473,379 Members | 1,253 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,379 software developers and data experts.

dot NET and Privacy

I'm looking at shareware ASP.NET applications for my web. Some applications includes a
..DLL that goes into my web's /bin subdirectory.

Since the internet is such a wild and wooly place, how can I tell if the .DLL might
compromise my privacy & security? I'm new to .NET, but I want to know if there is a way
I can be assured that the .DLL won't connect to a remote server do something nasty, like
send out the email addresses that are in the database.

Thanks!!!

May 8 '06 #1
2 924
Don't ever buy from anyone you don't know.

--
HTH,

Kevin Spencer
Microsoft MVP
Professional Numbskull

Hard work is a medication for which
there is no placebo.

"Bill" <Bi*****@yahoo.com> wrote in message
news:ux**************@TK2MSFTNGP02.phx.gbl...
I'm looking at shareware ASP.NET applications for my web. Some
applications includes a
.DLL that goes into my web's /bin subdirectory.

Since the internet is such a wild and wooly place, how can I tell if the
.DLL might
compromise my privacy & security? I'm new to .NET, but I want to know if
there is a way
I can be assured that the .DLL won't connect to a remote server do
something nasty, like
send out the email addresses that are in the database.

Thanks!!!

May 9 '06 #2
Lutz Roeder is a Microsoft guru with a vengeance. Download his "Reflector"
product and load your suspect DLL into it. find the "Decompile" option and
look at the results, in your favorite .NET language.
You can now decide, if you see something you don't like.
Peter

--
Co-founder, Eggheadcafe.com developer portal:
http://www.eggheadcafe.com
UnBlog:
http://petesbloggerama.blogspot.com


"Bill" wrote:
I'm looking at shareware ASP.NET applications for my web. Some applications includes a
..DLL that goes into my web's /bin subdirectory.

Since the internet is such a wild and wooly place, how can I tell if the .DLL might
compromise my privacy & security? I'm new to .NET, but I want to know if there is a way
I can be assured that the .DLL won't connect to a remote server do something nasty, like
send out the email addresses that are in the database.

Thanks!!!

May 9 '06 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: P. Obbard | last post by:
Hi all, How can I create a privacy policy for a cookie? I have an invisible image loading on a 3rd-party hosted site to help me watch traffic, but the cookie I'm using is being rejected by IE6...
3
by: Gree | last post by:
A question to those of you who design sites... What is a good online resource for getting legal disclaimers and privacy policies for a web site? ...and are they necessary? Can I just...
10
by: Hermit Dave | last post by:
Hi, Depending upon their security settings some users can not login due to their machine's Privacy Settings some how blocking the cookie (no privacy policy available)... which is encrypted......
1
by: Trevor | last post by:
Hi I have built a site with some secure pages, in a subdirectory with anonymous access off, and cookeless forms security. I thought that this would be accessible to all without the need for...
62
by: Jeff Brown | last post by:
I hear people say not to multipost, does these mean not to ask the same question in another group or to submit the question to all the groups via the same submission, with multiple newsgroups in...
2
by: rawCoder | last post by:
Hi, I have a case where my application built in Visual STudio .NET 2003 and ASP.NET ( VB/C# ) is installed on IIS 6.0, windows server 2003. Problem is that when I reach the site( using IE)...
6
by: Zytan | last post by:
I ran through the VB Guided Tour some time ago. In particular, the "Managing Your Records: Using Data in Your Program" section: http://msdn2.microsoft.com/en-us/library/t25kbx0s(VS.80).aspx ...
5
by: Radium | last post by:
Cascading Style Sheet is such a hazard to your privacy. It allows others on the internet to see your monitor and files. It allows them to copy images on your monitor to their computers. It also...
7
by: Green Xenon [Radium] | last post by:
Cascading Style Sheet is such a hazard to your privacy. It allows others on the internet to see your monitor and files. It allows them to copy images on your monitor to their computers. It also...
8
bilibytes
by: bilibytes | last post by:
Hi everyone, I'm facing a database design problem. I want to make a sort of networking solution for the clients of my site in which they would be able to share or keep private some of their...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.