Resources No resource found - Upgrading to VMware Cloud Foundation 5.1Mar 19, 2024. VMware Cloud Foundation 5.1 upgrade guide offers step-by-step instructions, resources, Troubleshooting, and best practices to ensure a smooth transition and maximize new features.
- A Comprehensive Guide to Secure Coding in C#Mar 18, 2024. A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This section provides examples and best practices for preventing SQL injection, XSS attacks, and securing user authentication.
- Top 10 VPNs in 2024Mar 11, 2024. While some VPNs excel in speed, others prioritize features or affordability. Here's a list of some of the top contenders in 2024.
- Password Strength Filter in Vue.jsMar 08, 2024. Creating a password strength indicator in Vue.js involves calculating the strength of a password based on certain criteria and then displaying it to the user.
- How to Do Distributed File System (DFS) In ServerMar 04, 2024. In this article, we will learn a distributed File System (DFS) as the name suggests, is a file system that is distributed on multiple file servers or multiple locations.
- How to Install WDS in Server?Feb 26, 2024. This article provides a comprehensive guide on installing Windows Deployment Services (WDS) on Server 2019, detailing each step in the process.
- Azure Hub and Spoke ArchitectureFeb 20, 2024. This article explores the Azure Hub and Spoke networking model, outlining its benefits and practical use cases. It provides a detailed architecture overview, emphasizing efficient maintenance, subscription limits, separation of concerns, and cost savings.
- How to Do Work Folder in Windows Server?Feb 19, 2024. Work Folders in Windows Server 2019 enable seamless synchronization of user files between devices, ensuring access to up-to-date data. Administrators can set up and manage Work Folders via Group Policy and Active Directory.
- Creating Azure Virtual Networks, Advantages and DisadvantagesFeb 01, 2024. This article delves into the essence of Azure Virtual Networks, Their significance, advantages, and potential considerations. Step-by-step journey in creating a Virtual Network, we explore how this fundamental Azure component lays the groundwork for resilient, scalable, and seamlessly connected cloud environments.
- 🖥️ Incident Handling: Common Malware AttacksJan 23, 2024. Explore the realm of malware attacks, unveiling the intricacies of threats like ransomware, computer viruses, worms, Trojan horses, and adware. Delve into their types, characteristics, and potential impact on computer systems and networks.
- 🖥️ Incident Handling: Common Domain Attack TypesJan 22, 2024. In this article, we will go through different types of Domain Attacks. Domain attacks, including Typosquatting, Domain Hijacking, Pass the Hash, Pass the Ticket, LDAP Reconnaissance, and Brute Force, with insights and incident-handling guidance.
- Building a Secure PHP MySQL Signup/Login Website with Email VerificationJan 15, 2024. Creating a secure signup/login system is essential for any web application that involves user authentication. In this article, I'll guide you through building a PHP MySQL login/signup website with email verification. I'll focus on security best practices, including password encryption using PHP's built-in functions.
- How to Create a Logic App to Protect the PDF with PasswordJan 03, 2024. In this article, we are going to learn about How to create a Logic App to Protect the PDF with a Password and how to create an Azure Logic App that automatically protects PDF files with passwords and saves them in Dropbox.
- Centralized Management for Global Scale Networks using Azure Network ManagerDec 28, 2023. Centralized management for your global scale networks using Azure Network Manager.
- How to Do Password Policy in ServerDec 27, 2023. A password policy can help prevent unauthorized access to user accounts and protect against common types of attacks. A password policy is a set of rules that encourage users to create and use strong passwords.
- Deploying Azure Virtual Network ManagerDec 26, 2023. the advantages of Azure Virtual Network Manager for streamlined and automated Azure virtual network management. Learn about benefits, pricing, and a step-by-step guide to deploying this powerful centralized network management service.
- Data Loss Prevention (DLP) in 2024Dec 18, 2023. In the ever-evolving landscape of cybersecurity, protecting sensitive data has become a paramount concern for organizations across industries. As we usher in the year 2024, the significance of robust Data Loss Prevention (DLP) strategies has never been more critical. This guide aims to provide an introductory overview of DLP, its key components, and its relevance in safeguarding against data breaches and unauthorized disclosure.
- Password Strength Pipe in AngularDec 18, 2023. This article guides you through creating an Angular pipe to assess password strength. Utilizing Angular concepts, it demonstrates password categorization (Weak, Medium, Strong, Very Strong) based on length.
- Scaling Azure Databricks Secure Network Access to Azure Data Lake StorageDec 13, 2023. Explore secure network access in Azure Databricks to Azure Data Lake Storage. Learn setup, RBAC, and secure coding with practical examples.
- Networking Between Two Docker Containers in Window OSDec 11, 2023. Establish a Connection between two different containers on the same host using Docker. Docker container communication and networking strategies. It outlines the two primary methods for containers to communicate: through networking and sharing files on disk. The article details Docker's network types and explains the Docker network drivers, including Bridge, Host, Overlay, IPvLAN, and MACvLAN. Practical steps for creating .NET MVC and Web API applications, Dockerizing them, and establishing communication between Docker containers are also provided.
- Secure Password Hashing with SHA-256 and Salt in PythonDec 07, 2023. In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transforms passwords into nearly unbreakable codes. Before diving into SHA-256, let's explore the foundation: hashing.
- Components of a CDN (Content Delivery Network)Dec 01, 2023. In this article, we will understand about different components of a CDN link which we use very oftentimes in our websites' codes.
- SQL Server Connection Error: Network Issue Oct 25, 2023. a network-related or instance-specific error occurred while establishing a connection to sql server. the server was not found or was not accessible. verify that the instance name is correct and that sql server is configured to allow remote connections. (provider: named pipes provider, error: 40 - could not open a connection to sql server)
- Easily Learn Conversational Language Understanding (CLU) In Azure AI Language Studio Oct 24, 2023. In this post we will see what Conversational Language Understanding (CLU) is in Azure Language.
- Networking Components in Microsoft AzureOct 22, 2023. In this article, we delve into the world of networking within Microsoft Azure. Networking is a vital component of any cloud solution, facilitating communication between resources and users. Azure boasts a suite of networking services designed to connect, secure, deliver, and monitor applications in the cloud.
- The Challenge of Changing Your Website's DomainOct 20, 2023. In the ever-evolving landscape of the internet, website owners occasionally find themselves at a crossroads, contemplating the change of their domain name. While this decision may be motivated by a variety of factors, such as rebranding, expansion, or better aligning with the website's purpose, it is not a step to be taken lightly. For those with a well-established site, like c-sharpcorner.com, the challenges can be significant, but with careful planning and execution, the transition can be successful.
- NSX-T 4.0 Features and Updates: Revolutionizing Network Virtualization and SecurityOct 20, 2023. This article introduces readers to VMware NSX-T 4.0, explores its key features and updates, and provides examples of how it impacts network virtualization and security. You can further expand on each section or provide more examples and use cases to reach the desired word count.
- VMware NSX+Oct 18, 2023. VMware NSX+ is a cloud-delivered networking, security, and advanced load balancing service that allows networking, security, and operations teams to consume and operate NSX services from a single cloud console across private, hybrid, and public clouds.
- Solution: Mail not queued. Database Mail is stoppedOct 11, 2023. Database Mail is a feature in SQL Server that allows you to send email messages from the SQL Server database engine. It can be a crucial tool for alerting and notifications within a database system. However, sometimes, Database Mail might stop working due to various reasons such as configuration issues, service failures, or network problems.
- How to connect metamask with different blockchain networks?Oct 06, 2023. Unlock the full potential of MetaMask! Learn to connect to various blockchain networks and manage your digital assets with ease.
- An Introduction to VMware NSX-T: Revolutionizing Network VirtualizationOct 03, 2023. This article introduces readers to VMware NSX-T, explains its key features, and provides real-world examples of how it is used in various industries. You can expand on each section to provide more in-depth information or include additional examples and use cases as needed to reach the desired word count.
- DoS & DDoS attacksSep 27, 2023. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are malicious attempts to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic. In a DoS attack, a single source is used to flood the target, while DDoS attacks involve multiple sources, making them harder to mitigate. The aim is to render the targeted system or network unavailable, causing service outages, financial losses, and reputational damage. Countermeasures include network security protocols, firewalls, and traffic filtering systems.
- Azure Firewall Cloud-Native, Intelligent, and Scalable Network SecurityAug 31, 2023. Discover the power of Azure Firewall in safeguarding cloud environments against modern threats. This cloud-native security service provides granular control over inbound and outbound traffic, leveraging dynamic threat intelligence for targeted protection. Explore its features, from application and network rules to seamless integration with Azure services, ensuring robust security as businesses embrace the cloud.
- C# Security: Best Practices for Secure CodingAug 31, 2023. In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to prevent injection attacks, using parameterized SQL queries, using cryptography to protect sensitive data, using HTTPS to protect data in transit, avoiding hardcoding secrets in code, and keeping code up to date with the latest security patches and updates.
- Exploring AWS EC2 Instances: Features, Deployment, and Hands-On Insights Aug 23, 2023. Explore AWS Article Collection: Unveil AWS EC2 Instances and More. Discover the versatility of virtual servers, from lifecycle management to load balancing. Embrace the cloud revolution and embark on an insightful journey.
- Fix: GitHub Access Error - Failed to Connect to github.com port 443, Time OutAug 07, 2023. This article discusses a bug in access to GitHub.
- Data Gateway in Power BIAug 07, 2023. Unlock the potential of on-premises data with the Power BI Data Gateway. This comprehensive guide explores its core capabilities, installation, security, troubleshooting, and future roadmap for hybrid analytics. Empower your organization's analytics modernization with this crucial tool.
- Capturing Phishing Email Using Custom Middleware in ASP.Net Core Web API Aug 02, 2023. To capture and detect phishing emails using custom middleware in an ASP.NET Core Web API, you can follow these general steps:Create Custom Middleware:
Create a custom middleware that will intercept incoming HTTP requests and inspect the email content for potential phishing indicators. Middleware in ASP.NET Core can be used to perform custom processing on incoming requests and outgoing responses.
- New Dev Home tool in WindowsJun 28, 2023. Let's explore the new tool in Windows oriented to developers.
- Understanding HTML Forms and Input ElementsJun 27, 2023. Understanding HTML forms and input elements, Forms are an essential part of web development, allowing users to interact with a website by submitting data or making requests. In HTML, forms are created using the <form> tag, which contains a variety of input elements that allow users to enter data. In this guide, we will explore HTML form and input elements in depth, including their various types, attributes, and best practices.
- How to Connect to Polygon Network using C#?Jun 07, 2023. Discover how to connect to the Polygon Network using Alchemy, MetaMask, and C#, Learn the benefits and step-by-step instructions for implementation.
- iOS App Security: Best Practices for Protecting User DataMay 12, 2023. This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jailbreaking and anti-rooting measures, following Apple's App Store Guidelines, and educating users about security risks. By following these best practices, iOS developers can build secure and trustworthy apps that protect user data from malicious attacks.
- Introduction Of Microsoft Azure Networking, High-Level Architecture, and Implementation ProcessApr 27, 2023. High-level overview of the Azure Networking architecture and its advantages.
- Artificial Intelligence (AI) Makes The Metaverse More Secure And InclusiveApr 19, 2023. AI is becoming more prevalent in emerging technologies, and one co-founder of The Sandbox believes it will make digital spaces more inclusive.
- Working with APIs Calls In React NativeApr 16, 2023. In today's world of mobile app development, working with APIs is a fundamental requirement. APIs allow developers to integrate data from various sources and services into their apps.
- Password Less Sign-In With The Microsoft Authenticator AppApr 12, 2023. In this article, you will learn about Password Less Sign-In With The Microsoft Authenticator App.
- How To Implement Azure DDoS Protection Plan For Virtual NetworksApr 10, 2023. In this article, you will learn how to implement Azure DDoS Protection Plan for Virtual Networks.
- The Role Of Datagram In Java NetworkingMar 31, 2023. Datagram is a type of packet that represents an entire communication. There is no necessity to have a connection/disconnection stages when communication using datagrams
- How To Enable Password Writeback SSPR In On-Prem AD And Azure ADMar 28, 2023. In this article, you will learn how to enable password writeback sspr in on-prem ad and azure ad.
- Azure Network Design Services And Best PracticesMar 01, 2023. In this article, you will learn about Azure Network Design Services and Best Practices.
- Advanced Docker Networking Configuration TechniquesFeb 21, 2023. In this article, we'll discuss some advanced Docker networking configuration techniques and provide examples of how to use them
- How To Create Password And Confirm Password Matching Validation In AngularFeb 15, 2023. In this article, you will learn how to create password and confirm password matching validation in angular.
- Deploying Azure Virtual NetworkFeb 13, 2023. In this article, you will learn how to deploy the Azure Virtual Network.
- Configure And Manage Microsoft Defender For EndpointFeb 13, 2023. Microsoft Defender for Endpoint is an endpoint security solution for preventing, detecting, investigating, and responding to advanced threats on enterprise networks.
- Deploy Resources (Resource Group, Virtual Network And Subnet) In Azure Via TerraformFeb 07, 2023. In this article, you will learn how to deploy resources (Resource Group, Virtual Network And Subnet) in Azure Via Terraform.
- What Is NSX-T VMwareJan 30, 2023. In this article, we'll discuss What is NSX-T VMware. VMware NSX-T is a software-defined networking (SDN) solution that enables organizations to virtualize their network infrastructure.
- Everything - Find Files Instantly In Your PC, Network And HTTP ServerJan 18, 2023. Everything is a tool from void tools. I strongly recommend it for your work, on your projects, documents, or personal.
- How To Configure Network Security For Azure App Service PlanNov 30, 2022. In this article, you will learn how to configure network security for azure app service plan.
- Outlook Login Failed And Repeatedly Requested A Password In Office 365Nov 23, 2022. Many people, I've noticed, are unable to sign into their Outlook apps. One, in particular, is experiencing difficulties with Outlook and Office 365. They are confronted by "Connecting to: [email protected]" and a password request from Windows Security when they run Outlook.
- Configuring Azure Virtual Network ManagerNov 08, 2022. This post will concentrate on Azure Virtual Network Manager connectivity configurations.
- How To Reset SA Password In SQL ServerOct 31, 2022. If you want to reset SA password in SQL Server, simply read this blog as we have mentioned simple manual method to reset forgotten System Administrator password.
- Create A Virtual Network In Azure PortalOct 27, 2022. In this article, you will learn how to create a Virtual Network in Azure Portal.
- Solution - The Application Encountered An Error While Attempting To Change The StateOct 20, 2022. In this article, you will learn about the solution the application encountered an error while attempting to change the state.
- Generate A Strongly Secured Encrypted PDF File Using PDFFileEcrypterOct 19, 2022. The purpose of this article is to present an effective approach for strong encryption of PDF files using a password and a complicated algorithm.
- How To Create Password And Confirm Password Matching Validation In ReactJSSep 13, 2022. In this article, you will learn how to create Password and Confirm Password Matching Validation in ReactJS.
- Sending Large Files Over A Network Socket Using C#Jul 30, 2022. This article describes how to send large files (GB) to other devices over a network socket in chunks.
- Types Of Virtual Networks In VMware Virtualization Concepts?Jul 08, 2022. We've been talking about the types of Virtual Networks in VMware Virtualization Concepts
- Create a Virtual Network in Azure Jul 01, 2022. An Azure Virtual Network (VNet) represents your network or environment to run VMs and Applications in the cloud. And also provides an isolated environment for your Azure resources. In this article, I have taught how to create a Virtual Network (VNet) in azure step by step.
- Button On Command Bar Doesn't Appear When An Item Is Selected In Sub Grid Microsoft Dynamic CRM - IssueJun 27, 2022. The mentioned issue would have been commonly encountered by the developers who extensively play around with the sub gird’s, who would have encountered the scenario where in you have a button on the sub grid which gets disappear when you select a sub grid record or doesn’t appear on the sub grid.
This article would provide a resolution for such issues whereas the customized button doesn’t appear on one or more grid items selection in MS CRM online as expected.
- Get User Name And Password At Runtime Using PythonJun 09, 2022. This article explains about how to get user name and password from user in Python.
- How To Configure SMTP O365 Migration Using TLS 1.2 For SQL Database MailJun 07, 2022. This article will explain to you how exactly you need to configure TLS 1.2 as a default protocol and setup SMTP O365 migration using SQL 2012 Database mail and above versions for Windows Server 2012 and above Common SMTP exceptions we usually faced :
The mail could not be sent to the recipients because of the mail server failure. (Sending Mail using Account 2. Exception Message: Cannot send mails to mail server. (Failure sending mail.). )Just follow the steps -
- Azure Virtual NetworkMay 13, 2022. In this article, we'll learn about Azure Virtual Network.
- Work From Home Hack - Keep Your Screen Active Forever Using PythonApr 04, 2022. Understand how to keep your screen active forever.
- Managing The Network Connections With Snackbar ViewsMar 04, 2022. Learn how to build custom snackbar views to notify users of missing network connection
- Securing Web App Using Private Endpoint And Connecting Through Point To Site VPN with Gateway TransitJan 30, 2022. We will learn how to deploy an Azure Webapp, set up a point-to-site VPN, set up VNet Peering with Gateway Transit, and configure a private endpoint in this tutorial.
- SQL TIps - How To Compare Encrypted Password In SQL Server?Jan 07, 2022. In our last trip, we have encrypted the password using the SQL function in this post we are going to go a bit in advance and compare the encrypted password.
- How To Send One Time Password On Registered Mobile Number Using C#Jan 03, 2022. In this article, you will learn how to send One Time Password[O.T.P] on Registered mobile Number using C# asp.net.
- How To Create An Azure Virtual Network Gateway Using PowerShellDec 17, 2021. In this article, you will learn how to create an azure virtual network gateway using powershell.
- How To Setup Azure Data Factory With Managed Virtual NetworkDec 07, 2021. In this article, you will learn how to setup Azure Data Factory with Managed Virtual Network to improve security.
- Configuring Azure ExpressRoute Virtual Network GatewayNov 24, 2021. In this article, you will learn how to configure Azure ExpressRoute Virtual Network Gateway.
- Configure Named Pipe And TCP/IP Settings Of SQL ServerOct 25, 2021. In this article, we are going to configure Microsoft SQL Server on windows machine to listen on specific TCP port.
- How To Setup Virtual Network Integration On Azure Data Lake StorageOct 18, 2021. In this article, you will learn how to setup Virtual network integration on Azure Data lake storage to improve security.
- Microsoft Certified - Azure Administrator Associate (AZ-104) Study GuideSep 23, 2021. This is a study guide for the exam AZ-104 - Microsoft Azure Administrator and the Microsoft Certified: Azure Administrator Associate certification. It includes useful resources that you can use to prepare and achieve this exam and certification.
- How To Create A Virtual Network And A Bastion HostAug 08, 2021. In this article, we’ll learn to create a virtual network and bastion host on Azure. We’ll learn what virtual network is and also about Bastion Host. After that, the process to create the Virtual Network and Bastion host is walked through in detail.
- Web Security Vulnerabilities On User Session And Username Iteration Jul 29, 2021. In this article, you will learn about Web Security Vulnerabilities on User Session and Username Iteration.
- Setting Up SharePoint Home SiteJun 28, 2021. A home site is a SharePoint communication site that you create and set as the top landing page for all users in your intranet
- How To Integrate Database Server With AppService Through The Private Virtual NetworkJun 02, 2021. In this article, you will learn how to integrate database server with AppService through a private virtual network.
- Object Detection Using ImageAIMay 31, 2021. This article, takes a walkthrough about the various aspects of Computer Vision and the libraries and features a hands-on experience of programming to detect object with a short programming task. Computer Vision has been enabled with the rise of Machine Learning Algorithms and easily accessible libraries. Let us, take a look and experience with the example in this article.
- How To Enable Virtual Network Integration In App Service In AzureMay 30, 2021. In this article, you will learn how to enable virtual network integration in app service in Azure.
- What Is Storage Area Network And Storage ProtocolsMay 23, 2021. In this article, you will learn what is Storage Area networks and Storage Protocols?
- Basics Of Azure Load Balancer ServiceMay 14, 2021. In this article, you will learn about the basics of Azure Load Balancer Service.
- Basics On Azure - Network Address Translation (NAT) May 13, 2021. In this article, I will explain Network Address Translation(NAT) for a better understanding of networking in Azure.
- Theory Of Azure Virtual Network With Four Hands-On LabsFeb 02, 2021. In this article we will go through the concept of azure virtual network, what is azure virtual network and terms in virtual network which use to create virtual network.
- Networking Layer Architecture In AWSJan 19, 2021. Discussed about best practices in creating Network layer architecture in AWS.
- An Overview Of Network Penetration Testing Using Legion FrameworkNov 09, 2020. How to do a pen test on network systems without in-depth knowledge about network penetration testing and prior installation or configuration difficulties.
- Xamarin.Forms - Mobile Network Speed Check (Slow Or Fast) In AndroidOct 26, 2020. In this article, you will learn how to check you mobile network speed(slow or speed) using android native in Xamarin.Forms.
- Xamarin.Forms - Network Speed MonitorOct 22, 2020. In this article, you will learn how to monitor you network speed in Xamarin.Forms.
- How To Optimize A Neural NetworkOct 09, 2020. In this article, I will tell how we can optimize various neural networks without affecting their performance.
- Boost Network Design Skill With CCDP Cisco CertificationSep 12, 2020. Cisco Certified Design is an abbreviation for professional CCDP. This validates the principles of certification, as well as advanced knowledge of network design concepts.
- Geekstory - My First Magazine Article And The Power Of NetworkingSep 04, 2020. In this article, you will learn about Geekstory - My First Magazine Article and the Power of Networking.