aaaaa

Exposing Authentication Systems to the Internet

Introduction

Wherever you go there's authentication.  Who am I?  Who are you?  How did we get here?

In the computer world authentication this is critical.  You must know who is taking a specific action.  Authorization is equally important as it is the source for all security and authorization control.

Creating an MD5 hash of a string of characters

Description

MD5 is great for hashing things before storage.  This is especially common for passwords.  By hashing a password locally you do not need to store the actual password, just the hash for later comparrison.

Critical Factors

Required Assemblies

Tags:

Efficient Programming Methods for Searching LDAP Directories

Description

Lightweight Directory Access Protocol (LDAP) is a way of life when working with identities. This article reviews how to perform an efficent query against an LDAP directory.

What is the gain of all this extra effort when querying LDAP?

Subscribe to tekkon7.net RSS