security

Magnolia CMS 5.5.5 Choose from roles

五迷三道 提交于 2020-01-13 06:57:08
问题 I am looking for a possibility to choose certain roles in a Page property Dialog. Some parts of the page should be only viewable to certain roles. What I got is - name: allowedRoles class: info.magnolia.ui.form.field.definition.MultiValueFieldDefinition label: Select Roles field: name: roleLinkField class: info.magnolia.ui.form.field.definition.LinkFieldDefinition targetWorkspace: userroles appName: security identifierToPathConverter: class: info.magnolia.ui.form.field.converter

How to identify curl request

依然范特西╮ 提交于 2020-01-13 06:41:09
问题 Is there a way to detect in my script whether the request is coming from normal web browser or some script executing curl. I can see the headers and can distinguish with "User-Agent and other few headers" but in curl fake headers can be set, so i am not able to track the request. Please suggest me ways about identifying the curl or other similar non browser request. 回答1: The only way to catch most "automated" requests is to code in logic that spots activity that couldn't possibly be human

What is the use of debug.keystore in android?

依然范特西╮ 提交于 2020-01-13 05:49:28
问题 i have a small clarification. i have the following question, 1.Whether the debug.keystore is used to generating the apk every time building the project normally? 2.I have done unzip the generated apk file. I came to see certificates are available in META-INF folder. Are these certificates generated with debug.keystore to identify the system identification?. Because, Both SHA1 hash values are same in debug.keystore and cert.RSA of unzipped apk. Please clarify this doubt. Thanks in advance..

Using the .NET Framework security system

蹲街弑〆低调 提交于 2020-01-13 05:22:07
问题 I was wondering - do any of you actually use the various classes in the System.Security.Permissions namespace? I mainly develop desktop/server-side components (i.e., no web) and the general assumption is that FullTrust is always available and no testing is performed on environments for which this is not the case. Apart from MS source code (EnterpriseLibrary and such), I have yet to see actual, in-use source code that makes use of said constructs. Is this prevalent, or are we the exception? I

How do I know if an in-app-purchase receipt comes from the sandbox?

让人想犯罪 __ 提交于 2020-01-13 05:20:08
问题 The iOS IAP documentation states, that if you want to test a store you should log out from you itunes account in the settings application. When doing an in-app-purchase, you are then asked for username and password. However, inside the app, I don't know if the user is logged in or if he is using a sandbox account. In fact, I don't really care if it is a sandbox transaction, but: on the server I have to verify real receipts via the URL https://buy.itunes.apple.com/verifyReceipt and sandbox

REST Web Service Security with jQuery Front-End

丶灬走出姿态 提交于 2020-01-13 05:16:12
问题 Thanks for reading. I would like to develop a secure web application with jQuery as the front-end and .NET MVC as the server-side with its functionality expressed in RESTful web services. At this point I'm trying to envision the security scheme that I will use but I wanted some advice on best practices (obviously I will use https/ssl, but there's more to it than that of course). I have always been a fan of the secret-key approach so I was racking my brain trying to figure out how to employ it

REST Web Service Security with jQuery Front-End

南楼画角 提交于 2020-01-13 05:16:09
问题 Thanks for reading. I would like to develop a secure web application with jQuery as the front-end and .NET MVC as the server-side with its functionality expressed in RESTful web services. At this point I'm trying to envision the security scheme that I will use but I wanted some advice on best practices (obviously I will use https/ssl, but there's more to it than that of course). I have always been a fan of the secret-key approach so I was racking my brain trying to figure out how to employ it

What is the ARN of an assumed role assumed by a Lambda function?

为君一笑 提交于 2020-01-13 05:07:10
问题 I am trying to use the NotPrincipal element in my bucket policy to explicitly deny access to my s3 bucket while whitelisting a particular lambda that accesses the bucket. I specified the role ARN and assumed role ARN for the lambda's role in the NotPrincipal element: "arn:aws:iam::{Account ID}:role/service-role/{Lambda role name}", "arn:aws:sts::{Account ID}:assumed-role/{Lambda role name}/{role session name}" This doc explains the structure of the assumed role ARNs: https://docs.aws.amazon

hash(hash()) vs salted hash

浪子不回头ぞ 提交于 2020-01-13 04:46:29
问题 Since the introduction of Rainbow tables, and using only hashed passwords (e.x: MD5) to stored passwords in database is not the best secured way. When people talk about salted hashes, the always use it in this way hash(password . salt) or even hash(hash(password) . salt) . I don't know why to use salt, and add extra entry for each password to store the salt? Why don't we just use hash(hash(password)) , or even hash(hash(hash(password))) ? Is it more secure to put salt? or just the sense of

Does using web services to expose a .NET DAL add security?

匆匆过客 提交于 2020-01-13 03:49:08
问题 Currently my employer deploys a web application over 3 servers. DB - No public route Web Service DAL - No public route Web Server - Public route The reason for this is the theory that if the web server is compromised, they don't arrive at the DB directly, but instead arrive at the DAL box. To my mind, as the DAL box and Web Sever box - both run windows/IIS - if the public box has been compromised, the same exploit would likely work on the DAL box - therefore I do not see this as a real