Mega Code Archive

Categories
1) Android
2) ASP.Net
3) ASP.Net Tutorial
4) C
5) C Tutorial
6) C#
7) C# Book
8) C# by API
9) C# Tutorial
10) C++
11) C++ Tutorial
12) Delphi
13) Flash ActionScript
14) Flex
15) Java
16) Java Book
17) Java by API
18) Java Tutorial
19) JavaScript DHTML
20) JavaScript Reference
21) JavaScript Tutorial
22) MSOfficeExcel 2007 Tutorial
23) MSOfficePowerPoint 2007 Tutorial
24) MSOfficeWord 2007 Tutorial
25) MSSQL
26) MSSQL Tutorial
27) MySQL
28) MySQL Tutorial
29) Oracle PLSQL
30) Oracle PLSQL Tutorial
31) Perl
32) Php
33) PostgreSQL
34) Python
35) Python Tutorial
36) Ruby
37) Silverlight
38) VB.Net
39) VB.Net by API
40) VB.Net Tutorial
41) Visual C++ .NET
42) VisualBasic Script
43) XML
44) XML Tutorial
 
C# Tutorial
1) 2D Graphics
2) ADO Net
3) Assembly
4) Attribute
5) Class
6) Data Type
7) Date Time
8) Delegate
9) Design Patterns
10) Development
11) Directory Services
12) File Directory Stream
13) Generic
14) GUI Windows Forms
15) Internationalization
16) Language Basics
17) LINQ
18) Network
19) Operator
20) Operator Overload
21) Preprocessing Directives
22) Reflection
23) Regular Expression
24) Security
25) Statement
26) String
27) Struct
28) Thread
29) Unsafe
30) WCF
31) Windows
32) Workflow
33) WPF
34) XML
35) XML LINQ
Security
1) A declarative role-based security demand for the current principal
2) A declarative role-based security demand for the current principal to be a member of the roles Managers OR Developers
3) Add a rule that allows the current user the right to read permissions on the mutex
4) An imperative role-based security demand for the current principal to represent an identity with the name Anya AND be a member of
5) An imperative role-based security demand for the current principal to represent an identity with the name Anya, the roles of the
6) Asymmetric cryptography
7) Attempt to use RemoveAccessRuleSpecific on the original rule
8) Checking for access in a role
9) Create a CryptoStream using the MemoryStream
10) Create a new instance of the CipherData class using CipherReference information
11) Create and use a DESCryptoServiceProvider object to encrypt and decrypt data in a file
12) Create and use a DESCryptoServiceProvider object to encrypt and decrypt data in memory
13) Create Evidence
14) Create PrincipalPermission for Administrators
15) Cryptographically sound random numbers
16) CspParameters and RSACryptoServiceProvider
17) Declarative role-based security
18) Declarative security demands
19) Determining group identity
20) Encrypt an XML document using an asymmetric key
21) Encrypt with RSACryptoServiceProvider
22) EncryptedDecrypted string
23) File IO Permission
24) Generate 32 bytes of random data
25) Generate the hash code of the files contents
26) Generate the hash code of the password
27) Generate the keyed hash code of the files contents
28) Get current principal identity name
29) Get the current identity
30) Get the current identity and its associated principal
31) Get the Evidence collection from the loaded assembly and Display the Host Evidence
32) Imperative security demands
33) Impersonation
34) Instantiates a new SecureString object by passing its constructor a pointer to a character array
35) Internet SecurityAction
36) Iterate through the group names to see if the current user is a member of each one
37) Link demands
38) Manufacture and print an example policy
39) MutexSecurity and MutexAccessRule
40) Obtain a WindowsIdentity object representing the currently logged on Windows user
41) Optional permission request for IsolatedStorageFilePermission
42) PrincipalPolicy IntersectUnion
43) Produce a SHA1 hash
44) Produce an MD5 hash
45) PublicKey Cryptography
46) Read password from console
47) Refuse request for ReflectionPermission
48) RSACryptoServiceProvider reads from xml key
49) Sand-boxing protected operations
50) Secret Key Cryptography
51) Specify the certification file
52) Symmetric Encryption
53) Test if the current assembly has the specified permission
54) UnmanagedCode element of SecurityPermission( controls the codes ability to execute unmanaged code)
55) Use DataReference to encrypt and decrypt multiple XML elements using different session keys
56) Use RC2 to encrypt and decrypt text file
57) Use RemoveAccessRuleAll method removes all rules that match user and AccessControlType, ignoring rights and flags
58) Use RemoveAccessRuleSpecific with the correct rights
59) Use RSAPKCS1SignatureFormatter to create a digital signature and then uses the RSAPKCS1SignatureDeformatter class to verify the s
60) Use the AsnEncodedDataCollection class
61) Use X500DistinguishedName
62) Using ProtectedData to protect string value
63) Using ProtectedMemory to protect a string
64) Using RSACryptoServiceProvider
65) Using RSAPKCS1SignatureDeformatter
66) Work with SemaphoreSecurity