Large MySQL Database Backup, Restoration, & Offsite Storage at DropBox

Google AdSense

On Monday, my website host’s (DreamHost) database server crashed and they restored the previous week’s data for all of the databases hosted on that server. Eventually, they were able to restore the daily backups to disk, which allowed users to restore that day’s backup. However, when I went to restore the daily backup, it was about 16 hours old.

Within those 16 hours, one forum had hundreds of posts, topics, and forum reorganization; another WordPress blog had two dozen of posts; while my personal blog (this site) had no changes. At the time, my backup scheduled was:
Continue reading

Securing ASP.NET Web Sites: Form Caching

Google AdSense
What is “Form Caching Vulnerability”?

The Form Caching Vulnerability allows sensitive form fields to be cached and retrieved by another user on the same client.

CWE-525: Information Exposure Through Browser Caching

Continue reading

Securing ASP.NET Web Sites: Cookie Vulnerabilities

This is the first of my series on securing ASP.NET web sites. As I work through various vulnerabilities, I’ll document instructions for fellow web developers in hopes that we can help build more secure web applications. The Cookie Vulnerability falls under the common vulnerability name of “Broken Authentication and Session Management.”

What is “Broken Authentication and Session Management”?

This cookie vulnerability is OWASP 2010 A3. You can read more at Top 10 2010-A3-Broken Authentication and Session Management. This threat applies to application functions related to authentication and session management not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or exploit other implementation flaws to assume other users’ identities.
Continue reading

Encrypting Sensitive Data in .NET Config Files

Encrypting your sensitive data in your web.config files is a simple process that can be done two different ways. The first way is to use a command prompt to execute a command and encrypt/decrypt the XML sections. The second way is to encrypt/decrypt programmatically from within your web site.

Things you need to know before starting:

  • Which system account does your ASP.NET web site run as?
    This is usually “NT AuthorityNetwork Service” or “ASPNET” unless specifically configured otherwise.
  • The directory where aspnet_regiis.exe is located. The default installation path is $WINDIR% Microsoft.NET Framework <versionNumber> aspnet_regiis.exe. The last folder is the version of the Framework you are using (v2, v3, v4, etc.)

Continue reading