Make your home page Add to your favorites  


Help Desk

Site Map


What's New

Search Software:
  MAC Software | Linux Software | Pocket PC | iPod Software
  Software Directories
PC Tools
DVD & Video
MP3 & Audio
Computer Games
Security & AntiVirus
FTP Client
Email Client
Chat Tools
Telnet Client
Internet Browser
Remote Control
Tools & Utilities
Internet for Mac
NetWork Tools
RSS & Newsreaders

BlackBytes Security for .NET

Implements managed role-based security for .NET Framework. The Security for .NET enables you to manage Windows security. The .NET, like any other application run on Windows, is subject to operating system security restrictions. Windows protects access to system objects using security descriptors. System objects include registry keys, files, and directories and printing services, etc. If you want an application to access any of Windows securable objects, you must make sure that both Code Access Security policy and the DACL settings grant the appropriate access permissions, both to the assembly (or assemblies) constituting the application as well as the user or users you want to be able to run it.

Software Information System Requirements
Version: 1.2
  • Windows 98/2000/XP/NT/ME/vista
  • Disk Space Required: 60MB
  • Memory Required: 64MB
  • Software Required: Microsoft .NET Framework 1.0 and later
License:Free to try, $139.00 to buy
File Size: 7951 KB
Rating :

Key Features of BlackBytes Security for .NET:
  • Microsoft .NET, C#, C++.Managed, VB.NET, ASP.NET and VS.NET compatible
  • Adjust one or more group flags that control group usage within an access token
  • Create copy of an existing token
  • Retrieve statistics information about an access token
  • Identify the source of an access token
  • Determine whether a SID appears within an access token and whether is enabled
  • Create a restricted access token
  • Enumerate available privileges within an access token
  • Enable or disable groups present in an access token
  • Impersonate a client to access thread's access token
  • Check an access token against the security descriptor of an object
  • Retrieve and control the security descriptor of an object
  • Support addition or removing ACEs to/from an ACL
  • Enable to create a copy of an ACL
  • Provide automatic proper ACE order in a DACL after modification
  • Enable to create a new DACL with ACEs
  • Copy all ACEs from a DACL to a new DACL
  • Support object-specific ACEs
  • Merge a DACL to a new security descriptor
  • Enable to set a null DACL of an object
  • Enable to set an empty DACL of an object
  • Inject a new security descriptor to an object
  • Read or set an object's SACL
  • Enable to create a new security descriptor and attach it to an object at creation time
  • Serialize security descriptor to a xml or binary file
  • Enable to modify a DACL or replace a DACL with a new one
  • Control who can perform specific operations on an object
  • Control who has access to a specific property, or set of properties, of an object
  • Create an ACE that grants permissions to a security group, rather than to a single user
  • Validate consistence of a security identifier
  • Convert a user's or groups's textual name to a SID
  • Convert a SID to the trustee's textual name
  • Convert to and from binary and string representations of a SID
  • Build-up a well-known SID from scratch that exist on all systems and indicate accounts such as Guest or Everyone
  • Enable to cache frequently used SID and this way reduce network traffic
  • Serialize SID cache to a file
  • Enable, disable or remove privileges in/from an access token
  • Enumerate an access token privileges
  • Convert privilege name to human-readable form
  • Retrieve privilege's luid
  • Determine whether a privilege is enabled in an access token
  • Retrieve trustee's membership in an access token
  • Determine whether a security descriptor allows access to a trustee
  • Determine maximum access permissions, that a security descriptor grants to trustee
  • Enumerate trusted domains
  • Enumerate accounts on a domain
  • Assign or remove privilege to/from an account
  • Create, load or delete an user profile
  • Retrieve profile specific directory path
  • Determine type of profile
  • Provide information about typical aspects of LSA on a system
  • Enumerate logon rights and privileges assigned to an account
  • Manage auditing policy
  • Lock memory against unauthorized access from the other processes
  • Hold truly secret data in memory and to clean it up when disposing of it
  • Fill memory by zeros when an object is redundant
  • Provide methods that typically only a user with the same logon credential as the encrypter can decrypt the data
  • 100% managed code written in C#
  • Object oriented design specifically for the .NET framework
  • All error handling through .NET exceptions
  • Comprehensive Visual Studio .NET style documentation
  • VB.NET, C# and C++.Managed example source code
  • Includes 12 months free email support and minor release upgrades
  • Royalty free runtime


  Submit Software | Privacy Policy | Terms of Use | Advertise with Us | Contact Us
 Copyright © All rights reserved.