No new comments.
View All Comments
No new messages.
View All Messages
No new notifications.
View All Notifications
Request a new Category
No tag found
Refine by Author
Santosh Kumar Adidawarpu(2)
Abhimanyu K Vatsa(2)
Vincent Maverick Durano(1)
Sonia Bhadouria Vishvkarma(1)
No resource found
Cross Site Scripting (XSS) - A Client Side Web Security Attack
Feb 10, 2017.
This article will be focusing on cross site scripting attack and prevention in general.
Avoid Cross Site Scripting (XSS) Attacks While Posting Data Through AJAX In MVC Application
Sep 28, 2016.
In this article, we will learn how to avoid Cross-Site Scripting attacks when we are posting our data through AJAX POST method in our application.
How To Change Your Default Web Browser In Windows 10
Sep 06, 2016.
In this article, you will learn, how to change your default Web Browser in Windows 10.
Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism
Jul 07, 2016.
In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
CSRF Attack and Its Prevention Mechanism
Jun 18, 2016.
In this article you will learn about Cross Site Request Forgery (CSRF) attack.
Protect Your Data: Prevent SQL Injection
May 27, 2016.
SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for an execution. How to prevent SQL Injection to protect your data is being imparted through this article.
MVC Application Security Issues: Cookie Security & URL Attacks - Part One
May 16, 2016.
In this article you will learn MVC Application Security Issues.
Create UI design And Wire-frames For UWP Apps And Others
Dec 09, 2015.
In this article you will learn how to create UI design and wire-frames for Universal Windows Platform (UWP) apps, Windows Store, Tablets and Windows Phone Using Adobe Illustrators and PowerPoint.
Brute Force Attacks And How to Block Them
Jan 16, 2015.
In this article we learn about Brute Force Attacks and how to prevent them.
Visual Studio 2015 and Apache Cordova
Jan 08, 2015.
In this article, we will learn what Apache Cordova is and how this tool is now integrated into Visual Studio 2015.
Web Spoofing Attack
Nov 27, 2014.
This article explains the seriousness of web spoofing attacks that is in fact difficult to handle.
Vulnerable Encoded URLs
Nov 22, 2014.
In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text and is susceptible to MITM attack.
Session Fixation Vulnerability Detection in ASP.Net
Nov 06, 2014.
This article explains session fixation attacks on an ASP.NET website in details by giving a realistic code scenario.
.Net Penetration Testing: Cheat Sheet
Oct 25, 2014.
This article provides a cheat sheet for .Net Penetration Testing.
Protection Against Buffer Overflow Attack in .NET
Oct 22, 2014.
This article explained how buffer overflows occur and how to prevent it.
What Cross Site Scripting Attack Is In MVC
Sep 29, 2014.
This article explains Cross-Site Scripting attacks and how to prevent them.
Cross-Site Scripting Attack in MVC4
Aug 12, 2014.
In this article we will explore Cross-Site Scripting in an MVC application. In general this is the most dangerous threat by hackers.
Apr 29, 2014.
This article explains SQL Injection and the types of SQL Injection.
ValidateInput Attribute to Prevent CSS Attack in MVC
Apr 17, 2014.
This article explains how to prevent Cross Site Scripting (CSS) attacks using the validateInput attribute.
Basics of Cross Site Scripting (XSS) Attack on Web Applications
Dec 24, 2013.
I would like to share the basics of XSS attacks on web applications.
Cross Request Forgery Attacks in ASP.Net Web API
Jul 04, 2013.
This article explains the Cross Request Forgery Attacks in ASP.NET Web API. Basically it is a type of attack in which the attacker exploits the trust of a web site on the user.
Avoiding Cross-Site Scripting (XSS) Attacks With AntiXSS in MVC 4
Mar 15, 2013.
In this article you will learn, with examples, how to avoid XSS attacks in MVC Applications with Microsoft's AntiXSS library.
Best Way to Prevent Cross Site Request Forgery Attacks in MVC 4
Mar 15, 2013.
In this article you will learn what Cross Site Request Forgery (CSRF) is and is the best way to prevent such attacks. After a quick introduction about CSRF I will show you an example where the attacker will change the profile information with one click.
Disable Loop Back Check in Windows Server 2012
Feb 06, 2013.
Microsoft introduces a security feature in 2003 server to prevent attacks on windows servers.
Import Adobe Photoshop File in Expression Blend 4
Sep 12, 2012.
Today we are going to see the use of "Import Adobe Photoshop File Option" of File Menu.
Tabbed Structure in Flash Builder (iPhone) Applications
Feb 01, 2012.
This article will discuss the experience I've had through developing Tabbed Applications.
Exception Handling and .NET
Nov 22, 2011.
Error Handling has always been crucial for an application in a number of ways. It may affect the execution state of the application, or expose sensitive information to a user. If the error handling is not strong, it may aid the attacker, as the errors returned may assist them in constructing correct attack factors.
Authentication Method in ASP.NET
Nov 16, 2011.
Authentication is a major concern for both application architects and developers. Applications that store sensitive information need to be protected from malicious attacks and from competitors attempting to steal information or intellectual property.
How to Show PDF file in C#
Feb 07, 2011.
This article shows how to show a PDF file in a Windows application with the help of the Adobe ActiveX COM.
Adobe Flex and Microsoft .NET Integration - POV
May 03, 2010.
A Point of View on Building Rich Internet Applications using Adobe Flex and Microsoft .NET. Authors: Anirban Kundu, Sandeep Sharma
Parameterized Query and SQL Injection Attacks
Aug 10, 2009.
In this article I will explain about Parameterized Query and SQL Injection Attacks.
Encrypt and Decrypt Sensitive Metadata Within Your Config file
Jun 18, 2008.
In a certain cases, metadata embedded within your configuration file is sensitive. In fact, imagine that you develop an application that uses a data base as data source; all information about this data base is located in the configuration file. What if a hacker success to log into your configuration files and obtains the connection string and other metadata about your data base??
Securing Your ASP.NET Web Applications
Aug 31, 2004.
Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
HJ PDF in C#
Oct 31, 2002.
This program allows you to download all Italian Hacker Journal issues into PDF files for free.
File APIs for .NET
Aspose are the market leader of .NET APIs for file business formats – natively work with DOCX, XLSX, PPT, PDF, MSG, MPP, images formats and many more!