473,657 Members | 2,690 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Securing an ASP.NET Web site - code Examples

Hi

I'm about to turn a public website into a secure members only website (after
paying registration fee).
I assume all I need for that purpose is to save users' information in an
XML file and use form authentication method in web.config
to prevent from anonymous users to enter.

Programmaticall y speaking, I assume I'll need:

1) A Secure Registration page in which users can enter their personal and
creditcard information.
2) After validating Credit Info Add the User details to the XML file.
3) A Login page + "Forgot Password" Procedure. (Validating the Login
Against XML file)
- Does my assumptions are correct ?
- Where can I find some code for the aboved ?
- How Do I Prevent from anonymous users illegal access to the XML file ?

Nov 21 '05 #1
1 1282
Unfortunately, there's more to securing a web site than can be
answered in a single newsgroup post. Here's a couple of good links to
get you started:
http://msdn.microsoft.com/library/en...cnetlpMSDN.asp
http://msdn.microsoft.com/library/en...eatCounter.asp

--Mary

On Sun, 22 May 2005 16:20:37 +0200, "romy" <ro******@Power up1.com>
wrote:
Hi

I'm about to turn a public website into a secure members only website (after
paying registration fee).
I assume all I need for that purpose is to save users' information in an
XML file and use form authentication method in web.config
to prevent from anonymous users to enter.

Programmatical ly speaking, I assume I'll need:

1) A Secure Registration page in which users can enter their personal and
creditcard information.
2) After validating Credit Info Add the User details to the XML file.
3) A Login page + "Forgot Password" Procedure. (Validating the Login
Against XML file)
- Does my assumptions are correct ?
- Where can I find some code for the aboved ?
- How Do I Prevent from anonymous users illegal access to the XML file ?


Nov 21 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
1906
by: Steve | last post by:
I have a pretty nice php web site, that's also reasonably secure. However, I wrote some php code to create some dynamic images based on database data, but I can't figure out how to secure this script? when I reference the php code via img src="myimage.php", none of my session variables are available for use in the script. So, without my session variables, how am I suppose to ensure that the script is only run by a valid user, rather...
0
1774
by: atl-jcd | last post by:
Does anyone have a HTML or PDF copy of the old Al Stevens article: "Passing the C++ Test: Securing success in an interview" from Dr. Dobbs Journal (I know I can get it from the DDJ site if I subscribe as a premium member, but I don't really want to pay $$ just for the one article.) Thanks! Please contact me at DDJarticle@waycoolgear.com if you like.
4
1398
by: Tony | last post by:
G'day, The derivation of a (commercially valuable) relational schema has taken me a considerable amount of time. Now I want to secure the design in a client server environment. Hence to my question: How have developers successfully prevented access to their data tables and protected their database design? Looking forward to some suggestions. Tony
11
3424
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice that made sense. One comment I've seen alot about is "securing the hashing routine" but no-one explains how to accomplish this. So how do I secure my hashing routine? Do I use code access security, role based security, ACLs, etc or combination?...
1
1278
by: ven | last post by:
hello i wanna ask for securing application dll in asp.net in framework 1.1 i have to use dotfuscator to simply and poor secure of my dll so it will be better compiler in framework 2.0 or some tools to secure dlls or i have to use poor dotfuscator ? PAT
2
1947
by: Vaibhav Shah | last post by:
Hi, Can we secure HTML pages on a web site using asp.net? We have a requirement in which we want to display a login page before a visitor can view any HTML page on our website. WE have tried implementing HTML pages in a direcotry and seucring that directory but still, if the visitor accesses the HTML page directly, using URL, he can access this page.
5
1087
by: Nak | last post by:
Hi there, I have just decided to attempt to secure my .NET app as much as possible. The main reason I want to do this is because I have implemented a plug-in engine, I thought that it would be quite easy for someone to make a rogue plug-in that deleted files, or done other malicious tasks. Anyway, the plugins that I have implemeneted so far are passed either 1 filename, or an array of filenames. Ideally I want to plugin to be able to...
4
1382
by: KJ | last post by:
Hello All, I have to secure my first real B2B web service. Could you please provide some guidance as to which method of security I should use. One caveat is that we will not be using SSL on the server side as per the networking department. Windows authentication is also probably not an option, as this web service will be interacting between two separately located companies. I have read a little bit about passing credentials in SOAP...
4
323
by: =?Utf-8?B?aGlsZXlq?= | last post by:
Hi, I'm developing a web service that needs to communicate with a custom application on an intranet. There is also a configuration utility which may be run on a different server machine for setting up and altering parameters on the service. This configuration web application may be browsed to via intranet or internet. This is the first work I've done with web services, so sorry for any incorrect terminology or nonsense statements.
0
8394
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8825
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8503
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
7327
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6164
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5632
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4152
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
2726
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1955
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.