: roy anderson | last post by:
Hey all, I'm not new to web development, but totally clueless regarding web security/logins and such. I have a website which requires users to login, checks their info against a SQL Server...
1
by: bobmct | last post by:
Gentlemen; I have a mental block here so I am hoping for some guidance and ideas/suggestions with this one? I have a php program that processes a form (credit card) on a secured site (SSL)...
2
by: Tammy | last post by:
Hello - I have read many threads regarding back-end security and have found them all useful. I have a couple of (what seem to be basic) questions: I have a secured front-end and back-end...
1
by: securedcardss | last post by:
http://card.2youtop.info secured credit card card credit instant secured card cash credit secured card
0
by: chaitanya02 | last post by:
Hello all, I really find hard time with the below issue: 1. I have a tableA in SQL that has user id and pwd, which is used to login to the secured zone on a website. 2. I want to validate the...
1
by: Rob | last post by:
What is the best way to safely access a companies ERP data (SQL server) from a website that is hosted outside the firewall ?
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.