Products Purchase Publishing Articles Support Company Contact |
Products > Books > .NET > Hijacking .NET |
|||||||
Moving to VB .NET: Strategies, Concepts and Code Introduction Table of Contents Sample Chapter Sample Code Updates Visual Basic .NET or C#: Which to Choose Updates Regular Expressions with .NET Updates Obfuscating .NET: Protecting your code from prying eyes Updates Tracing and Logging in .NET Telling Time with .NET Hijacking .NET (series) Exploring .NET (series)
|
Note: This page describes a product or book that, while still relevant to .NET programmers, is based on an earlier version of the .NET framework. The page is available for archival purposes and as a courtesy to those who have linked to it, but is no longer being updated or maintained.
Hijacking .NET (series)
|
|
Hijacking .NET is today's equivalent of using undocumented Windows API functions. Except that not only are the functions under discussion undocumented, they are actually private - functions internal to the .NET framework that were never intended to be used from outside.
In this new eBook series, Dan Appleman will teach you how to find these hidden functions, how to use disassembly and common sense to figure out what they do, and how to implement code that uses them (along with a straightforward explanation of the relative risks of doing so).
In this first volume, you'll learn a few lines of .NET code can allow you to determine which roles (groups) an account belongs to. You'll learn how to extend a couple of .NET classes using hidden method calls and a few API calls to allow you to easily set the account and group security for a file or directory.
In this volume, you'll learn about the security implications of using reflection to access private members in an assembly, and about the design patterns and specific methods you can use to prevent others from using these techniques on your assemblies.