Resources  
  • Learn about Keyed Services Use in .NETMar 11, 2024. .NET 8 introduces native support for keyed services in Dependency Injection (DI), eliminating the need for third-party packages. Learn about registering and resolving keyed services with examples for better understanding.
  • What is New in .NET 9Mar 04, 2024. .NET 9, succeeding .NET 8, places particular emphasis on cloud-native applications and enhancing performance. It will receive standard-term support (STS) for 18 months.
  • Azure DevOps: Integrate Key Vault Secrets with Local Self-Hosted AgentFeb 26, 2024. Learn how to integrate Azure Key Vault secrets into Azure Pipelines for secure CI/CD processes using Self-hosted Local Agents. The comprehensive guide covers Azure DevOps setup, Key Vault management, and YAML configuration, ensuring a robust and secure development lifecycle.
  • How Do You Define Custom Key Modifier Aliases in Vue.jsFeb 26, 2024. In Vue.js, enhance keyboard event handling by defining custom key modifier aliases through Vue.config.keyCodes. This guide details the process, demonstrating how to create and utilize these aliases in Vue templates.
  • Azure Key Vault Creation, RBAC Setup, User Addition, Secret ManagementFeb 21, 2024. Azure Key Vault empowers secure storage of secrets, keys, and certificates. Implement RBAC for fine-grained access control, manage users, and grant permissions. Easily create backup, delete, and restore secrets, ensuring robust security and compliance with Azure's comprehensive toolset.
  • Third-party API Integration in Asp.NET Core Web APIFeb 20, 2024. ASP.NET Core is a powerful framework for building web APIs, allowing developers to create robust and scalable applications. One of the key features of modern web development is the integration of third-party APIs, which provide access to external services and data.
  • Using Azure Workbooks to Visualize Key Metrics for Your WebsiteFeb 14, 2024. Learn how to create a workbook to visualize the region of origin for your website's traffic using Azure Monitor Application Insights.
  • Cybersecurity of External Streaming Data - ConfidentialityFeb 14, 2024. This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and practical implementations like TripleDES encryption.
  • Explain Keyed Services in .NET 8Feb 12, 2024. This article explores the concept of keyed services in .NET 8, a new feature enhancing dependency injection capabilities. It explains the benefits of using keyed services, along with detailed steps on their implementation through a real-world data storage example.
  • Key Design Patterns in Software EngineeringFeb 08, 2024. Discover essential design patterns such as Singleton, Factory, Abstract Factory, Unit of Work, Repository, and Command Query Responsibility Segregation (CQRS). Learn their applications and implementations, and see how they synergize to enhance software architecture and development.
  • What Are Relationships in Power BIFeb 08, 2024. This content provides an overview of the different types of relationships that can be established between tables in Power BI. It discusses four main types of relationships: many-to-one, one-to-one, one-to-many, and many-to-many.
  • Data Vault Design in Azure SQL - Read PII with Customer KeysFeb 05, 2024. Data Vault design in Azure SQL - Utilizing Customer keys to read PII information in databases. Ensuring data security in the cloud era is crucial, especially with the rise in data attacks. Protecting Personally Identifiable Information (PII) is paramount during cloud migration.
  • Using XML Key-Value Pairs in C# as a DictionaryJan 30, 2024. To represent key-value pairs in XML, you typically use elements and attributes. how to represent key-value pairs in XML using C#. It covers XML file creation, interface and enum implementation, and methods for getting and setting values in an XML file. The example includes a WPF application for interaction.
  • đź”’ Azure Key Vault Certificate Validation with C#Jan 23, 2024. In this informative article, we will delve into the world of secure certificate validation in the Azure Key Vault environment using C#. By leveraging the power of the X509Certificate2 class, we can implement robust and secure certificate validation, ensuring the integrity and trustworthiness of digital communications. Through practical code examples, we will showcase best practices and seamlessly integrate Azure Key Vault for centralized and secure certificate management. By elevating our understanding of secure coding practices, we can fortify our applications against potential vulnerabilities.
  • Data Insights: Analyzing Key Influencers with Power BI VisualsJan 18, 2024. The key influencers visual helps to understand the factors that drive a metric you're interested in. It analyzes your data, ranks the factors that matter, and displays them as key influencers.
  • What Are Key Modifiers in Angular?Jan 16, 2024. Unleash the power of key modifiers in Angular to capture precise keyboard events. Explore examples like (keyup.enter), (keydown.space), and more, enhancing user interaction in your Angular applications.
  • What Are Key Modifiers in Vue.js?Jan 12, 2024. Master Vue.js keyboard event handling with key modifiers. From @keyup.enter for Enter key to @keyup.ctrl.alt for Ctrl + Alt combination, explore precise event capture for seamless Vue.js applications.
  • Microsoft's Copilot Key: OH MY GOODNESS !Jan 06, 2024. A Window into AI-Powered Computing's Future with CoPilot Key. Microsoft unveils the Copilot key, envisioning an AI-powered future. This dedicated key on Windows 11 PCs promises personalized, ethical AI assistance, seamlessly blending local and cloud processing for an inclusive and intelligent computing experience.
  • Understanding the One-Way Nature of HASHBYTES in SQLJan 05, 2024. This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in SQL Server, isn't designed for decryption but serves as a vital tool for data integrity, password security, and more.
  • Generating X.509 Certificates with Private and Public Keys for IoT Device SecurityJan 02, 2024. In this article, we will explore the process of generating X.509 certificates with private and public keys for IoT device security. This is essential for testing purposes, particularly when working with Azure IoT during the development phase.
  • Azure Key Vault Secret Client Library for Python SDKJan 02, 2024. This module speaks about accessing Key Vault secrets through Python code. Key Vault is a service offered by Azure to store secrets such as passwords, certificates, keys etc in a safe and secure manner.
  • HashMaps in C#Dec 26, 2023. HashMaps in C# using the Dictionary<TKey, TValue> class. This article delves into their basics, operations, and performance, providing essential insights for efficient key-value pair management in programming.
  • Configuration providers in .NET Dec 22, 2023. Core concepts of configuring applications in .NET through versatile configuration providers. Learn how these providers bridge applications and settings, supporting various sources like files, environment variables, Azure Key Vault, and even custom solutions. Discover the benefits, including decoupling configuration, environment flexibility, extensibility, and enhanced security. Master the art of managing application settings seamlessly in diverse environments with .NET configuration providers.
  • API Keys vs TokensDec 12, 2023. In the realm of APIs, API keys and tokens serve distinct roles. API keys authenticate requests with simplicity, while tokens, like JWTs, offer enhanced security and access control. This article elucidates their differences through examples.
  • How to Remove Malicious Software in Windows 11Dec 11, 2023. Learn the proper and easy method to remove malicious software. Utilize Microsoft's Malicious Software Removal Tool with a step-by-step guide for effective scans. #Cybersecurity #MalwareRemoval
  • Secure Password Hashing with SHA-256 and Salt in PythonDec 07, 2023. In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transforms passwords into nearly unbreakable codes. Before diving into SHA-256, let's explore the foundation: hashing.
  • Difference between wallet, account, addressNov 29, 2023. Master digital finance with wallets, accounts, and addresses. Your gateway to a dynamic financial landscape awaits!
  • Configuring Azure Key Vault in a .NET Core Web APINov 24, 2023. This step-by-step guide explores integrating Azure Key Vault into a .NET Core Web API, enhancing security by securely managing sensitive information like API keys. Detailed instructions ensure a smooth implementation process.
  • Keyed Dependency Injection in .NET 8Nov 16, 2023. Keyed dependency injection, introduced in .NET 8, is a powerful feature allowing service resolution based on specific keys. This enables managing multiple implementations of the same interface efficiently. Learn about its implementation, usage restrictions, and how it enhances flexibility in application design, ensuring a valuable addition to .NET developers' toolkits.
  • What is an API Gateway and What are the Functionalities of the API Gateway?Nov 12, 2023. This article explains the overview of API Gateways and their key functionalities are well-structured and informative. It covers the fundamental concepts, roles, and capabilities of API Gateways in a way that is accessible to both beginners and experienced developers.
  • How to Export Exchange Public Folder to PST?Nov 08, 2023. Are you trying to export the Exchange public folder to PST? Read this article and get the best method to export the exchange public folder to Outlook PST.
  • What is Text Analysis in Artificial IntelligenceNov 02, 2023. what is text analysis in AI, what are the techniques available in the text analaysis, how it would be beneficial to the business, the number of use cases available for the text analaysis and finally the conclusion is discussed in this article
  • Azure Functions C#Oct 23, 2023. Microsoft’s primary compute service is Azure function C#. We gain agility in development by focusing on our code and not worrying about server maintenance by using Azure functions. We are seeing the advantages of Azure functions and the simplicity of the event-driven model functions for integrating Azure services.
  • TripleDES Encryption and Decryption in C#Oct 16, 2023. Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Encryption Standard) is a long-standing encryption method, utilizing three 56-bit keys for both encryption and decryption, also known as symmetric-key encryption. This article delves into TripleDES, elucidating its workings, strengths, and limitations. It compares TripleDES with contemporary encryption methods, placing it within the context of modern cryptography.
  • How to Set-up Trezor Hadware Wallet?Oct 09, 2023. Secure your cryptocurrencies with Trezor Hardware Wallet - the ultimate shield against cyber threats and unauthorized access.
  • How to Decrypt data using RSA algorithm in C#?Oct 03, 2023. In this article, we have sample code for decrypt an encrypted data with help of RSA Decryption algorithm and .pfx file which contains private key for decryption.
  • Angular Hydration: A Key Concept for Web DevelopersSep 27, 2023. Angular Hydration A Key Concept for Web Developers explores the fundamental concept of Angular hydration, a critical element in Angular's rendering process. This concept is pivotal for web developers seeking to optimize the performance and user experience of Angular applications. The title delves into the significance of hydration, explaining how it facilitates the rendering of server-side pre-rendered content while enabling client-side interactivity.
  • How to Use Key Vault in Azure?Sep 21, 2023. I've noticed that you've pasted a detailed set of instructions on how to create an Azure Key Vault and manage secrets within it. Is there anything specific you would like to discuss or ask about this process, or do you have any other questions or topics you'd like to explore? Please feel free to let me know how I can assist you further.
  • Security ASP.net Core MVC (C#) Encryption and DecryptionSep 19, 2023. On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offers valuable insights for developers as well as security enthusiasts about how to secure web applications built on ASP.NET Core MVC.
  • Microsoft Azure Key VaultSep 18, 2023. Learn What is Microsoft Azure Key Vault and How does it Work.
  • Setting Business Constraint for Uniqueness of a Composite Key in Master Data ServicesSep 17, 2023. Setting Business Constraint for Unique Combination of Multiple Columns in Master Data Services
  • Setting Up Azure Blob Storage EncryptionSep 13, 2023. Learn how to configure encryption for Azure Blob Storage to enhance data security. Follow these steps to establish encryption using customer-managed keys in Microsoft Azure.
  • How to Create a Key Vault Using the Microsoft Azure portalSep 11, 2023. To create a Key Vault in the Microsoft Azure portal, first, log in to the Azure Portal at portal.azure.com. Then, click "Create a resource" and search for "Key Vault." Select Key Vault, configure settings including subscription, resource group, and vault name. Define access policies and permissions. Review your configuration and click "Create." Azure will then provision your Key Vault, which provides secure management of keys, secrets, and certificates, ensuring your sensitive data is protected and accessible only to authorized users and applications.
  • Securing .NET/ASP.NET Core Apps with Azure Key Vault Middleware Sep 08, 2023. Securing secrets in a .NET/ASP.NET Core application using Azure Key Vault is crucial for protecting sensitive information like API keys, connection strings, and other configurations. In this example, we'll walk through creating an ASP.NET Core application that leverages Azure Key Vault to store and retrieve secrets. We'll also implement a custom middleware for secure secret retrieval in real-time.
  • Keeping Secrets Safe in .NET/ASP.NET Core Applications with Azure Key VaultSep 07, 2023. Securing secrets in .NET/ASP.NET Core applications using Azure Key Vault is crucial for maintaining the confidentiality and integrity of sensitive information such as API keys, connection strings, and certificates. In this example, I'll walk you through the steps to integrate Azure Key Vault into an ASP.NET Core application to keep secrets safe in real time.
  • Elevating Cloud Security with Azure Key VaultSep 01, 2023. In a digital age where data security is crucial, Azure Key Vault by Microsoft Azure stands as a powerful solution. It centralizes and secures cryptographic keys, secrets, and certificates in the cloud. This enhances data management, access control, and compliance, offering a robust and streamlined approach to safeguarding sensitive information in a cloud-driven world.
  • C# Security: Best Practices for Secure CodingAug 31, 2023. In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to prevent injection attacks, using parameterized SQL queries, using cryptography to protect sensitive data, using HTTPS to protect data in transit, avoiding hardcoding secrets in code, and keeping code up to date with the latest security patches and updates.
  • Google Chrome Shortcut Keys for WindowsAug 27, 2023. This article will teach you about Google Chrome Shortcut Keys for Windows.
  • A comprehensive overview of Dictionary in C#Aug 25, 2023. Dictionaries are essential tools for managing data efficiently through key-value pairs, offering rapid retrieval and manipulation. The Dictionary<TKey, TValue> class empowers developers to effectively add, access, and update items, enhancing performance and problem-solving capabilities.
  • Generating Certificate and Private Key FilesAug 24, 2023. Create local certificates with ease using Visual Studio 2017 Developer Command Prompt. Generate certificate and private key files, then install them locally for enhanced security. Simplify your authentication process.
  • Control access to private data using Azure storage shared access signaturesAug 17, 2023. Learn how an architecture shift using a middleware service and short-duration Azure Storage Shared Access Signatures (SAS) improves data protection and access control. Understand the significance of Azure Storage SAS, its time-limited access, and the role of a SAS generator in securing privileged access.
  • Understanding SSH AuthenticationAug 10, 2023. Unveil the significance of SSH (Secure Shell) in securing network communication. Explore SSH authentication's core concepts, methods, and integration into .NET Core applications for fortified remote interactions.
  • Visual Studio Builds and Key FeaturesJul 26, 2023. Visual Studio Builds Since 2005 and main key features. Explore the growth of Visual Studio, Microsoft's premier Integrated Development Environment, from its inception in 1997 to the latest features in Visual Studio 2022, with advancements including.NET upgrades, language support, and developer-friendly tools.
  • How to Iterate Over JavaScript Object's Properties and Values?Jul 19, 2023. In this article, we will learn How to Iterate Over JavaScript Object's Properties and Values
  • Access Modifiers in C#Jul 05, 2023. Access Modifiers in C#
  • Exploring Node.js Completions with ChatGPTJul 03, 2023. Powerful combination of Node.js development and ChatGPT
  • How Process Models Play a Key Role in Software Development?Jun 28, 2023. The software process model plays a key role in software development. Some of the key roles are given below.
  • Rivest Shamir Adleman(RSA) Algorithm and FunctionsJun 19, 2023. In Java, you can leverage the built-in cryptographic libraries to generate RSA key pairs, encrypt and decrypt messages, and perform digital signatures. This article explores the RSA application and its uses in various functions.
  • Cryptography actions with Hashing in Desktop flow using Microsoft Power AutomateJun 19, 2023. Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Power Automate.
  • Cryptography actions with File in Desktop flow using Microsoft Power AutomateJun 16, 2023. Reading this article, you can learn how to encrypt or decrypt a file using Encrypt from file with AES action and Decrypt to file with AES action with the Desktop flow in Microsoft Power Automate
  • Cryptography Actions with Plain Text in Desktop Flow using Microsoft Power AutomateJun 15, 2023. Reading this article, you can learn how to encrypt or decrypt plain text using Encrypt text with AES action and Decrypt text with AES action with Desktop flow in Microsoft Power Automate.
  • How to get Azure Open AI Keys and EndpointJun 13, 2023. In this article we will discuss the steps on how to get Open AI keys and end point using Azure Portal.
  • From Blockchain to AI: The Key Technologies Driving WebJun 09, 2023. In this article, we'll dive into what makes blockchain and AI so important, how they're changing the way we do business on the web, and why you can't afford to ignore them if you want to stay ahead of the curve in your industry!
  • Step-by-Step Guide: Implementing OTP API in C# Jun 06, 2023. a guide to use otp api c# .net
  • Dot Vs Bracket Notation in JavascriptMay 30, 2023. In this article, we will learn Dot Vs Bracket Notation in Javascript
  • Building a C# and ChatGPT Translator May 23, 2023. Building a C# and ChatGPT Translator
  • How to Create Table in SQL Server with Auto Increment, Primary Key and Foreign Key.May 22, 2023.
  • Adapting to AWS's New Default Security Settings: Ensuring Public Website Access Using S3 WebsitesMay 15, 2023. Solve the impact of recent AWS policy changes, understand the challenges of restricted access, and explore the solution to overcome Access Denied errors. Learn how to adapt your access control strategies to ensure your websites are publicly accessible and discover the key steps to configuring S3 bucket policies for seamless public access.
  • How To Handle Foreign Key Constraints In MySQLMay 09, 2023. In this article, I am going to explain to you the foreign key constraint.
  • SQL Server Constraints: Types and UsageMay 02, 2023. SQL Server Constraints: Types and Usage
  • How To Create A Table In MySQLMay 01, 2023. In this article, ww will learn how to create a table in MySQL easily
  • Azure Storage Security Focuses On Five Key AreasApr 28, 2023. In this article, we will learn Azure storage security focuses on five key areas. In our next article, we will learn about Azure File Storage Service.
  • Integrating Azure Key Vault with a .NET 7 Web ApplicationApr 28, 2023.
  • The Future of Web3: Why PWAs are the Key to Decentralized ApplicationsApr 23, 2023. Discover why PWAs are the key to creating decentralized and secure applications in the Web3 era. Learn how PWAs offer many of the same features as native apps, without the limitations and fees of centralized app stores, and how Web3 technology can enhance security and user control. Explore the advantages of decentralized solutions like PWAs for businesses of all sizes, and stay ahead of the curve in the future of the web.
  • Exploring The Key Components Of .NET - CLR, CTS, And CLSApr 06, 2023. The article explores the three key components of the .NET Framework: the Common Language Runtime (CLR), Common Type System (CTS), and CLS
  • Source Control (7-2), Setup SSH Key For GitLabMar 31, 2023. This article will discuss how to Setup SSH Key for GitLab.
  • Create Microsoft Azure Key Vault Service Instance Using Azure Cloud PortalMar 22, 2023. In this article, you will learn how to create microsoft azure key vault service instance using azure cloud portal.
  • How To Check If A Key Exists In An Object In JavaScriptMar 13, 2023. In this tutorial, we'll determine if a specific key exists in an object in Javascript.
  • Use Azure Portal To Create A Azure Key VaultFeb 27, 2023. In this article you will learn how to implement Azure Key Vault using the Azure portal, Azure Key Vault is a cloud based key management solution and helps to securing cryptographic keys, passwords and certificates, that can be stored in a vault.
  • Manage Disk Encryption Keys For Azure Virtual MachinesFeb 27, 2023. In this article, I will guide you to manage disk encryption keys for Azure virtual machine by using azure Key vault, Azure Key Vault for managing encryption keys that can be used for encrypting our data disk
  • Various Ways To Secure Sensitive Data In C#Feb 13, 2023. In this article we will see Various ways to secure sensitive data in C# with example.
  • Azure Key Vault Configuration And Implementation Using .NET Core 7 Web APIFeb 06, 2023. In this article, you will lean about Azure Key Vault Configuration and Implementation using .NET Core 7 Web API.
  • How To Add Primary Key To Existing Table In SQLJan 30, 2023. In this article, you will learn how to add primary key in an existing table.
  • How To Deploy Azure Function And Azure Key Vault With BicepJan 23, 2023. Use Bicep templates to create an Azure Function, create and populate an Azure Key Vault, and grant least-privilege access rights.
  • Microsoft Azure Key Management ServiceJan 18, 2023. Platform-managed keys (PMKs), a type of encryption key, are only generated, stored, and managed by Azure. PMKs are not used in customer interactions. For Azure Data Encryption-at-Rest, PMKs are the standard type of keys utilized.
  • Microsoft Azure Key Vault ServiceJan 17, 2023. Azure A cloud service called Key Vault is used to store and access secrets safely. Anything you want to strictly regulate who has access to, such as API keys, passwords, certificates, or cryptographic keys, is considered a secret. Vaults and controlled Hardware Security Module (HSM) pools are the two types of containers that the Key Vault service supports.
  • Extract The Key Phrases From The Specific Tweet And Store It In Blob Storage Using Azure Logic AppDec 28, 2022. In this article, we will learn about how to Extract the Key phrases from the specific tweet and store it in blob storage Using Azure Logic App
  • Introduction To Homomorphic Encryption With Microsoft SEALDec 20, 2022. Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preserving privacy.
  • Key Announcements From AWS re:Invent 2022 Dec 19, 2022. Key Announcements from AWS re:Invent 2022.
  • Steps To Upgrade SharePoint 2019 License KeyNov 22, 2022. In this article, you will learn how to upgrade SharePoint 2019 license key.
  • How To Use Hot Key Trigger In Automation AnywhereNov 11, 2022. In this article, you will learn how to use Hot Key Trigger In Automation Anywhere.
  • Creating Public DNS Zone In AzureOct 27, 2022. In this article, we will learn how to create an Azure DNS and how to register the Azure DNS name server to the external domain providers.
  • Introduction To Symmetric EncryptionSep 21, 2022. In this article, you will learn about Symetric Engryption.
  • Cloud Deployment And Services Delivery ModelsSep 05, 2022. In this article, we will learn about the various types of cloud deployment and service delivery models.
  • How To Create Azure Key Vault In Microsoft Azure PortalAug 19, 2022. In this article will learn how to create azure key vault using azure portal. Microsoft azure key vault is a cloud service for securely storing and access application secrets.
  • SQL ConstraintsAug 18, 2022. In this article, we are going to learn about the importance of SQL and its Constraints.
  • Setting Up OpenSSL On Windows 10 MachineJul 17, 2022. This article explains what openssl is and steps to install properly in windows 10 machines.
  • Key Phrases Action In Microsoft Text Analysis Cognitive Service With Desktop Flow Using Microsoft Power AutomateJul 08, 2022. Reading this article, you can learn how to extract text with Microsoft cognitive Text Analysis - Key phrase action in Desktop flow using Microsoft Power Automate.
  • How To Configure SMTP O365 Migration Using TLS 1.2 For SQL Database MailJun 07, 2022. This article will explain to you how exactly you need to configure TLS 1.2 as a default protocol and setup SMTP O365 migration using SQL 2012 Database mail and above versions for Windows Server 2012 and above Common SMTP exceptions we usually faced : The mail could not be sent to the recipients because of the mail server failure. (Sending Mail using Account 2. Exception Message: Cannot send mails to mail server. (Failure sending mail.). )Just follow the steps -
  • Deploy An Apache Server On Public/Private Subnets On AWSJun 05, 2022. This article describes how we can deploy apache server to both private and public EC2 instances

About Public-Key-Cryptography

NA

OUR TRAINING