No new comments.
View All Comments
No new messages.
View All Messages
No new notifications.
View All Notifications
Request a new Category
No tag found
Refine by Author
Afzaal Ahmad Zeeshan(2)
Santosh Kumar Adidawarpu(1)
Abhishek Jaiswal :)(1)
Vidya Vrat Agarwal(1)
Mohamed Fawas Perooli(1)
No resource found
Approaches To Security Misconfiguration
Jun 14, 2016.
In this article, you will learn about the approaches to security misconfiguration.
Configure Data Management On The Security and Compliance Center On SharePoint Office 365
Jun 14, 2016.
In this article, you will learn how to configure data management on the security and compliance center on SharePoint Office 365.
Configure Security Policies On the Security And Compliance Center On SharePoint Office 365
Jun 13, 2016.
In this article, you will learn how to configure security policies on the security and compliance center on SharePoint Office 365.
Introducing Security And Compliance Center on SharePoint Office 365
Jun 11, 2016.
In this article you will learn about the Security and Compliance Center on SharePoint Office 365.
Hashing Passwords In .NET Core With Tips
Jun 03, 2016.
In this article you will learn about how to hash passwords in .NET Core with tips.
ASP.NET Application Security With SQL Server
Jun 01, 2016.
In this article, you will learn about ASP.NET Application Security with SQL Server.
MVC Application Security Issues: Software Information & Header Sensitive Data - Part Two
May 24, 2016.
In this article, we will go one step up and cover scenarios which are related to software information (could be version or framework or language information).
MVC Application Security Issues: Cookie Security & URL Attacks - Part One
May 16, 2016.
In this article you will learn MVC Application Security Issues.
Protection Level In WCF
May 16, 2016.
In this article you will learn about Protection Level in WCF.
Security Based Alarm System With Arduino Mega 2560
May 10, 2016.
In this article I will explain about Security Based Alarm System with Arduino Mega 2560
SharePoint Online / Office 365 - Column Level Security - Issues And Possible Options
Apr 22, 2016.
In this article, I’ll explain how to implement site column/field level security so that only authorized users can see the column value.
Getting Started with Azure Key Vault
Apr 21, 2016.
In this article you will learn about Azure Key Vault.
Microsoft Cloud App Security
Apr 19, 2016.
In this article you will learn about Microsoft Cloud App Security.
Insecure Transport - Missing Public Key Pinning
Mar 31, 2016.
This article shares with the reader the steps on how to implement HTTP Public Key Pinning (HPKP) security policy/control.
SSL Certificate Based Authentication In Web API Project
Mar 30, 2016.
In this article you will learn SSL Certificate based Authentication in Web API Project
ASP.NET MVC 5 Security And Creating User Role
Jan 13, 2016.
In this article we will see how to use ASP.NET Identity in MVC Application for creating user roles and display the menu depending on user roles.
Worried About SharePoint Data Loss? It’s Time to Make Your Data Secure
Jan 05, 2016.
In this article you will learn how essential is to keep track of the SharePoint environment where sensitive information is stored and how it is flowing from one user or process to another.
Remove User From Security Group In SharePoint Online And Office 365 Using Nintex Workflows
Dec 31, 2015.
In this article you will learn how to remove user from security groupin SharePoint Online and Office 365 using Nintex Workflows.
Office 365 Add User To Security Group In SharePoint Online And Office 365 Using Nintex Workflows
Dec 30, 2015.
In this article you will learn how to add user to security group in SharePoint Online and Office 365 using Nintex Workflows.
Password Encryption Using Salt Hashing In ASP.NET MVC
Dec 10, 2015.
This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
How To Secure A Folder In Windows 10
Nov 19, 2015.
In this article we can learn how to lock and safe your private data and folder in Windows 10 without any software.
WCF Security Implementation
Nov 13, 2015.
In this article you will learn WCF Security Implementation.
Validating Social Security Numbers Through Regular Expressions
Nov 09, 2015.
In this article you will learn how to validate Social Security numbers through Regular Expressions.
A Word Of Fear For Android Devices
Oct 16, 2015.
In this article we will learn about a word of fear for Android devices. With this increase of users now a days, mobile security is also at risk because a bug called StageFright.
Cloud Security For Windows Azure
Oct 03, 2015.
In this article, I will discuss and present cloud security features of Azure Cloud Services.
Security On The Web By Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML)
Sep 23, 2015.
In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
Create SharePoint Security Group Using JSOM
Sep 22, 2015.
In this article you will learn how to create SharePoint Security Group using JSOM.
Security Options And Scope In Web API
Sep 14, 2015.
In this article you will learn security options and scope in Web API.
Security And Validations In .NET
Sep 07, 2015.
In this article you will learn security and validations in .NET.
Efficiently Storing Passwords in .NET Framework
Jul 30, 2015.
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
Authentication Modes Available in SQL Server
Jul 10, 2015.
This article shows how to connect to SQL Server to access data or information.
Implementing Username Password Security in WCF Service
Jul 09, 2015.
This article explains username and password authentication with mixed security mode.
View Wi-Fi Password in Windows 10 Without External Application
Jul 05, 2015.
This article shows how to view the Wi-Fi password in Windows 10 without an external application.
RESTful Day #5 - Security in Web API - Basic & Token Based Custom Authorization in Web APIs Using Action Filters
Jun 30, 2015.
This article explains security in Web APIs including Basic Authentication and Token Based Custom Authorization in Web APIs using Action Filters.
Security Enhancements in Windows 10
May 29, 2015.
In this article we will learn what the new security enhancements are in Windows 10 to make it more secure.
Microsoft Ignite: Windows 10, Cloud, Office 365, Email and Windows Security, Cortana Intelligence
May 11, 2015.
In this article we will learn about Microsoft Ignite Windows 10, Cloud Office 365 Email and Windows Security Cortana Intelligence.
Manage SQL Azure Security
May 03, 2015.
In this article you wil learn how to manage SQL Azure Security: Logins, Users, Roles, Schemas and Permissions.
OWASP #5 Security Misconfiguration : Hardening your ASP.NET App
Apr 02, 2015.
There has been two resounding key points that have continued to surface when you’re analyzing each of these security flaws that might not be immediately obvious: authorization failure and application leakage. I bring that up now so you have an opportunity to see the pattern that continues to surface.
Musings on "Employee on Cloud"
Mar 09, 2015.
The article discusses the concept of work from anywhere and whether it is already here but has still not gained popular ground.
LAME Question of the Day: How To Store a Password in a Database?
Feb 02, 2015.
How to store a password in a database?
Passphrase vs Password For Security
Jan 17, 2015.
In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
Security Feature in ASP.Net MVC
Jan 12, 2015.
Security features in ASP.NET MVC
Internet of Things Explained
Dec 29, 2014.
This article explains "Internet of Things" .
Web Service in ASP.Net (Security by SOAP Authentication): Part 5
Dec 27, 2014.
In this article we will learn how to use a Web Method after Authentication.
Vulnerable Encoded URLs
Nov 22, 2014.
In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text and is susceptible to MITM attack.
Securing IIS Server Checklists
Nov 19, 2014.
This article addresses the common IIS web server security specification in form of checklist.
Code Acceptance Checklist in .NET
Oct 23, 2014.
This article provides a Code Acceptance Checklist for .NET.
Code Acceptance Checklist in Sharepoint
Oct 22, 2014.
This article provides a Code Acceptance Checklist for SharePoint.
OWASP Top 10 Risks #2: Broken Authentication and Session Management
Oct 16, 2014.
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where things can go wrong and how to prevent it.
Security Trimmed Control in SharePoint 2013
Sep 05, 2014.
This article explains the Security Trimming Control in SharePoint 2013.
Be Sure With Azure (.NET): Blob Storage
Sep 02, 2014.
This article is the first in the series “Be Sure With Azure” and provides an in-depth look at Azure Blob storage with special emphasis on best practices, pitfalls to avoid and a healthy dose of security.
SAML-based Authentication in SharePoint 2013
Sep 01, 2014.
In SAML claims mode, SharePoint 2013 accepts SAML tokens from a trusted external Security Token Provider (STS).
CRUD Operation Using Entity Framework Code-First
Aug 26, 2014.
In this article you will learn how to use the Code-First approach for better security in ASP.NET MVC.
Authentication Using WCF Message Security - 1
Jul 28, 2014.
In this article we will see how authentication can be done using Windows Authentication over message security, custom username and password authentication over the message security and finally the Mutual X509 authentication over the message security.
Basics Of WCF Security
Jul 28, 2014.
This article is all about the basics of the WCF Security; in other words, this is the starting point of diving into the WCF Security concepts.
Dedicated Administrator Connection (DAC) on SQL Server
Jun 20, 2014.
This article shows how to make a Dedicated Administrator Connection (DAC) to allow administrators emergency access to SQL Server via SQL Server Management Studio (SSMS) or via command prompt (SQLCMD utility).
Hiding the Version Information of .Net Framework Due to Security Issue
Jun 04, 2014.
In this article I will demonstrate how to hide version information of the .Net Framework, which is the "medium level" security issue named "Information Disclosure".
SQL Database Mail Profile Name is Not Valid in SQL Server 2012
May 16, 2014.
This article explains how to send emails using the msdb.dbo.sp_send_dbmail Stored Procedure as a non-sysadmin user in SQL Server 2012.
An Overview of Cryptography
May 01, 2014.
Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
Get Missing Objects For a Particular User in a Database
Apr 30, 2014.
In this article I will explain how to get missing objects for a particular user in a database.
Browser Security Issues
Apr 27, 2014.
In this article I will tell you about Browser Security Issues.
ASP.Net Interview Questions For Beginners and Professionals
Apr 14, 2014.
Here in this article, we will cover ASP.NET Interview Questions related to Security, Cache management and so on.
OpenID Connect Availability in OWIN Security Components
Mar 31, 2014.
This article shows how to use the the brand new feature of OWIN security components used in the ASP.NET, OpenID Connect. You can use it in ASP.NET Web Applications.
Implementation of Security In QlikView Application
Mar 28, 2014.
This article provides a basic procedure for implementing security in QlikView.
Security in QlikView
Mar 28, 2014.
This article describes security in QlikView.
HTML Security in SharePoint 2013
Feb 26, 2014.
This article is an introduction to the HTML Field Security feature, as well as take you through some of its common functionalities.
Improving the Performance of ASP.Net Programming
Feb 18, 2014.
This article describes the various features that are recommended to be used in ASP.NET Web Applications and what's not to use in such applications.
Introduction To Preservation Used in ASP.Net SignalR
Jan 03, 2014.
This article introduces the preservation used in ASP.NET SignalR applications.
Oct 21, 2013.
To Determine the Password Policies For Windows 7
Sep 02, 2013.
In this article determine the password policies security for window 7.
Implementing Simple Message Security Using WsHttpBinding
Aug 08, 2013.
In this exercise we will replace basicHttpBinding by wsHttpBinding. Thus we secure the HTTP request mechanism that secures the message using message security.
.NET Code Access Security (CAS)
Aug 06, 2013.
Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from unauthorized actions.
OData Security Guidance in ASP.Net Web API
Jul 19, 2013.
This article explains OData Security Guidance.
OWASP Top 10 Vulnerabilities
Jun 25, 2013.
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
MongoDB With C#
Jun 17, 2013.
This article describes the basics of working with MongoDB using C#.
How to Modify Security For the Active Directory-Integrated Zone
Jun 11, 2013.
In this article you will learn how to modify security for the Active Directory-Integrated Zone.
SQL Security Functions: Part 4
Jun 04, 2013.
In this article I describe the Transact-SQL security functions SUSER_ID , SUSER_NAME , SUSER_SID , SUSER_SNAME and SYSTEM_USER.
SQL Security Functions: Part 2
Jun 03, 2013.
In this article I describe the Transact-SQL security functions IS_MEMBER , IS_SRVROLEMEMBER , LOGINPROPERTY, ORGINAL_LOGIN and PERMISSION.
SQL Security Functions: Part 3
Jun 03, 2013.
In this article I describe the Transact-SQL security functions SUSER_ID, SUSER_NAME, SESSION_USER and SESSIONPROPERTY.
SQL Security Functions: Part 1
May 31, 2013.
In this article I describe the Transact-SQL security functions CURRENT_USER, HAS_DBACCESS, HAS_PERMS_BY_NAME and HASHBYTES.
SharePoint Permissions - Important Aspects
Apr 30, 2013.
In this article I am trying to reveal the important permissions aspects of SharePoint 2010. Please note that this will be a subset of Security.
Configuring the System For Component Services by Setting Administrative Security
Apr 23, 2013.
In this article we will discuss configuration of the system for Component Services by setting Administrative Security.
How to Configure DTC Security to Coordinate Remote Transactions on Your System
Apr 18, 2013.
In this article you will learn how to configure DTC Security to coordinate Remote Transactions on your system.
How to Configure DTC Security to Allow Remote Transactions on Your System
Apr 16, 2013.
In this article you will learn how to configure DTC Security to allow your system to participate in Remote Transections.
C# Corner Delhi Chapter: Learn WCF With C# Corner 13th April, 2013 Official Recap
Apr 15, 2013.
C# Corner Delhi Chapter: Learn WCF With C# Corner 13th April, 2013 Official Recap.
How to Configure DTC Security to Allow Local Transactions on Your System
Apr 15, 2013.
In this article you will learn how to configure DTC Security to allow Local Transactions on your system.
Core OS Layer in iPhone
Mar 12, 2013.
In this article I will explain iOS Core OS Layer and it's framework in iPhone.
Hands on Lab on WCF With C# Corner Mumbai User Group
Mar 08, 2013.
Hands on Lab on Windows Communication Foundation (WCF)
How to Disable Internet Explorer's Enhanced Security in Windows Server 2012
Mar 05, 2013.
In today's article you will learn how to disable the Internet Explorer Enhanced Security Configuration (IE ESC) in Windows Server 2012.
Restrict Access to Drive in Windows 8
Feb 19, 2013.
This article explains how to restrict access to a hard drive partition in Windows 8.
Windows Defender in Windows 8 Includes MSE
Feb 07, 2013.
In this article we are going to explain windows defender in windows 8 includes MSE
Disable Loop Back Check in Windows Server 2012
Feb 06, 2013.
Microsoft introduces a security feature in 2003 server to prevent attacks on windows servers.
Disable Strict Name Check in Windows Server 2012
Feb 06, 2013.
Microsoft has introduced a security feature that refuses to serve a request if the target server name is not the server's actual name.
Security in PHP
Jan 29, 2013.
In this article I explain how to encrypt a password for your application using the crypto function.
How To Use an AppLocker App in Windows 8
Jan 07, 2013.
In this article I have described how to use an AppLocker App in Windows 8.
How to Implement Security in iPhone
Dec 21, 2012.
In this article I will explain how to implement security in iPhone.
Dec 19, 2012.
This application an be used to encrypt a text message using AES encryption as well as send it to the person whose email is provided. This could be used as the security software for any of us. But to decrypt the encrypted text one must have the same application.
How to Completely Disable UAC in Windows 8
Dec 13, 2012.
In this article we are explaining how to disable the User Account Control (UAC) in Windows 8.
How to Disable Synchronization in Windows 8
Dec 07, 2012.
In this article we are going to explain how to disable synchronization feature for all use in windows 8.
Stop Using Location Information in Windows 8
Nov 23, 2012.
This article helps you to maintain security or privacy of location information from spying in Windows 8.
In information technology the
is set of restriction of information assets through the use of technology, processes and training. In Computer,
is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains or even gaining access to them accidentally.
is a branch of Information
and is often used interchangeably with the term. It encompasses several
measures such as software programs like anti-virus suites, firewalls, and user dependant measures such as activating deactivating certain software features like Java scripts, ActiveX and being vigilant in using the computer and the network resources. Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts.
Custom Software Development
MCN is your source for developing solutions involving websites, mobile apps, cloud-computing, databases, BI, back-end services and processes and client-server applications.
CBeyond Cloud Services
TERMS & CONDITIONS
REPORT A BUG
©2016 C# Corner. All contents are copyright of their authors.
Terms & Conditions
©2016 C# Corner. All contents are copyright of their authors.