security

SOAP KeyInfo values

限于喜欢 提交于 2020-01-14 12:59:08
问题 I am trying to set up my Signature for a SOAP message. The only part I have left is to populate KeyInfo as such: > <KeyInfo> > <wsse:SecurityTokenReference> > <wsse:KeyIdentifier ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentifier">XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX</wsse:KeyIdentifier> > </wsse:SecurityTokenReference> > </KeyInfo> I have tried a number of methods, but I have been unable to achieve this using KeyInfo and

WWW vs non WWW — What's the best practice? I need to pick one for my new SSL Certificate [closed]

百般思念 提交于 2020-01-14 12:39:09
问题 Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it's on-topic for Stack Overflow. Closed 7 years ago . Should my site be a www or non-www address? This is a pretty basic question. I wanted to see what people consider to be the best practice here. The reason I have to pick is I need to buy an SSL certificate for one or the other. Of course I can redirect to the one I pick on the back-end and the technicals are not

Can you determine if Wifi security is enabled on network you're connected to on iOS?

丶灬走出姿态 提交于 2020-01-14 12:18:31
问题 In my iOS app, I'd like to be able to determine whether the Wifi network the device is currently connected to has Wifi security of some sort enabled (wep, wpa, etc). CaptiveNetwork provides the SSID of the connected network, but not much else. Is there an approved way of determining if WEP/WPA/etc are enabled on the currently connected Wifi network? 回答1: Apple is not providing any Wifi related API and all the information that is available to you is given by the actual network, so basically

Protecting API Secret Keys in a Thick Client application

☆樱花仙子☆ 提交于 2020-01-14 11:27:02
问题 Within an application, I've got Secret Keys uses to calculate a hash for an API call. In a .NET application it's fairly easy to use a program like Reflector to pull out information from the assembly to include these keys. Is obfuscating the assembly a good way of securing these keys? 回答1: Probably not. Look into cryptography and Windows' built-in information-hiding mechanisms (DPAPI and storing the keys in an ACL-restricted registry key, for example). That's as good as you're going to get for

Protecting API Secret Keys in a Thick Client application

不想你离开。 提交于 2020-01-14 11:25:29
问题 Within an application, I've got Secret Keys uses to calculate a hash for an API call. In a .NET application it's fairly easy to use a program like Reflector to pull out information from the assembly to include these keys. Is obfuscating the assembly a good way of securing these keys? 回答1: Probably not. Look into cryptography and Windows' built-in information-hiding mechanisms (DPAPI and storing the keys in an ACL-restricted registry key, for example). That's as good as you're going to get for

CreateEvent from Windows-7 Logon Screen

馋奶兔 提交于 2020-01-14 10:14:17
问题 I'm asking this question because it turns out that there's some difficulty in writing a screensaver app in Delphi that's capable of running from the Logon screen. See question: Windows 7 logon screensaver in Delphi I've narrowed down the problem (or at least one problem) to a particular Win API call CreateEvent . SyncEvent := CreateEvent(nil, True, False, ''); if SyncEvent = 0 then RaiseLastOSError; This code only fails if called from the Logon screen. And GetLastError returns that access is

CreateEvent from Windows-7 Logon Screen

Deadly 提交于 2020-01-14 10:13:10
问题 I'm asking this question because it turns out that there's some difficulty in writing a screensaver app in Delphi that's capable of running from the Logon screen. See question: Windows 7 logon screensaver in Delphi I've narrowed down the problem (or at least one problem) to a particular Win API call CreateEvent . SyncEvent := CreateEvent(nil, True, False, ''); if SyncEvent = 0 then RaiseLastOSError; This code only fails if called from the Logon screen. And GetLastError returns that access is

Cookie security when passed over SSL

…衆ロ難τιáo~ 提交于 2020-01-14 09:36:07
问题 Am I correct in thinking that if you pass a session cookie over an SSL encrypted request that the cookie could only be read by an attacker who had direct access to the computer that the cookie had been sent to, or the server it has been sent from, provided they are unable to crack the encryption? 回答1: SSL encrypts all traffic, including the header (which contains the cookie value). On the other hand, the cookie can be accessed via Javascript on the client machine, unless you have marked it as

How browsers know what cookies to send to server when requesting?

帅比萌擦擦* 提交于 2020-01-14 09:32:51
问题 I know how the cookies work, just started to dig why Codeigniter does not store generated csrf token in SESSION, it just store in cookie. Concerned about security, I'v started to think about php setcookie() function params such as path and domain. And I have asked myself is it possible to set 'evil_cookie' with a path='/' and domain = 'www.goodsite.com' from another domain, from some 'www.evilsite.com'? And another question is, will 'evil_cookie' be sent to 'www.goodsite.com' when performing

SecretKeyFactory.getInstance() throws exception for all algorithms in unit tests

主宰稳场 提交于 2020-01-14 09:17:14
问题 By some reason I always get exception in unit test when calling SecretKeyFactory.getInstance() no matter what algorithm is specified. For example: SecretKeyFactory.getInstance("PBEWITHMD5ANDDES") com.mhe.connect.util.EncryptionException: java.security.NoSuchAlgorithmException: PBEWITHMD5ANDDES SecretKeyFactory not available At the same time, I see that Security.getProviders() returns me needed algorithms: SECRETKEYFACTORY.DESEDE SunJCE SECRETKEYFACTORY.PBEWITHMD5ANDDES SunJCE SECRETKEYFACTORY