Access Control List in .NET FrameworkWritten by Balaji
Access Control List in .NET Framework Once you complete developing a web application, you need to secure it. This is when aspect of security comes into picture. There will be some portions of your application which need to be secured from users. Securing an application may need extra hardware to build complex multi-layer systems with firewalls, and also some highly secure features. Security enables you to provide access to a specified user after user is authenticated and authorized to access resources in your web application. The Access Control List is used in authorization process. The basic concepts of security are Authentication, Authorization, Impersonation and Data or functional security. Authentication is process that enables to identify a user, so that only that user is provided access to resources. Authorization is process that enables to determine whether a particular user can be given access to resources that user requests. Impersonation is process that provides access to resources requested by a user under a different identity. Data or functional security is process of securing a system physically, updating operating system and using robust software. Some elements of an operating system, Internet Information Server (IIS), and .NET Framework work in coordination to provide features required to execute security concepts mentioned above. For example, Windows 2000 uses its own list of user accounts for identifying and authenticating users. IIS identifies users based on information provided by Windows, when users access a web site. IIS after identification of users, passes this information to ASP.NET. Then user information is checked for authorization.
| | Selecting a Cell PhoneWritten by Deryck Richards
 | By Deryck Richards Managing Partner DESKTRONIX desktronix.com (562) 694-2853 | More Than Just a Phone Selecting a cell phone is no longer just about mobile communication – it is now a lifestyle choice. If you don’t select phone that fits your personality, you won’t be happy with it. New cell phones are beginning to have little in common with earlier cell phones. The new models feature color screens, digital cameras, high-speed internet connections, multimedia games, and music playback. In case you were wondering, you can also use them to make phone calls. It’s only a matter of time before everyone has these features on their cell phones. Text messaging or “texting” is now available standard on most cell phones. It is similar to instant messaging except that messages are sent and received by cell phones instead of computers. Multimedia messaging allows you to send audio, video, and pictures as an attachment to a text message. Multimedia messaging was once seen as entertainment, but is rapidly becoming valuable to business world. Real estate agents take photos of houses with their cell phones and employment agencies may use camera phones to photograph job applicants – all away from their office. Dial In On Options Cellular providers in United States use either GSM or CDMA technology. When you buy a cell phone, it is tied to either GSM or CDMA cellular network, but can't be converted from one to other. If you ever switch cellular providers, you may also need to switch phones. Most cellular providers now have high-speed data networks. These data networks work with high-end cell phones and special network cards you can purchase for laptops. Data networks usually transmit data slightly faster than a dialup internet connection. These networks are still being developed and are yet to be available everywhere. Look for higher speed networks to be much more common by 2006.
|