﻿<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:blogChannel="http://backend.userland.com/blogChannelModule" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:pingback="http://madskills.com/public/xml/rss/module/pingback/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#">
  <channel>
    <title>vlad navazhylau's blog - security</title>
    <description>Agile Development, Architecture, .NET and The Art of Listening</description>
    <link>http://www.navazhylau.com/blog/</link>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>BlogEngine.NET 1.6.1.0</generator>
    <language>en-US</language>
    <blogChannel:blogRoll>http://www.navazhylau.com/blog/opml.axd</blogChannel:blogRoll>
    <blogChannel:blink>http://www.dotnetblogengine.net/syndication.axd</blogChannel:blink>
    <dc:creator>Vlad Navazhylau</dc:creator>
    <dc:title>vlad navazhylau's blog</dc:title>
    <geo:lat>0.000000</geo:lat>
    <geo:long>0.000000</geo:long>
    <item>
      <title>Authentication in WinHTTP</title>
      <description>&lt;a href="http://msdn2.microsoft.com/en-us/library/Aa383144.aspx"&gt;http://msdn2.microsoft.com/en-us/library/Aa383144.aspx&lt;/a&gt;</description>
      <link>http://www.navazhylau.com/blog/post/Authentication-in-WinHTTP.aspx</link>
      <author>vlad</author>
      <comments>http://www.navazhylau.com/blog/post/Authentication-in-WinHTTP.aspx#comment</comments>
      <guid>http://www.navazhylau.com/blog/post.aspx?id=9ac16e05-7c45-484c-ac5f-f4c6ea82d6cb</guid>
      <pubDate>Mon, 24 Dec 2007 09:16:10 +0200</pubDate>
      <category>coding</category>
      <category>security</category>
      <dc:publisher>vlad</dc:publisher>
      <pingback:server>http://www.navazhylau.com/blog/pingback.axd</pingback:server>
      <pingback:target>http://www.navazhylau.com/blog/post.aspx?id=9ac16e05-7c45-484c-ac5f-f4c6ea82d6cb</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://www.navazhylau.com/blog/trackback.axd?id=9ac16e05-7c45-484c-ac5f-f4c6ea82d6cb</trackback:ping>
      <wfw:comment>http://www.navazhylau.com/blog/post/Authentication-in-WinHTTP.aspx#comment</wfw:comment>
      <wfw:commentRss>http://www.navazhylau.com/blog/syndication.axd?post=9ac16e05-7c45-484c-ac5f-f4c6ea82d6cb</wfw:commentRss>
    </item>
    <item>
      <title>Dynamic queries and security</title>
      <description>If you are using dynamically built queries, then employ the following techniques:
&lt;ul&gt;
&lt;li&gt;Delimit single quotes by
     replacing any instance of a single quote with two single quotes which
     prevents the attacker from changing the SQL command. Using the example
     from above, "SELECT * from Users WHERE login = ''' or ''1''=''1' AND
     password = ''' or ''1''=''1'" has a different result than "SELECT
     * from Users WHERE login = '' or '1'='1' AND
     password = '' or '1'='1'".&lt;/li&gt;
&lt;li&gt;Remove hyphens from user
     input to prevent the attacker from constructing a query similar to: SELECT
     * from Users WHERE login = 'mas' -- AND
     password ='' that would result in the second half of the query being
     commented out and ignored. This would allow an attacker that knows a valid
     user login to gain access without knowing the user's password.&lt;/li&gt;
 &lt;li&gt;Limit the database permissions granted to the user
     account under which the query will be executing. Use different user
     accounts for selecting, inserting, updating, and deleting data. By
     separating the actions that can be performed by different accounts you
     eliminate the possibility that an insert, update, or delete statement
     could be executed in place of a select statement or vice versa.&lt;/li&gt;
 &lt;/ul&gt;</description>
      <link>http://www.navazhylau.com/blog/post/Dynamic-queries-and-security.aspx</link>
      <author>vlad</author>
      <comments>http://www.navazhylau.com/blog/post/Dynamic-queries-and-security.aspx#comment</comments>
      <guid>http://www.navazhylau.com/blog/post.aspx?id=af24aa13-c7fb-44c1-a6fd-da40df53733d</guid>
      <pubDate>Mon, 24 Dec 2007 08:09:38 +0200</pubDate>
      <category>security</category>
      <dc:publisher>vlad</dc:publisher>
      <pingback:server>http://www.navazhylau.com/blog/pingback.axd</pingback:server>
      <pingback:target>http://www.navazhylau.com/blog/post.aspx?id=af24aa13-c7fb-44c1-a6fd-da40df53733d</pingback:target>
      <slash:comments>0</slash:comments>
      <trackback:ping>http://www.navazhylau.com/blog/trackback.axd?id=af24aa13-c7fb-44c1-a6fd-da40df53733d</trackback:ping>
      <wfw:comment>http://www.navazhylau.com/blog/post/Dynamic-queries-and-security.aspx#comment</wfw:comment>
      <wfw:commentRss>http://www.navazhylau.com/blog/syndication.axd?post=af24aa13-c7fb-44c1-a6fd-da40df53733d</wfw:commentRss>
    </item>
  </channel>
</rss>