No new comments.
View All Comments
No new messages.
View All Messages
No new notifications.
View All Notifications
Request a new Category
No tag found
Refine by Author
Priyaranjan K S(3)
Praveen Kumar Sreeram(1)
Santosh Kumar Adidawarpu(1)
Abhishek Jaiswal :)(1)
Vidya Vrat Agarwal(1)
Manoj Singh Panwar(1)
Dhananjay Kumar (1)
No resource found
Network Security Groups In Azure Networking
Nov 20, 2016.
In this article, we will learn the details about Network Security Groups in more detail.
Overview of Azure Security Center
Sep 06, 2016.
In the article, you will learn about Azure Security Center.
How To Use Security In Windows 10
Aug 25, 2016.
In this article, you will learn, how to use security in Windows 10.
Top 10 Website Security Testing Tools
Aug 22, 2016.
In this article you will learn about the top 10 website security testing tools.
Create Security Groups In SharePoint 2016 Using Web Service And Nintex Workflow 2016
Jul 29, 2016.
In this article, you will learn how to create Security Groups in SharePoint 2016, using Web Service and Nintex Workflow 2016.
Configure Alerts On The Security And Compliance Center On SharePoint Office 365
Jul 28, 2016.
In this article, you will learn how to configure alerts on the Security and Compliance Center on SharePoint Office 365.
Add And Remove Users From Security Group In SharePoint 2016, Using REST API
Jul 25, 2016.
In this article, you will learn how to add and remove users from Security Group in SharePoint 2016, using REST API.
Remove User From Security Group On SharePoint Online And Office 365 Using Nintex Workflows
Jul 07, 2016.
In this article, you will learn, how to remove the user from the security group on SharePoint Online and Office 365, using Nintex Workflows.
Azure Security: Introduction To Azure Security Center
Jun 24, 2016.
In this article, you will learn about Azure Security Center.
Service Assurance On The Security And Compliance Center On SharePoint Office 365
Jun 22, 2016.
In this article, you will learn about service assurance on the security and compliance center on SharePoint Office 365.
Configure Search And Investigation On The Security And Compliance Center On SharePoint Office 365
Jun 21, 2016.
In this article, you will learn how to configure search and investigation on the security and compliance center on SharePoint Office 365.
Configure Data Management On The Security and Compliance Center On SharePoint Office 365
Jun 14, 2016.
In this article, you will learn how to configure data management on the security and compliance center on SharePoint Office 365.
Approaches To Security Misconfiguration
Jun 14, 2016.
In this article, you will learn about the approaches to security misconfiguration.
Configure Security Policies On the Security And Compliance Center On SharePoint Office 365
Jun 13, 2016.
In this article, you will learn how to configure security policies on the security and compliance center on SharePoint Office 365.
Introducing Security And Compliance Center on SharePoint Office 365
Jun 11, 2016.
In this article you will learn about the Security and Compliance Center on SharePoint Office 365.
ASP.NET Application Security With SQL Server
Jun 01, 2016.
In this article, you will learn about ASP.NET Application Security with SQL Server.
MVC Application Security Issues: Software Information & Header Sensitive Data - Part Two
May 24, 2016.
In this article, we will go one step up and cover scenarios which are related to software information (could be version or framework or language information).
MVC Application Security Issues: Cookie Security & URL Attacks - Part One
May 16, 2016.
In this article you will learn MVC Application Security Issues.
SharePoint Online / Office 365 - Column Level Security - Issues And Possible Options
Apr 22, 2016.
In this article, I’ll explain how to implement site column/field level security so that only authorized users can see the column value.
ASP.NET MVC 5 Security And Creating User Role
Jan 13, 2016.
In this article we will see how to use ASP.NET Identity in MVC Application for creating user roles and display the menu depending on user roles.
Remove User From Security Group In SharePoint Online And Office 365 Using Nintex Workflows
Dec 31, 2015.
In this article you will learn how to remove user from security groupin SharePoint Online and Office 365 using Nintex Workflows.
Office 365 Add User To Security Group In SharePoint Online And Office 365 Using Nintex Workflows
Dec 30, 2015.
In this article you will learn how to add user to security group in SharePoint Online and Office 365 using Nintex Workflows.
WCF Security Implementation
Nov 13, 2015.
In this article you will learn WCF Security Implementation.
Validating Social Security Numbers Through Regular Expressions
Nov 09, 2015.
In this article you will learn how to validate Social Security numbers through Regular Expressions.
Cloud Security For Windows Azure
Oct 03, 2015.
In this article, I will discuss and present cloud security features of Azure Cloud Services.
Security On The Web By Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML)
Sep 23, 2015.
In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
Create SharePoint Security Group Using JSOM
Sep 22, 2015.
In this article you will learn how to create SharePoint Security Group using JSOM.
Implementing Username Password Security in WCF Service
Jul 09, 2015.
This article explains username and password authentication with mixed security mode.
RESTful Day #5 - Security in Web API - Basic & Token Based Custom Authorization in Web APIs Using Action Filters
Jun 30, 2015.
This article explains security in Web APIs including Basic Authentication and Token Based Custom Authorization in Web APIs using Action Filters.
OWASP #5 Security Misconfiguration : Hardening your ASP.NET App
Apr 02, 2015.
There has been two resounding key points that have continued to surface when you’re analyzing each of these security flaws that might not be immediately obvious: authorization failure and application leakage. I bring that up now so you have an opportunity to see the pattern that continues to surface.
Authentication Using WCF Message Security - 1
Jul 28, 2014.
In this article we will see how authentication can be done using Windows Authentication over message security, custom username and password authentication over the message security and finally the Mutual X509 authentication over the message security.
Hiding the Version Information of .Net Framework Due to Security Issue
Jun 04, 2014.
In this article I will demonstrate how to hide version information of the .Net Framework, which is the "medium level" security issue named "Information Disclosure".
Browser Security Issues
Apr 27, 2014.
In this article I will tell you about Browser Security Issues.
OpenID Connect Availability in OWIN Security Components
Mar 31, 2014.
This article shows how to use the the brand new feature of OWIN security components used in the ASP.NET, OpenID Connect. You can use it in ASP.NET Web Applications.
Implementation of Security In QlikView Application
Mar 28, 2014.
This article provides a basic procedure for implementing security in QlikView.
HTML Security in SharePoint 2013
Feb 26, 2014.
This article is an introduction to the HTML Field Security feature, as well as take you through some of its common functionalities.
Implementing Simple Message Security Using WsHttpBinding
Aug 08, 2013.
In this exercise we will replace basicHttpBinding by wsHttpBinding. Thus we secure the HTTP request mechanism that secures the message using message security.
.NET Code Access Security (CAS)
Aug 06, 2013.
Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from unauthorized actions.
OData Security Guidance in ASP.Net Web API
Jul 19, 2013.
This article explains OData Security Guidance.
How to Modify Security For the Active Directory-Integrated Zone
Jun 11, 2013.
In this article you will learn how to modify security for the Active Directory-Integrated Zone.
SQL Security Functions: Part 4
Jun 04, 2013.
In this article I describe the Transact-SQL security functions SUSER_ID , SUSER_NAME , SUSER_SID , SUSER_SNAME and SYSTEM_USER.
SQL Security Functions: Part 2
Jun 03, 2013.
In this article I describe the Transact-SQL security functions IS_MEMBER , IS_SRVROLEMEMBER , LOGINPROPERTY, ORGINAL_LOGIN and PERMISSION.
SQL Security Functions: Part 3
Jun 03, 2013.
In this article I describe the Transact-SQL security functions SUSER_ID, SUSER_NAME, SESSION_USER and SESSIONPROPERTY.
SQL Security Functions: Part 1
May 31, 2013.
In this article I describe the Transact-SQL security functions CURRENT_USER, HAS_DBACCESS, HAS_PERMS_BY_NAME and HASHBYTES.
How to Configure DTC Security to Coordinate Remote Transactions on Your System
Apr 18, 2013.
In this article you will learn how to configure DTC Security to coordinate Remote Transactions on your system.
How to Configure DTC Security to Allow Remote Transactions on Your System
Apr 16, 2013.
In this article you will learn how to configure DTC Security to allow your system to participate in Remote Transections.
How to Configure DTC Security to Allow Local Transactions on Your System
Apr 15, 2013.
In this article you will learn how to configure DTC Security to allow Local Transactions on your system.
How to Disable Internet Explorer's Enhanced Security in Windows Server 2012
Mar 05, 2013.
In today's article you will learn how to disable the Internet Explorer Enhanced Security Configuration (IE ESC) in Windows Server 2012.
How to Implement Security in iPhone
Dec 21, 2012.
In this article I will explain how to implement security in iPhone.
Understanding How Assert Effects Security in VB.NET
Nov 10, 2012.
This article expalins about how asserts effect security in VB.NET. How you restrict access to your library modules and resources requires that you understand the pros and cons in the security process used.
Application Level Security System in VB.NET
Nov 08, 2012.
This article will provide help in developing an Application Level Security System.
How to Turn on Security Centre Alerts in Windows 8
Nov 02, 2012.
In this article I have described how to turn on the Windows Security Center alerts popup message in Windows 8.
Maintain Security on List in SharePoint 2010 Programmatically Using VS 2012
Sep 06, 2012.
Today, in this article let’s play around with one of the interesting and most useful concepts in SharePoint 2010.
Programmatically Edit SharePoint Security Group Quick Launch
Jul 05, 2012.
In this article you will see how to programmatically edit the SharePoint Security Group Quick Launch.
Folder-Level Security in SharePoint 2010
Jun 11, 2012.
In this article you will learn Folder-Level Security in SharePoint 2010.
Working with Encrypting Data for Security in WP7
Apr 30, 2012.
In this article we are going to see how to encrypt data and use it in Windows phone 7 application development.
Turn Off Windows Security Center Alerts in Windows 8
Apr 23, 2012.
In this article I will describe how to turn off the Windows Security Center Alerts in Windows 8.
How to Disable the Open File Security Warning in Windows 8
Apr 16, 2012.
In this article we will learn how to disable an open file security warning in Windows 8
Implement Windows Authentication and Security in WCF Service
Dec 21, 2011.
In this article, I'll explain how we can implement Windows authentication with transport level security in Intranet environment.
Sandbox Security in HTML5
Dec 17, 2011.
In this article I have explored the basic if sandbox attributes in HTML5 to provide security to the host pages while using IFRAME.
Understanding Security Framework Model in ASP.NET 3.5
Apr 28, 2011.
Security is an important part of any web application development which is necessary to protect assets from unauthorized actions. This encapsulates verifying users, granting or denying access to sensitive information, or protecting data stored on the server.
CAS (Code Access Security) & .NET 4.0 Security Model FAQ (With Full Video Demonstration)
Oct 23, 2010.
This article first starts with the basic concepts of CAS like evidence, permission, code groups and caspol.exe. It then moves ahead to demonstrate how CAS can be implemented in real world. This article further talks about ground up changes made in .NET 4.0 for CAS. In those regards it discusses about security transparent model and sandboxing.
Global.asax in ASP.NET for locking web pages, security and license management system
Jun 21, 2010.
In this article we will see that global.asax file events. So we can use this every web application for application control, state and Application management , locking web pages , security of web application and license management system.
6 Steps to Implement DUAL Security on WCF Using User Name + SSL
May 20, 2010.
In the article we will try to apply DUAL security using transport plus message on WCF services. So we will first try to understand the basic concepts of WCF security i.e. transport and message. Once we understand the concept we will move step by step to how to implement SSL and user name security on WCF services.
Custom WSE 3.0 Policy Assertion - Modifying the Security Header Generated by WSE
May 04, 2010.
Recently I encoutered an issue in the WSE security header of an ASP.Net application consuming a Java web service using WSE 3.0 involving the automatic addition of a timestamp in the security header when the UsernameToken is added to the RequestSoapContext.
Authentication on Windows Azure using security certificates
Apr 02, 2010.
This article will talk about a work around describing how to implement certificate based authentication using the any version of Windows Azure released till date.
.NET Framework Security Tools
Mar 19, 2010.
In this article I will explain you about the .NET Framework Security Tools.
Transport level Security in WCF
Aug 10, 2009.
This article will give a very brief introduction of transport level security in WCF.
WCF FAQ Part 3 - 10 Security Related FAQ
Jun 23, 2009.
In this article we will start with transport and message security understanding. We will then see simple code samples of how to implement transport and message security using WsHTTP bindings. We will also see what is the difference between ‘BasicHttpBinding’ and ‘WsHttpBinding’ with the help of a simple source code. WCF security is a huge topic by itself, but we are sure with this article you will get a quick start of how to go about WCF security.
Integrated Security with Web Application
Jan 30, 2007.
This article will give you an idea about how Integrated Security works with Web Application using Active Directories.
Code Access Security - Implementing Publishers Based Security Using Digital Certificates
Dec 04, 2006.
This article explains how to implement publishers based security using digital certificates.
ASP.NET Security With SQL Server 2005
Jul 11, 2006.
This article focuses on security concerm when using SQL Server 2005 in ASP.NET application.
Role Based Security Using Authorization Manager in Windows Server 2003
Jul 10, 2006.
Authorization Manager in Windows 2003 is the more flexible, scalable and easier administration tool for role based security. Using Authorization Manager we can define roles and the tasks that roles can perform.
Message-level Declarative Security Using WSE 3.0
Mar 06, 2006.
Web Services Enhancement version 3.0 (WSE 3.0) is a SOAP extension managed API (Microsoft.Web.Services3.dll) compatible with the .Net Framework 2.0. This article explores WSE 3.0 in terms of implementing message-level declarative security to Web services and Web service clients.
How to get Security UserId after windows Starts a Session
Feb 23, 2006.
This article explains how to get the security userid after a succesful login when windows starts the session for authenticated user.
Code Access Security using C# in VS.NET 2005
Feb 17, 2006.
This article will focus on the definition and configuration of the Code Access Security Policy.
How to Maintain a CodeGroup in Security Policy at Runtime?
Jul 05, 2005.
Whenever protected resources are accessed by an assembly, it’s permissions are determined by the code access security system of CLR. Each permission set granted to an assembly is based on the assembly's evidence (such as its URL or publisher certificate, strong name), which in turn is based on configurable security policy.
Exploring Security in .NET: Part I
Jul 05, 2005.
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
Implementing Security Access Rights in ASP.NET Button
Mar 24, 2004.
In Web based Application, each of the users have different privileges and access rights based on their roles. Each of these roles can have read or write access for different Web pages.
.NET Security in C#
Apr 22, 2002.
This article shows how to make file I/O access be denied if the user running the application did not have administrator privileges.
Security In IoT
Nov 24, 2016.
In this article, you will learn about security in IoT.
Deep Dive Into Microsoft Cloud (Azure) Security
Nov 17, 2016.
In this article, you will learn about Microsoft Cloud (Azure) Security from a curious customer questions perspective.
Resolving The A5-Security Misconfiguration
Sep 19, 2016.
In this article, you will learn how to resolve the A5-security misconfiguration.
Security Group Operations In SharePoint 2016 Using REST API
Jul 27, 2016.
In this article, you will learn about security group operations in SharePoint 2016, using REST API
Security Based Alarm System With Arduino Mega 2560
May 10, 2016.
In this article I will explain about Security Based Alarm System with Arduino Mega 2560
Microsoft Cloud App Security
Apr 19, 2016.
In this article you will learn about Microsoft Cloud App Security.
Security Options And Scope In Web API
Sep 14, 2015.
In this article you will learn security options and scope in Web API.
Security And Validations In .NET
Sep 07, 2015.
In this article you will learn security and validations in .NET.
Security Enhancements in Windows 10
May 29, 2015.
In this article we will learn what the new security enhancements are in Windows 10 to make it more secure.
Microsoft Ignite: Windows 10, Cloud, Office 365, Email and Windows Security, Cortana Intelligence
May 11, 2015.
In this article we will learn about Microsoft Ignite Windows 10, Cloud Office 365 Email and Windows Security Cortana Intelligence.
Manage SQL Azure Security
May 03, 2015.
In this article you wil learn how to manage SQL Azure Security: Logins, Users, Roles, Schemas and Permissions.
Passphrase vs Password For Security
Jan 17, 2015.
In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
Security Feature in ASP.Net MVC
Jan 12, 2015.
Security features in ASP.NET MVC
Web Service in ASP.Net (Security by SOAP Authentication): Part 5
Dec 27, 2014.
In this article we will learn how to use a Web Method after Authentication.
Security Trimmed Control in SharePoint 2013
Sep 05, 2014.
This article explains the Security Trimming Control in SharePoint 2013.
Basics Of WCF Security
Jul 28, 2014.
This article is all about the basics of the WCF Security; in other words, this is the starting point of diving into the WCF Security concepts.
Security in QlikView
Mar 28, 2014.
This article describes security in QlikView.
Oct 21, 2013.
Configuring the System For Component Services by Setting Administrative Security
Apr 23, 2013.
In this article we will discuss configuration of the system for Component Services by setting Administrative Security.
Security in PHP
Jan 29, 2013.
In this article I explain how to encrypt a password for your application using the crypto function.
In information technology the
is set of restriction of information assets through the use of technology, processes and training. In Computer,
is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains or even gaining access to them accidentally.
is a branch of Information
and is often used interchangeably with the term. It encompasses several
measures such as software programs like anti-virus suites, firewalls, and user dependant measures such as activating deactivating certain software features like Java scripts, ActiveX and being vigilant in using the computer and the network resources. Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts.
File APIs for .NET
Aspose are the market leader of .NET APIs for file business formats – natively work with DOCX, XLSX, PPT, PDF, MSG, MPP, images formats and many more!
CBeyond Cloud Services
TERMS & CONDITIONS
REPORT A BUG
©2016 C# Corner. All contents are copyright of their authors.
Terms & Conditions
©2016 C# Corner. All contents are copyright of their authors.