473,386 Members | 1,815 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Code Access Security - General Question

..NET's code Access Security enables administrators to restrict the types of
things that a .NET application can do on a local computer. For example, a
..NET Windows Forms application can be prevented from writing to the Registry
or writing a file to the local disk.

My question: Is this feature unique to .NET? Or is it just as easy for
enterprise network administrators to prevent COM applications from writing
to the Registry and doing local file I/O?

I'm basically wondering if .NET's code access security model is a "selling
point" to network administrators; something that would cause them to
generally favor the deployment of .NET Windows Forms applications over, say,
an "equivalent" VB6 (COM) application.

Thanks!
May 18 '06 #1
1 1884

"Jeremy S." <A@B.COM> wrote in message
news:OG**************@TK2MSFTNGP04.phx.gbl...
.NET's code Access Security enables administrators to restrict the types of things that a .NET application can do on a local computer. For example, a
.NET Windows Forms application can be prevented from writing to the Registry or writing a file to the local disk.

My question: Is this feature unique to .NET? Or is it just as easy for
enterprise network administrators to prevent COM applications from writing
to the Registry and doing local file I/O?

I'm basically wondering if .NET's code access security model is a "selling
point" to network administrators; something that would cause them to
generally favor the deployment of .NET Windows Forms applications over, say, an "equivalent" VB6 (COM) application.

Thanks!


No. This type of security is not unique to .Net.

This is a rather difficult question to answer because for years Windows
Security (Apps and OS) in general has received poor implementation. By that
I don't mean that Windows was inherently less secure than other
environments, only that the default essentially turned most security off,
and to invoke extra or higher security was a bit painful. Documentation was
often poor and slightly obscure. Most MS security (and admin) tools were
awkward, incomplete, and often came in multiple flavors which didn't
necessary work well together. For an example take some time to review the
history of Windows encryption libraries in.

So while it has always been possible to 'lock-down' a Windows app or COM,
many just didn't go there. Corporations or groups that needed 'extra'
security often went to 3rd party tools. Also, especially in the VB world,
but just as prevalent everywhere else, programmers themselves are pretty
naive when it comes to security. Until recently there were two common
beliefs. One, that 'security' was the App's job, or two, that 'security' was
the Admin's job. Adopting either model leaves some ugly holes.

Places where a consistent security model is adapted across the enterprise is
very rare. It is not uncommon to go into any organization and find 3 or 4
different 'security' models - depending on suite, the authors, or management
at the time.

With Windows XP sp2, MS finally got serious with security. Not only is laxed
security no longer the default, but the tools are better coordinated and
better documented. This new interest also extends to .Net. The 2.0 Framework
provides ready access to newer tools and a more consistent model. (Note .Net
1.x still required the developer to invoke system resources through pInvoke,
or 'extra' work.)

So while .Net is touted as being more 'Secure', it owes this increase to a
more secure OS and its more consistent, built-in security tools, not to
something particularly unique to .Net.

However, considering that something that is 'easier' to do is likely to be
used more often, and that securing COM is still not as simple as securing a
..Net app, then .NET would be easier for Admins to administer. BUT, the
organization still has to buy into a total security model.

-ralph
May 18 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Ian | last post by:
The beginning of my assembly that I am getting the access error from looks like this. ********************************* Imports System.EnterpriseServices Imports System Imports...
2
by: Antony | last post by:
I am currently writing an application (VB.NET) and I was thinking about all the hype that seems to be given to security and if I should pay it any attention or not. My first thought was, nah, no...
32
by: Mike MacSween | last post by:
Further to 'Security - more complex than I thought' Has anybody ever seen any studies? Or anecdotal evidence? Done any studies themselves? Done any lab testing - you know - 10 users asked to get...
18
by: Andre Laplume via AccessMonster.com | last post by:
I have inherited a bunch of dbs which are are shared among a small group in my dept. We typically use the dbs to write queries to extract data, usually dumping it into Excel. Most dbs originated...
5
by: Greg Strong | last post by:
Hello All, What are the best ways to implement security for Access databases (i.e. ..MDB files)? I ask the question from a general perspective. Why? Well I had written a prototype database...
4
by: David Sworder | last post by:
Hi there, I come from a Visual C++ background. When writing a service that's exposed to the Internet, I had to check the incoming data stream (from the client) VERY carefully. If a hacker was...
0
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to...
3
by: Christer | last post by:
Hi all! We're creating an administration for a web application. This includes severeal aspx pages. Our key entity in the web application is "Profile", which can have a certain type. Based on...
34
by: Alan Larsson | last post by:
Is there a way i can look at the php code that is runnig a site, without any ind of admin access to the server?
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.