No new comments.
View All Comments
No new messages.
View All Messages
No new notifications.
View All Notifications
Request a new Category
No tag found
Refine by Author
Santosh Kumar Adidawarpu(4)
Priyaranjan K S(3)
Afzaal Ahmad Zeeshan(2)
Abhishek Jaiswal :)(1)
Vidya Vrat Agarwal(1)
Mohamed Fawas Perooli(1)
No resource found
Known Wrongs In Securing Software
Sep 24, 2016.
In this article, you will learn about "known wrongs" in securing software.
Encrypting App.config For Multiple Machines
Sep 22, 2016.
Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
Resolving The A5-Security Misconfiguration
Sep 19, 2016.
In this article, you will learn how to resolve the A5-security misconfiguration.
Overview of Azure Security Center
Sep 06, 2016.
In the article, you will learn about Azure Security Center.
How To Use Security In Windows 10
Aug 25, 2016.
In this article, you will learn, how to use security in Windows 10.
What About Data Privacy
Aug 23, 2016.
What developers need to know about data privacy law...
Top 10 Website Security Testing Tools
Aug 22, 2016.
In this article you will learn about the top 10 website security testing tools.
Create Security Groups In SharePoint 2016 Using Web Service And Nintex Workflow 2016
Jul 29, 2016.
In this article, you will learn how to create Security Groups in SharePoint 2016, using Web Service and Nintex Workflow 2016.
Configure Alerts On The Security And Compliance Center On SharePoint Office 365
Jul 28, 2016.
In this article, you will learn how to configure alerts on the Security and Compliance Center on SharePoint Office 365.
Security Group Operations In SharePoint 2016 Using REST API
Jul 27, 2016.
In this article, you will learn about security group operations in SharePoint 2016, using REST API
Add And Remove Users From Security Group In SharePoint 2016, Using REST API
Jul 25, 2016.
In this article, you will learn how to add and remove users from Security Group in SharePoint 2016, using REST API.
Remove User From Security Group On SharePoint Online And Office 365 Using Nintex Workflows
Jul 07, 2016.
In this article, you will learn, how to remove the user from the security group on SharePoint Online and Office 365, using Nintex Workflows.
Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism
Jul 07, 2016.
In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
Authorization Filters In ASP.NET Web API 2 And AngularJS
Jul 03, 2016.
In this article, we are going to explore a security issue which will help us to prevent unauthorized access of a Web API using custom authorization filter.
Azure Security: Introduction To Azure Security Center
Jun 24, 2016.
In this article, you will learn about Azure Security Center.
Service Assurance On The Security And Compliance Center On SharePoint Office 365
Jun 22, 2016.
In this article, you will learn about service assurance on the security and compliance center on SharePoint Office 365.
Configure Search And Investigation On The Security And Compliance Center On SharePoint Office 365
Jun 21, 2016.
In this article, you will learn how to configure search and investigation on the security and compliance center on SharePoint Office 365.
Missing Function Level Access Control And Its Prevention Mechanism
Jun 21, 2016.
In this article, you will learn about missing function level access control and its prevention mechanism.
Insecure Direct Object Reference And Its Prevention Mechanism
Jun 19, 2016.
In this article you will learn about Insecure Direct Object Reference and its prevention mechanism.
Configure Data Management On The Security and Compliance Center On SharePoint Office 365
Jun 14, 2016.
In this article, you will learn how to configure data management on the security and compliance center on SharePoint Office 365.
Approaches To Security Misconfiguration
Jun 14, 2016.
In this article, you will learn about the approaches to security misconfiguration.
Configure Security Policies On the Security And Compliance Center On SharePoint Office 365
Jun 13, 2016.
In this article, you will learn how to configure security policies on the security and compliance center on SharePoint Office 365.
Introducing Security And Compliance Center on SharePoint Office 365
Jun 11, 2016.
In this article you will learn about the Security and Compliance Center on SharePoint Office 365.
Hashing Passwords In .NET Core With Tips
Jun 03, 2016.
In this article you will learn about how to hash passwords in .NET Core with tips.
ASP.NET Application Security With SQL Server
Jun 01, 2016.
In this article, you will learn about ASP.NET Application Security with SQL Server.
MVC Application Security Issues: Software Information & Header Sensitive Data - Part Two
May 24, 2016.
In this article, we will go one step up and cover scenarios which are related to software information (could be version or framework or language information).
Protection Level In WCF
May 16, 2016.
In this article you will learn about Protection Level in WCF.
MVC Application Security Issues: Cookie Security & URL Attacks - Part One
May 16, 2016.
In this article you will learn MVC Application Security Issues.
Security Based Alarm System With Arduino Mega 2560
May 10, 2016.
In this article I will explain about Security Based Alarm System with Arduino Mega 2560
SharePoint Online / Office 365 - Column Level Security - Issues And Possible Options
Apr 22, 2016.
In this article, I’ll explain how to implement site column/field level security so that only authorized users can see the column value.
Getting Started with Azure Key Vault
Apr 21, 2016.
In this article you will learn about Azure Key Vault.
Microsoft Cloud App Security
Apr 19, 2016.
In this article you will learn about Microsoft Cloud App Security.
Insecure Transport - Missing Public Key Pinning
Mar 31, 2016.
This article shares with the reader the steps on how to implement HTTP Public Key Pinning (HPKP) security policy/control.
SSL Certificate Based Authentication In Web API Project
Mar 30, 2016.
In this article you will learn SSL Certificate based Authentication in Web API Project
ASP.NET MVC 5 Security And Creating User Role
Jan 13, 2016.
In this article we will see how to use ASP.NET Identity in MVC Application for creating user roles and display the menu depending on user roles.
Worried About SharePoint Data Loss? It’s Time to Make Your Data Secure
Jan 05, 2016.
In this article you will learn how essential is to keep track of the SharePoint environment where sensitive information is stored and how it is flowing from one user or process to another.
Remove User From Security Group In SharePoint Online And Office 365 Using Nintex Workflows
Dec 31, 2015.
In this article you will learn how to remove user from security groupin SharePoint Online and Office 365 using Nintex Workflows.
Office 365 Add User To Security Group In SharePoint Online And Office 365 Using Nintex Workflows
Dec 30, 2015.
In this article you will learn how to add user to security group in SharePoint Online and Office 365 using Nintex Workflows.
Password Encryption Using Salt Hashing In ASP.NET MVC
Dec 10, 2015.
This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
How To Secure A Folder In Windows 10
Nov 19, 2015.
In this article we can learn how to lock and safe your private data and folder in Windows 10 without any software.
WCF Security Implementation
Nov 13, 2015.
In this article you will learn WCF Security Implementation.
Validating Social Security Numbers Through Regular Expressions
Nov 09, 2015.
In this article you will learn how to validate Social Security numbers through Regular Expressions.
A Word Of Fear For Android Devices
Oct 16, 2015.
In this article we will learn about a word of fear for Android devices. With this increase of users now a days, mobile security is also at risk because a bug called StageFright.
Cloud Security For Windows Azure
Oct 03, 2015.
In this article, I will discuss and present cloud security features of Azure Cloud Services.
Security On The Web By Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML)
Sep 23, 2015.
In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
Create SharePoint Security Group Using JSOM
Sep 22, 2015.
In this article you will learn how to create SharePoint Security Group using JSOM.
Security Options And Scope In Web API
Sep 14, 2015.
In this article you will learn security options and scope in Web API.
Security And Validations In .NET
Sep 07, 2015.
In this article you will learn security and validations in .NET.
Efficiently Storing Passwords in .NET Framework
Jul 30, 2015.
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
Authentication Modes Available in SQL Server
Jul 10, 2015.
This article shows how to connect to SQL Server to access data or information.
Implementing Username Password Security in WCF Service
Jul 09, 2015.
This article explains username and password authentication with mixed security mode.
View Wi-Fi Password in Windows 10 Without External Application
Jul 05, 2015.
This article shows how to view the Wi-Fi password in Windows 10 without an external application.
RESTful Day #5 - Security in Web API - Basic & Token Based Custom Authorization in Web APIs Using Action Filters
Jun 30, 2015.
This article explains security in Web APIs including Basic Authentication and Token Based Custom Authorization in Web APIs using Action Filters.
Security Enhancements in Windows 10
May 29, 2015.
In this article we will learn what the new security enhancements are in Windows 10 to make it more secure.
Microsoft Ignite: Windows 10, Cloud, Office 365, Email and Windows Security, Cortana Intelligence
May 11, 2015.
In this article we will learn about Microsoft Ignite Windows 10, Cloud Office 365 Email and Windows Security Cortana Intelligence.
Manage SQL Azure Security
May 03, 2015.
In this article you wil learn how to manage SQL Azure Security: Logins, Users, Roles, Schemas and Permissions.
OWASP #5 Security Misconfiguration : Hardening your ASP.NET App
Apr 02, 2015.
There has been two resounding key points that have continued to surface when you’re analyzing each of these security flaws that might not be immediately obvious: authorization failure and application leakage. I bring that up now so you have an opportunity to see the pattern that continues to surface.
Musings on "Employee on Cloud"
Mar 09, 2015.
The article discusses the concept of work from anywhere and whether it is already here but has still not gained popular ground.
LAME Question of the Day: How To Store a Password in a Database?
Feb 02, 2015.
How to store a password in a database?
Passphrase vs Password For Security
Jan 17, 2015.
In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
Security Feature in ASP.Net MVC
Jan 12, 2015.
Security features in ASP.NET MVC
Internet of Things Explained
Dec 29, 2014.
This article explains "Internet of Things" .
Web Service in ASP.Net (Security by SOAP Authentication): Part 5
Dec 27, 2014.
In this article we will learn how to use a Web Method after Authentication.
Vulnerable Encoded URLs
Nov 22, 2014.
In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text and is susceptible to MITM attack.
Securing IIS Server Checklists
Nov 19, 2014.
This article addresses the common IIS web server security specification in form of checklist.
Code Acceptance Checklist in .NET
Oct 23, 2014.
This article provides a Code Acceptance Checklist for .NET.
Code Acceptance Checklist in Sharepoint
Oct 22, 2014.
This article provides a Code Acceptance Checklist for SharePoint.
OWASP Top 10 Risks #2: Broken Authentication and Session Management
Oct 16, 2014.
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where things can go wrong and how to prevent it.
Security Trimmed Control in SharePoint 2013
Sep 05, 2014.
This article explains the Security Trimming Control in SharePoint 2013.
Be Sure With Azure (.NET): Blob Storage
Sep 02, 2014.
This article is the first in the series “Be Sure With Azure” and provides an in-depth look at Azure Blob storage with special emphasis on best practices, pitfalls to avoid and a healthy dose of security.
SAML-based Authentication in SharePoint 2013
Sep 01, 2014.
In SAML claims mode, SharePoint 2013 accepts SAML tokens from a trusted external Security Token Provider (STS).
CRUD Operation Using Entity Framework Code-First
Aug 26, 2014.
In this article you will learn how to use the Code-First approach for better security in ASP.NET MVC.
Basics Of WCF Security
Jul 28, 2014.
This article is all about the basics of the WCF Security; in other words, this is the starting point of diving into the WCF Security concepts.
Authentication Using WCF Message Security - 1
Jul 28, 2014.
In this article we will see how authentication can be done using Windows Authentication over message security, custom username and password authentication over the message security and finally the Mutual X509 authentication over the message security.
Dedicated Administrator Connection (DAC) on SQL Server
Jun 20, 2014.
This article shows how to make a Dedicated Administrator Connection (DAC) to allow administrators emergency access to SQL Server via SQL Server Management Studio (SSMS) or via command prompt (SQLCMD utility).
Hiding the Version Information of .Net Framework Due to Security Issue
Jun 04, 2014.
In this article I will demonstrate how to hide version information of the .Net Framework, which is the "medium level" security issue named "Information Disclosure".
SQL Database Mail Profile Name is Not Valid in SQL Server 2012
May 16, 2014.
This article explains how to send emails using the msdb.dbo.sp_send_dbmail Stored Procedure as a non-sysadmin user in SQL Server 2012.
An Overview of Cryptography
May 01, 2014.
Cryptography is an art and science of secret communications. Cryptography is a technique used to provide security by encoding messages to make them non-readable.
Get Missing Objects For a Particular User in a Database
Apr 30, 2014.
In this article I will explain how to get missing objects for a particular user in a database.
Browser Security Issues
Apr 27, 2014.
In this article I will tell you about Browser Security Issues.
ASP.Net Interview Questions For Beginners and Professionals
Apr 14, 2014.
Here in this article, we will cover ASP.NET Interview Questions related to Security, Cache management and so on.
OpenID Connect Availability in OWIN Security Components
Mar 31, 2014.
This article shows how to use the the brand new feature of OWIN security components used in the ASP.NET, OpenID Connect. You can use it in ASP.NET Web Applications.
Security in QlikView
Mar 28, 2014.
This article describes security in QlikView.
Implementation of Security In QlikView Application
Mar 28, 2014.
This article provides a basic procedure for implementing security in QlikView.
HTML Security in SharePoint 2013
Feb 26, 2014.
This article is an introduction to the HTML Field Security feature, as well as take you through some of its common functionalities.
Improving the Performance of ASP.Net Programming
Feb 18, 2014.
This article describes the various features that are recommended to be used in ASP.NET Web Applications and what's not to use in such applications.
Introduction To Preservation Used in ASP.Net SignalR
Jan 03, 2014.
This article introduces the preservation used in ASP.NET SignalR applications.
Oct 21, 2013.
To Determine the Password Policies For Windows 7
Sep 02, 2013.
In this article determine the password policies security for window 7.
Implementing Simple Message Security Using WsHttpBinding
Aug 08, 2013.
In this exercise we will replace basicHttpBinding by wsHttpBinding. Thus we secure the HTTP request mechanism that secures the message using message security.
.NET Code Access Security (CAS)
Aug 06, 2013.
Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from unauthorized actions.
OData Security Guidance in ASP.Net Web API
Jul 19, 2013.
This article explains OData Security Guidance.
OWASP Top 10 Vulnerabilities
Jun 25, 2013.
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
MongoDB With C#
Jun 17, 2013.
This article describes the basics of working with MongoDB using C#.
How to Modify Security For the Active Directory-Integrated Zone
Jun 11, 2013.
In this article you will learn how to modify security for the Active Directory-Integrated Zone.
SQL Security Functions: Part 4
Jun 04, 2013.
In this article I describe the Transact-SQL security functions SUSER_ID , SUSER_NAME , SUSER_SID , SUSER_SNAME and SYSTEM_USER.
SQL Security Functions: Part 2
Jun 03, 2013.
In this article I describe the Transact-SQL security functions IS_MEMBER , IS_SRVROLEMEMBER , LOGINPROPERTY, ORGINAL_LOGIN and PERMISSION.
SQL Security Functions: Part 3
Jun 03, 2013.
In this article I describe the Transact-SQL security functions SUSER_ID, SUSER_NAME, SESSION_USER and SESSIONPROPERTY.
SQL Security Functions: Part 1
May 31, 2013.
In this article I describe the Transact-SQL security functions CURRENT_USER, HAS_DBACCESS, HAS_PERMS_BY_NAME and HASHBYTES.
SharePoint Permissions - Important Aspects
Apr 30, 2013.
In this article I am trying to reveal the important permissions aspects of SharePoint 2010. Please note that this will be a subset of Security.
In information technology the
is set of restriction of information assets through the use of technology, processes and training. In Computer,
is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains or even gaining access to them accidentally.
is a branch of Information
and is often used interchangeably with the term. It encompasses several
measures such as software programs like anti-virus suites, firewalls, and user dependant measures such as activating deactivating certain software features like Java scripts, ActiveX and being vigilant in using the computer and the network resources. Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts.
File APIs for .NET
Aspose are the market leader of .NET APIs for file business formats – natively work with DOCX, XLSX, PPT, PDF, MSG, MPP, images formats and many more!
CBeyond Cloud Services
TERMS & CONDITIONS
REPORT A BUG
©2016 C# Corner. All contents are copyright of their authors.
Terms & Conditions
©2016 C# Corner. All contents are copyright of their authors.