Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Building Safe ActiveX Internet Controls • Chapter 9 391
allows a control to report to the calling application (also known as the
Container Object) whether it is safe or not.The major advantage of
using IObjectSafety is that you can have a single version of your control
that performs safe under certain circumstances and unsafe under others.
It can programmatically change safety modes to conform to a variety of
situations. Unlike the other method of marking a control as safe, it does
not have to depend on registry entries. From a security standpoint, the
best reason to use IObjectSafety is that someone else cannot come along
behind you, repackage your ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312