Sunday, March 25, 2007
Cohen on Howard: Chapter 16
Chapter 16 covers securing RPC, ActiveX and DCOM code.
Cohen:
It's unclear what Kerberos code Cohen is referring to -- perhaps the flag which specifies using Kerberos as the authentication method for RPC?
The chapter presents a number of useful flags when programming RPC code and details the trade-offs of each choice.
As well, the chapter presents information on disabling previously-released ActiveX code with security flaws.
Cohen:
Chapter 16 tells us 50 variables to set to specific values in RPC and Kerberos code (why they don't set these by default I don't know, but expecting Microsoft to do what the authors advise is expecting too much)
It's unclear what Kerberos code Cohen is referring to -- perhaps the flag which specifies using Kerberos as the authentication method for RPC?
The chapter presents a number of useful flags when programming RPC code and details the trade-offs of each choice.
As well, the chapter presents information on disabling previously-released ActiveX code with security flaws.