Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Product Lifecycle
  3. Free Tools
  4. BugTracker.NET

BugTracker.NET

Scheduled Pinned Locked Moved Free Tools
csharppythoncomcollaborationtools
11 Posts 4 Posters 2 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D Dominic Burford

    If you are looking for a free .NET based, open-source bugtracking system then look no further than BugTracker.NET[^] It is free, you get the full source-code, there is an active community that can help with your questions should you need help (including the author Corey Trager). It has seamless integration with many version control systems inc. Mercurial and Subversion, giving you the ability to check the changes made against a defect. The Subversion integration is a Python script. If you would rather use something written in .NET then I developed my own which I have uploaded onto Github[^] It can also be themed and styled with your corporate branding. I use this and can highly recommend it :)

    C Offline
    C Offline
    Chris Maunder
    wrote on last edited by
    #2

    We used this for ages and as a simple tool is was a fine, if basic, tool.

    cheers Chris Maunder

    1 Reply Last reply
    0
    • D Dominic Burford

      If you are looking for a free .NET based, open-source bugtracking system then look no further than BugTracker.NET[^] It is free, you get the full source-code, there is an active community that can help with your questions should you need help (including the author Corey Trager). It has seamless integration with many version control systems inc. Mercurial and Subversion, giving you the ability to check the changes made against a defect. The Subversion integration is a Python script. If you would rather use something written in .NET then I developed my own which I have uploaded onto Github[^] It can also be themed and styled with your corporate branding. I use this and can highly recommend it :)

      Richard DeemingR Offline
      Richard DeemingR Offline
      Richard Deeming
      wrote on last edited by
      #3

      Is that the same BugTracker.NET that's currently being discussed on the MSDN blogs? http://blogs.msdn.com/b/cdndevs/archive/2014/09/12/evolving-asp-net-apps-introduction.aspx[^] http://blogs.msdn.com/b/cdndevs/archive/2014/09/19/evolving-asp-net-apps-evaluating-the-code.aspx[^] http://blogs.msdn.com/b/cdndevs/archive/2014/09/26/evolving-asp-net-apps-moving-to-a-web-application.aspx[^] The mention of SQL Injection vulnerabilities in part 2 was enough to put me off. X|


      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

      "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

      J 1 Reply Last reply
      0
      • Richard DeemingR Richard Deeming

        Is that the same BugTracker.NET that's currently being discussed on the MSDN blogs? http://blogs.msdn.com/b/cdndevs/archive/2014/09/12/evolving-asp-net-apps-introduction.aspx[^] http://blogs.msdn.com/b/cdndevs/archive/2014/09/19/evolving-asp-net-apps-evaluating-the-code.aspx[^] http://blogs.msdn.com/b/cdndevs/archive/2014/09/26/evolving-asp-net-apps-moving-to-a-web-application.aspx[^] The mention of SQL Injection vulnerabilities in part 2 was enough to put me off. X|


        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

        J Offline
        J Offline
        jschell
        wrote on last edited by
        #4

        Richard Deeming wrote:

        The mention of SQL Injection vulnerabilities in part 2 was enough to put me off.

        Because you wanted to expose your bug tracking tool directly to the internet?

        Richard DeemingR 1 Reply Last reply
        0
        • J jschell

          Richard Deeming wrote:

          The mention of SQL Injection vulnerabilities in part 2 was enough to put me off.

          Because you wanted to expose your bug tracking tool directly to the internet?

          Richard DeemingR Offline
          Richard DeemingR Offline
          Richard Deeming
          wrote on last edited by
          #5

          Would you implicitly trust all of your employees to have complete control of the bug database? :rolleyes:


          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

          "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

          J 1 Reply Last reply
          0
          • Richard DeemingR Richard Deeming

            Would you implicitly trust all of your employees to have complete control of the bug database? :rolleyes:


            "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

            J Offline
            J Offline
            jschell
            wrote on last edited by
            #6

            In terms of SQL injection attacks??? Then yes. In the last two companies I was the only one with enough SQL experience to do anything real in a SQL database. In the company before that there were probably between 2 and 10 developers with that sort of experience but I would not really expect them to spend their time figuring out how to attack the bug database (that company had very serious big money attack targets.)

            Richard DeemingR 1 Reply Last reply
            0
            • J jschell

              In terms of SQL injection attacks??? Then yes. In the last two companies I was the only one with enough SQL experience to do anything real in a SQL database. In the company before that there were probably between 2 and 10 developers with that sort of experience but I would not really expect them to spend their time figuring out how to attack the bug database (that company had very serious big money attack targets.)

              Richard DeemingR Offline
              Richard DeemingR Offline
              Richard Deeming
              wrote on last edited by
              #7

              But if the bug database is on the same server as your attack targets... :~ I'd generally try to avoid leaving any security vulnerability open to any target audience, no matter how unlikely they are to try to exploit it. After all, SQLi is so simple, even a 3 year old can exploit it[^].


              "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

              "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

              J D 2 Replies Last reply
              0
              • Richard DeemingR Richard Deeming

                But if the bug database is on the same server as your attack targets... :~ I'd generally try to avoid leaving any security vulnerability open to any target audience, no matter how unlikely they are to try to exploit it. After all, SQLi is so simple, even a 3 year old can exploit it[^].


                "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                J Offline
                J Offline
                jschell
                wrote on last edited by
                #8

                Richard Deeming wrote:

                But if the bug database is on the same server as your attack targets

                You have big money targets which are on the same server and database as your bug database?

                Richard DeemingR 1 Reply Last reply
                0
                • J jschell

                  Richard Deeming wrote:

                  But if the bug database is on the same server as your attack targets

                  You have big money targets which are on the same server and database as your bug database?

                  Richard DeemingR Offline
                  Richard DeemingR Offline
                  Richard Deeming
                  wrote on last edited by
                  #9

                  Did you not notice the word "if"? ;P You'll not only need to make sure your bug database is the only application and database on the server; you'll also need to make sure that the SQL service account is locked down, and that the server isn't part of your domain. Otherwise, a breach of that server would compromise your entire network. You'll also need to keep detailed audit logs to track any unauthorised changes to the system. Unless, of course, you don't care about that, in which case you might as well not bother with any authentication or authorization, and just give the users direct admin access to the server. All of which you wouldn't need to worry about if the front-end application was written properly in the first place.


                  "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                  "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                  J 1 Reply Last reply
                  0
                  • Richard DeemingR Richard Deeming

                    Did you not notice the word "if"? ;P You'll not only need to make sure your bug database is the only application and database on the server; you'll also need to make sure that the SQL service account is locked down, and that the server isn't part of your domain. Otherwise, a breach of that server would compromise your entire network. You'll also need to keep detailed audit logs to track any unauthorised changes to the system. Unless, of course, you don't care about that, in which case you might as well not bother with any authentication or authorization, and just give the users direct admin access to the server. All of which you wouldn't need to worry about if the front-end application was written properly in the first place.


                    "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                    J Offline
                    J Offline
                    jschell
                    wrote on last edited by
                    #10

                    Richard Deeming wrote:

                    You'll not only need to make sure your bug database is the only application ...

                    Err...No I would (and have done so) make sure that the bug database and the production boxes had absolutely no commonality. And I would do that regardless of how trustworthy/stable I thought the bug database was.

                    Richard Deeming wrote:

                    All of which you wouldn't need to worry about if the front-end application was written properly in the first place.

                    If there is no commonality at all then I don't need to worry about if the front-end application was written properly in the first place. Which was in fact my point from the beginning.

                    1 Reply Last reply
                    0
                    • Richard DeemingR Richard Deeming

                      But if the bug database is on the same server as your attack targets... :~ I'd generally try to avoid leaving any security vulnerability open to any target audience, no matter how unlikely they are to try to exploit it. After all, SQLi is so simple, even a 3 year old can exploit it[^].


                      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                      D Offline
                      D Offline
                      Dominic Burford
                      wrote on last edited by
                      #11

                      Quote:

                      I'd generally try to avoid leaving any security vulnerability open to any target audience, no matter how unlikely they are to try to exploit it

                      Such as using the Internet ;)

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups