This code snippet for DOS Command (CMS) create Folder current datetime and move files Shared folder.
In this article you will learn how to secure your Config Application’s Config File.
In this blog you will learn how to Check your Firewall Port Details.
In this article you will learn about File Hash Comparison with MD5 and SHA1.
Varun Bansal Apr 03, 2016
In this article you will learn SSL Certificate based Authentication in Web API Project
In this article we will try to learn how we can apply https on our website in a test environment.
This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
Amazon just introduced a new open-source TLS implementation named s2n.
Mahesh Chand Feb 21, 2016
In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
In this article we learn about Brute Force Attacks and how to prevent them.
In this article you will learn about SSL Certificates and how they work.
This article explains SSL and how to implement SSL in an ASP.Net web application.
Divya Sharma Dec 18, 2014
In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text ...
In this tutorial you will learn how to inject spyware into an EXE.
This article is resuming the voyage by covering the applied aspect of SSL on .NET website via IIS webserver along with the creation of digital certificates.
This article explains the Secure Sockets Layer (SSL) including the inherent issue of web server security and the process of SSL configuring and implementing in the form of digital certificates over...
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where thin...
Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from u...
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
This week it was Kunal who helped us understanding more on Authentication in general. Read more for details.
Supreet Tare May 04, 2013
This application an be used to encrypt a text message using AES encryption as well as send it to the person whose email is provided. This could be used as the security software for any of us. But t...
Microsoft announced today that it has bought PhoneFactor, a provider of multi-factor authentication.