Tuesday, October 2, 2018

Change the permissions on an assembly in T-SQL.

This has this example:

ALTER ASSEMBLY ComplexNumber WITH PERMISSION_SET =
      EXTERNAL_ACCESS;

 
 

In the Object Explorer in SSMS (Microsoft SQL Server Management Studio) 2016 under a database you will find "Programmability" and under "Programmability" you will find "Assemblies" which will represent encrypted sprocs (stored procedures) and functions from a 3rd party. If a Wonderbox assembly is misbehaving, it may be wise to set it's permissions to something else and then set it back again. This seems to kick a sleeping dog awake.

Add the connection string to a modern .NET Core application at the appsettings.json file.

"ASP.NET Core 2 and Angular 5" by Valerio De Sanctis suggests leading everything else like so:

{
   "ConnectionStrings": {
      "DefaultConnection": "server=.\\JAESCHKE;database=Packt;Integrated
            Security=true;"
   },
   "Logging": {

New session in IE 11

Under the "File" menu in Internet Explorer 11 in addition to "New tab" and "New window" lies "New session" and this third option will open a new window with, yes, a new session. If you are testing through an IIS proxy server and the proxy server can route to one of three IIS webservers, you might disable two webservers (make the AppPool for each unavailable) to ensure that you hit webserver A when hitting the proxy server and then make a second pass through to webserver B with A and C disabled. When you make the switchover, it might be wise to use the "New session" trick to get rid of any A-record-to-IP-address association lingering.

Insecure Transport

When you see this term in HP Fortify's reporting, it probably just means that the web site scanned does not have an SSL certificate. Traffic is traveling over http:// and not https:// and all sorts of bad is associated with that.

Monday, October 1, 2018

Griffon

It's an MVC (Model-View-Controller) framework for the Java space.

five things to unicode encode to prevent SQL injection attacks in web forms applications

HP Fortify itself suggests you can beat most SQL injection attacks at URL line variables in web forms applications by cleaning the strings handed in like so:

string clean = dirty.Replace("&", "&").Replace("\"", """).Replace(">",
      "&gt;").Replace("<", "&lt;").Replace("'", "&apos;");

'tools.jar' seems to be not in IDEA classpath. Please ensure JAVA_HOME points to JDK rather than JRE.

This appeared in a dialog box titled "JDK Required" after I installed IntelliJ IDEA 2016.1.4. I guess I need to go dig up the JDK next. I installed version 2018.1.4 and it put some stuff at C:\Program Files\Java. Maybe I need to find the right JDK and get it installed there too. By the way the IDEA in IntelliJ IDEA stands for integrated development environment application in lieu of just integrated development environment which is what IDE stands for. We have the IDEA acronym just to be silly.