IT Security


  • Ashish Srivastava

    DOS Command (CMS) Create Folder Current Datetime and Move Files Shared Folder

    This code snippet for DOS Command (CMS) create Folder current datetime and move files Shared folder.
    Ashish Srivastava May 23, 2016
  • Santosh Kumar Adidawarpu

    Secure Your Application's Config File

    In this article you will learn how to secure your Config Application’s Config File.
  • Bhuvanesh Mohankumar

    Check your Firewall Port Details

    In this blog you will learn how to Check your Firewall Port Details.
  • Varun Bansal

    File Hash Comparison With MD5 And SHA1

    In this article you will learn about File Hash Comparison with MD5 and SHA1.
    Varun Bansal Apr 03, 2016
  • Pruthwiraj Jagadale

    SSL Certificate Based Authentication In Web API Project

    In this article you will learn SSL Certificate based Authentication in Web API Project
  • Jasminder Singh

    Setting HTTPS On Your Website

    In this article we will try to learn how we can apply https on our website in a test environment.
    Jasminder Singh Mar 05, 2016
  • Sabyasachi Mishra

    Password Encryption Using Salt Hashing In ASP.NET MVC

    This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
    Sabyasachi Mishra Dec 11, 2015
  • Mahsa Hassankashi

    Security On The Web By Advanced Encryption Standard (AES) and Security Assertion Markup Language ...

    In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
    Mahsa Hassankashi Sep 23, 2015
  • Afzaal Ahmad Zeeshan

    Efficiently Storing Passwords in .NET Framework

    In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
  • Mahesh Chand

    Amazon introduces s2n, a New Open-Source TLS Implementation

    Amazon just introduced a new open-source TLS implementation named s2n.
    Mahesh Chand Feb 21, 2016
  • Sahil Sharma

    LAME Question of the Day: How To Store a Password in a Database?

    How to store a password in a database?
    Sahil Sharma Feb 03, 2015
  • Rizwan Ali

    Passphrase vs Password For Security

    In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
    Rizwan Ali Jan 19, 2015
  • Rizwan Ali

    Brute Force Attacks And How to Block Them

    In this article we learn about Brute Force Attacks and how to prevent them.
    Rizwan Ali Jan 20, 2015
  • Deepak Kumar Jena

    What a SSL Certificate Is and How It Works

    In this article you will learn about SSL Certificates and how they work.
    Deepak Kumar Jena Dec 18, 2014
  • Divya Sharma

    What is SSL and How to Implement in ASP.Net Web Application

    This article explains SSL and how to implement SSL in an ASP.Net web application.
    Divya Sharma Dec 18, 2014
  • Ajay Yadav

    Vulnerable Encoded URLs

    In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text ...
    Ajay Yadav Nov 24, 2014
  • Ajay Yadav

    Code Injections: Injecting Spyware in EXE

    In this tutorial you will learn how to inject spyware into an EXE.
    Ajay Yadav Nov 01, 2014
  • Ajay Yadav

    Applied Secure Socket Layer in .NET: Part 2 Installation and Testing

    This article is resuming the voyage by covering the applied aspect of SSL on .NET website via IIS webserver along with the creation of digital certificates.
    Ajay Yadav Oct 29, 2014
  • Ajay Yadav

    Secure Socket Layer in .NET

    This article explains the Secure Sockets Layer (SSL) including the inherent issue of web server security and the process of SSL configuring and implementing in the form of digital certificates over...
    Ajay Yadav Oct 29, 2014
  • Max McCarty

    OWASP Top 10 Risks #2: Broken Authentication and Session Management

    Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where thin...
    Max McCarty Oct 17, 2014
  • Vidya Vrat Agarwal

    .NET Code Access Security (CAS)

    Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from u...
    Vidya Vrat Agarwal Aug 06, 2013
  • S Ravindran

    OWASP Top 10 Vulnerabilities

    The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
    S Ravindran Jun 26, 2013
  • Supreet Tare

    Knowledge Sharing Eves: Authentication Types & Authentication Systems

    This week it was Kunal who helped us understanding more on Authentication in general. Read more for details.
    Supreet Tare May 04, 2013
  • Rumman Siddiqui

    Secure Mailing

    This application an be used to encrypt a text message using AES encryption as well as send it to the person whose email is provided. This could be used as the security software for any of us. But t...
    Rumman Siddiqui Dec 19, 2012
  • Venkatesh Kumar

    Microsoft acquires PhoneFactor

    Microsoft announced today that it has bought PhoneFactor, a provider of multi-factor authentication.
    Venkatesh Kumar Feb 21, 2016
  • View More