Exposing Authentication Systems to the Internet


Wherever you go there's authentication.  Who am I?  Who are you?  How did we get here?

In the computer world authentication this is critical.  You must know who is taking a specific action.  Authorization is equally important as it is the source for all security and authorization control.

Creating an MD5 hash of a string of characters


MD5 is great for hashing things before storage.  This is especially common for passwords.  By hashing a password locally you do not need to store the actual password, just the hash for later comparrison.

Critical Factors

Required Assemblies


Efficient Programming Methods for Searching LDAP Directories


Lightweight Directory Access Protocol (LDAP) is a way of life when working with identities. This article reviews how to perform an efficent query against an LDAP directory.

What is the gain of all this extra effort when querying LDAP?

Subscribe to RSS