In this article we will discuss providing a programmable method of securing files on for your ASP.Net applications. This code could come in handy where you have an application hosted on an ISP and you do not have access to a folder outside of your Web directory structure, and you are not able to change permissions on folder in the Web. This method does not require storing your file in a binary field in your database, thus reducing cost of having to buy database storage from your ISP, and with no impact on the network traffic between the database and web servers.
Ideally, every application built would be designed with correct date handling techniques. In practice, applications are often built using ad hoc date formatting to match a corporate culture, the default format on a company’s server, or the favorite format of the lead developer. Also, many applications are not locale aware or were not designed to be deployed in an environment where locale issues were not considered important. Because of this it is extremely important to know the date formats in use for input and output when building applications that will integrate with other systems or databases and to handle these formats explicitly.
While ASP.NET 2.0 is completely backwards compatible with ASP.NET 1.1, its new features may require you to revise parts of your Web applications. This article provides a detailed analysis of how changes in ASP.NET 2.0 will influence your porting decisions.
ASP.NET 2.0 Training : Referencing Master Page Members - In this tutorial you will learn about reference Master Page Mebers, add property to Master Page, expose Master Properties.
Microsoft provides an easy way to dynamically register client side code at runtime. Unfortunately, it can only place the code within the body of a web page. I have two suggestions on how to work around this issue and register code in the header.
This article provides one solution for replicating content to multiple share locations using VB.Net. This could be useful where you have a Web application hosted on a Web farm and you wish to have files uploaded via the Web, and then replicate the uploaded files to other servers in the farm.
Marcus Mac Innes demonstrates how security on a web site can be compromised by taking advantage of holes within the application code. These holes can be discovered by using a series of probes which disclose whether or not vulnerability exists. He also demonstrated using a Cross Site Scripting attack how the Forms Authentication cookie could be stolen and silently sent to an attacker's website to be stored for later use. The key message of the talk is to ensure that all user input is validated before any other processing is done. This together with strict use of secure coding standards would have disabled any attacker's opportunities. Source code included.
This article describes how to send emails with attachments using System.Web.Mail namespace from an ASP.NET page. Full source code available for download.