Mastodon

Control name prefixes are the work of the devil and other religious debates

Earlier today I asked the question I know it's a bit of a religious debate, but control name prefixes (txt, lbl); useful practice or the devil's work? [http://twitter.com/#!/troyhunt/status/9051426315567104] and was a little surprised by the result. Actually, what surprised me was the unanimous “devil’s work” response when I expected some balanced arguments! What am I talking about? I’m talking about names that look like this: <asp:Label runat="server" ID="lblFirstName" /> <asp:TextBox runat="...

You're deploying it wrong! TeamCity, Subversion & Web Deploy part 5: Web Deploy with TeamCity

<< Part 4: Continuous builds with TeamCity [https://www.troyhunt.com/you-deploying-it-wrong-teamcity_25/] In the first four parts of this series we got config transforms playing nice, command line builds and packaging ticking along, Web Deploy happily receiving our application and TeamCity continuously building the entire solution on every commit. The last thing to do is to harmonise everything so that we can actually automate the deployment. Breaking down the build and deploy processes First...

You're deploying it wrong! TeamCity, Subversion & Web Deploy part 4: Continuous builds with TeamCity

<< Part 3: Publishing with Web Deploy [https://www.troyhunt.com/you-deploying-it-wrong-teamcity_24] Part 5: Web Deploy with TeamCity >> [https://www.troyhunt.com/you-deploying-it-wrong-teamcity_26/] Over the last three posts in this series, we got to the point where all the Microsoft bits are working really nicely together. Config transforms, packaging and Web Deploy are great stable mates in the world of web application deployment. The bit that’s missing though is automation. Actually there a...

You're deploying it wrong! TeamCity, Subversion & Web Deploy part 3: Publishing with Web Deploy

<< Part 2: MSBuild and deployable packages [https://www.troyhunt.com/2010/11/you-deploying-it-wrong-teamcity_11.html] Part 4: Continuous builds with TeamCity >> [https://www.troyhunt.com/2010/11/you-deploying-it-wrong-teamcity_25.html] In the first two parts of this series we got config transforms working and the web app successfully bundled into a nice self-contained deployable package. Next up: get the thing to publish. For the most part, the vast majority of web app deployment has historica...

You're deploying it wrong! TeamCity, Subversion & Web Deploy part 2: MSBuild and deployable packages

<< Part 1: Config transforms [https://www.troyhunt.com/2010/11/you-deploying-it-wrong-teamcity.html] Part 3: Publishing with Web Deploy >> [https://www.troyhunt.com/2010/11/you-deploying-it-wrong-teamcity_24.html] In the first part of the series we looked at config transforms and how we’ve moved on from the bad old days of manual Web.config configuration at release time. Now let’s take a look at how we can incorporate this into a nice clean deployable package with the rest of the application....

You're deploying it wrong! TeamCity, Subversion & Web Deploy part 1: Config transforms

Part 2: MSBuild and deployable packages >> [https://www.troyhunt.com/2010/11/you-deploying-it-wrong-teamcity_11.html] If you publish a web application using CTRL-C and CTRL-V, you’re deploying it wrong. If you manually run an Xcopy command, you’re deploying it wrong. If you use an FTP client to move your files to a remote server, you’re deploying it wrong. If not everyone is following exactly the same release process, you’re deploying it wrong. If publishing involves any manual handling of...

OWASP Top 10 for .NET developers part 5: Cross-Site Request Forgery (CSRF)

This content is now available in the Pluralsight course "OWASP Top 10 Web Application Security Risks for ASP.NET" [http://www.pluralsight.com/courses/owasp-top10-aspdotnet-application-security-risks] If you’re anything like me (and if you’re reading this, you probably are), your browser looks a little like this right now: A bunch of different sites all presently authenticated to and sitting idly by waiting for your next HTTP instruction to update your status, accept your credit card or email...

Why the target “Package” does not exist in the project

I wasn’t intending to write about this simply because to be honest, it’s a stupid mistake. What swung me into blogger mode was that if I had found this post in my searches a couple of hours ago I’d be relaxing with a cold beer right now rather than nursing the sore head I’ve been banging against the wall this evening. This is all about MSBuild [http://msdn.microsoft.com/en-us/library/wea2sca5(VS.90).aspx] and more specifically, targeting “Package” so that the app can then be pushed out to a ser...

Do you trust your hosting provider and have they really installed the padding oracle patch?

Finally they’ve delivered! Earlier today the much awaited padding oracle patch was released by Microsoft. As usual, Scott Guthrie has written about it and you can find all the info in ASP.NET Security Update Now Available [http://weblogs.asp.net/scottgu/archive/2010/09/28/asp-net-security-update-now-available.aspx] . It’s not a moment too soon either. According to Thai Duong [http://vnhacker.blogspot.com/], half of the duo responsible for bringing the vulnerability in ASP.NET to public awarenes...

Why sleep is good for your app’s padding oracle health

The last week hasn’t been particularly kind to ASP.NET, and that’s probably a more than generous way of putting it. Only a week ago now, Scott Guthrie wrote about an Important ASP.NET Security Vulnerability [http://weblogs.asp.net/scottgu/archive/2010/09/18/important-asp-net-security-vulnerability.aspx] ; the padding oracle exploit. I watched with interest as he was flooded with a barrage of questions (316 as of now) and realised that whilst he’d done his best to explain the mitigation, he obvio...