Building Secure Applications
The following article is a publication that describes a few guidelines, which should be followed when building secure applications.
A strong-named assembly containing hooks to a RC4 Crypto engine and a cryptographic hashing algorithm using salts can be downloaded. (Not yet completely tested) Please notice, the crypto interface is now prepared for other algorithms.
A strong-named assembly containing hooks to a RC4 Crypto engine and a cryptographic hashing algorithm using salts can be downloaded. (Not yet completely tested) Please notice, the crypto interface is now prepared for other algorithms.
Download PDF | Download Assembly |
0 Comments:
Post a Comment
<< Home