TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Security
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sarthak Varshney (11)
Monica Rathbun (5)
Mariusz Postol (5)
Sandeep Mishra (4)
Ziggy Rafiq (3)
Rahul Bansal (3)
Nilesh Jadav (3)
Prabhakar Maurya (3)
Onkar Sharma (3)
George (2)
Kaviya Balasubramanian (2)
Nimit Joshi (2)
Ajay Kumar (2)
Ajay Yadav (2)
Nikhil Patil (2)
Prasad (2)
Gourav Jain (2)
Nitesh Jha (2)
Arun Choudhary (2)
Kuppu Swami (2)
Teddy Kurian (1)
Nicholas Winston (1)
Rion Williams (1)
Gaurav Tomar (1)
Vikas Singh (1)
Sean Franklin (1)
Vikas Gupta (1)
Navneet Cheema (1)
Vithal Wadje (1)
Hadshana Kamalanathan (1)
Shanuka Maheshwaran (1)
Viknaraj Manogararajah (1)
Shenbagapandiyan P (1)
Sifad Hussain (1)
Sharad Gupta (1)
Jay Smith (1)
Abhishek Yadav (1)
Jean Paul (1)
Shashangka Shekhar (1)
Ashwani Bakshi (1)
Jigar Shah (1)
Harpreet Singh (1)
Ishika Tiwari (1)
Mushtaq M A (1)
Bharat Chaudhary (1)
Anubhav Chaudhary (1)
Mahender Pal (1)
Ravi Raghav (1)
Raj Kumar (1)
Ahsan Murshed (1)
Aman Singhal (1)
Varun Setia (1)
Najath Risni (1)
C# Corner Live (1)
Ashutosh Singh (1)
Md Sarfaraj (1)
Kjetil Roe (1)
Saksham Gupta (1)
Related resources for Security
No resource found
DNN (Formerly DotNetNuke) Tutorial - Part 1
5/3/2024 9:00:39 AM.
DNN Tutorial - Part 1 introduces DotNetNuke, a versatile content management system (CMS) built on ASP.NET. Learn website setup, user management, and extension installation for robust web development.
Application Security (3), Open Source Security --- Sonatype
5/3/2024 3:53:19 AM.
This article is discussing Application Security issue.
Application Security (1), in General
5/3/2024 3:37:40 AM.
This is a discussion about Application Security. This series delves into application security, covering tools like Fortify, Sonatype, and WebInspect. It emphasizes proactive security measures and disc
Configure Or Change The Audit Settings In SharePoint Online
5/2/2024 9:56:23 AM.
In this article, we will learn how to manage audit settings in SharePoint Online for enhanced security and compliance. Discover step-by-step instructions to configure or change audit settings using th
Create Secure Store Application In SharePoint O365
5/2/2024 9:51:15 AM.
Learn how to enhance security in SharePoint Online (O365) by creating a secure store application. Explore secure credential management, authentication, and integration with Azure Active Directory for
JSON Web Auth Using Angular 8 And NodeJS
5/1/2024 11:41:39 AM.
Learn to implement JSON Web Token (JWT) authentication in Angular 8 with Node.js backend. JWT provides a secure way to transmit data between parties. This tutorial covers token generation, intercepto
Protection Against Clickjacking
5/1/2024 11:40:40 AM.
Protection against clickjacking involves implementing measures like frame-busting scripts, X-Frame-Options HTTP header, and Content Security Policy to prevent malicious actors from hijacking clicks on
Protection Against Busting Frame Busting
5/1/2024 11:40:26 AM.
Learn effective techniques to protect against frame busting vulnerabilities on websites. Discover how to implement robust security measures, such as Content Security Policy (CSP), to prevent clickjack
OpenID Connect Availability in OWIN Security Components
4/30/2024 9:51:18 AM.
Discover the integration of OpenID Connect with OWIN security components for robust authentication and authorization in .NET applications. Enhance identity management and security with seamless integr
Introducing Various Authentication Options in Visual Studio
4/30/2024 9:38:28 AM.
Introducing Various Authentication Options in Visual Studio 2013" explores the range of authentication methods available in the IDE. Discover how to implement secure user identity with OAuth, Ope
Preventing XSS in AJAX Web Apps: Best Practices & Prevention
4/30/2024 9:30:39 AM.
Explore the risks of XSS (Cross-Site Scripting) in AJAX (Asynchronous JavaScript and XML) interactions. Understand how malicious scripts can exploit client-side vulnerabilities, necessitating robust i
What is ASM in Alibaba Cloud?
4/30/2024 5:58:13 AM.
Learn about Alibaba Cloud Service Mesh (ASM) and how it simplifies the management, security, and monitoring of microservices-based applications.
What is VPN Gateway in Alibaba Cloud?
4/29/2024 3:53:00 AM.
Alibaba Cloud VPN Gateway encrypts data transfer between your Virtual Private Cloud (VPC) and on-premises networks or internet clients, offering a secure and cost-effective solution.
Learn About AJAX Security
4/26/2024 11:59:11 AM.
Explore the swift and interactive technology of AJAX in web development, its implementation using JavaScript, XML, and HTML, and its security vulnerabilities such as session management flaws, CSRF, an
Hands-Free Security Scanning Within .NET Applications
4/26/2024 9:59:18 AM.
I'm sure if you follow any news sources at all, you see countless hacks, breaches, and leaks from various big-name companies which you might assume would be better at protecting your information.
.NET Website Security: Practical Steps & Examples
4/26/2024 4:14:37 AM.
Securing .NET websites is paramount in today's digital landscape. Regular updates, strong authentication, HTTPS enforcement, input sanitization, CSP implementation, CSRF protection, defense-in-dep
What is a Virtual Private Cloud (VPC) in Alibaba Cloud ?
4/25/2024 4:13:28 AM.
Unleash the power of a private cloud within Alibaba Cloud's infrastructure. Explore VPC for secure resource management, network customization, and hybrid cloud integration.
Assembly in .NET 2.0
4/24/2024 1:22:55 PM.
In .NET 2.0, assemblies play a crucial role, containing code and metadata for applications. They support versioning, security, and deployment, with features like strong naming and the Global Assembly
Optimizing Security & Performance in .NET Core Apps for Heavy Loads
4/24/2024 7:40:20 AM.
Secure and optimize your .NET Core apps for heavy traffic with strategies like load balancing, caching, authentication, encryption, and monitoring. Implementing these ensures both security and perform
Blazor Server - How To Store Encrypted Session Data In The Browser
4/23/2024 11:17:21 AM.
Learn how to enhance security in your Blazor Server applications by storing encrypted session data in the browser. Explore techniques to safeguard sensitive user information using ASP.NET Core and cli
Customized Auditing In SQL For DDL Operations At Server Level
4/23/2024 11:14:16 AM.
Explore the intricacies of customized auditing in SQL for DDL operations at the server level. Enhance database security and compliance by implementing tailored logging and monitoring mechanisms.
What Is EFS And How To Mount EFS On AWS EC2 Instances
4/23/2024 10:03:01 AM.
Discover Amazon EFS, a versatile NFS file system for AWS services. Master the process of mounting EFS on EC2 instances across availability zones, ensuring seamless data access and scalability for dive
Introduction To Azure IoT Hub
4/23/2024 8:55:38 AM.
Azure IoT Hub is a cloud service facilitating secure, scalable connectivity between IoT devices and applications. It enables efficient device management, data ingestion, and communication. With featur
Manage Security Alerts In Azure Security Center
4/23/2024 8:54:32 AM.
Learn how to manage security alerts in Azure Security Center to strengthen your security position and protect Azure resources. Discover advanced detections with Azure Defender and utilize Azure Securi
Binary Cracking and Byte Patching With IDA Pro
4/23/2024 8:31:51 AM.
This dissertation explores binary patching techniques using IDA Pro, emphasizing reverse engineering, byte-level manipulation, and assembly code analysis. It covers configuring IDA Pro for patching,
Applied Reverse Engineering With OllyDbg
4/23/2024 8:25:53 AM.
This paper explores executable cracking using OllyDbg, focusing on reverse engineering without source code. It emphasizes Assembly Programming and tools like OllyDbg and CFF Explorer. Methods include
Alibaba Cloud Security: Ensuring Your Digital Journey's Safety
4/22/2024 4:20:18 AM.
Embark on your cloud adventure with confidence! Explore Alibaba Cloud's comprehensive security solutions for worry-free data protection and a fortified digital landscape. #CloudSecurity #AlibabaCl
Securing Your Workloads in VMware Cloud
4/22/2024 3:52:59 AM.
Fortify your VMware Cloud environment! Discover essential security practices for access control, networking, disaster recovery & more. #VMwareCloud #CloudSecurity
Streamlining Security: Managing Inactive Users in Microsoft 365
4/19/2024 9:55:36 AM.
In this edition, we'll guide you through Streamlining Security: Managing Inactive Users in Microsoft 365. Supercharge your team's collaboration with our curated insights, expert tips, and the
Alibaba Cloud IoT: Connecting Devices and Managing Data
4/19/2024 4:52:48 AM.
Alibaba Cloud IoT connects devices & manages data for businesses, enabling them to unlock the power of #IoT & gain valuable insights.
How to Configure Azure Application Gateway and WAF v2
4/15/2024 6:05:14 AM.
We're configuring an Application Gateway to manage traffic for the demo application. Azure Application Gateway, a layer 7 solution, efficiently manages web traffic, ensuring optimal performance. T
Alibaba Cloud Security Best Practices for Safeguarding Your Data
4/14/2024 5:24:57 AM.
Secure your data on Alibaba Cloud! Learn best practices for encryption, access control, & threat detection to ensure data security & compliance. #AlibabaCloudSecurity
Security ASP.net Core MVC (C#) Encryption and Decryption
4/9/2024 6:14:18 PM.
On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offe
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
Deploying Palo Alto Firewall on Azure
4/9/2024 7:27:15 AM.
In this article, we will explore the seamless integration of Palo Alto Firewall with Azure for robust network security. Learn deployment strategies, security policies, and threat prevention techniques
ESXi Vulnerability: Understanding the Impact on IXMetro Powerhouse
4/9/2024 5:20:18 AM.
This article explores the ESXiArgs ransomware attack that targeted IXMetro Powerhouse, detailing the vulnerable ESXi versions and the infection pathway exploited through a Service Location Protocol (S
How Secure Sockets Layer Works?
4/8/2024 4:49:33 AM.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols establish encrypted connections between clients and servers, ensuring secure online communication by encrypting data and verifyi
Microsoft Entra ID: Implementing Global Secure Access
4/6/2024 6:11:00 AM.
Safeguarding internet access is vital for businesses. Microsoft Entra ID offers a robust solution for global secure access, ensuring protection against cyber threats while enabling seamless connectivi
How to Use Stored Procedure in PHP
4/5/2024 5:42:14 AM.
Using stored procedures in PHP involves connecting to a database using MySQLi or PDO, preparing and executing SQL queries that call the stored procedures. Utilize parameterized queries for security an
Easy Password Generator: Create Secure Passwords in ASP.NET
4/5/2024 5:39:03 AM.
Discover a powerful Password Generator tool designed to enhance your online security. Our innovative solution creates strong and unique passwords with customizable length and complexity.
Generate the Client Side Hash Password Via MD5 Algorithm and Saving it to Database
4/4/2024 9:10:42 AM.
This article shows how to convert a plain password to a hashed password using the MD5 algorithm on the client side and save it to the database.
Grant Execute Or View Permission To Stored Procedures In SQL Server
4/4/2024 8:53:54 AM.
In this article we’ll learn how we can grant execute permission or view permission on stored procedures. We’ll also see why users require explicit permission on stored procedures.
SharePoint Permissions - Important Aspects
4/4/2024 8:52:33 AM.
In this article I am trying to reveal the important permissions aspects of SharePoint 2010. Please note that this will be a subset of Security.
SQL Server: Grant Permission To A Particular Table
4/3/2024 10:47:46 AM.
In this article, we will learn how to manage database security in SQL Server by granting permissions to specific tables. Safeguard sensitive data and control access with precise authorization settings
Authenticate the Valid User Via User id and MD5 Hashed Password
4/3/2024 9:55:02 AM.
Secure user authentication with MD5 hashed passwords and user IDs. This method ensures robust password protection by encrypting passwords before storage, enhancing system security and safeguarding use
Hiding the Version Information of .Net Framework Due to Security Issue
4/3/2024 9:40:26 AM.
Learn how to address the "medium-level" security issue of information disclosure in .NET Framework. Follow steps to create a sample website, identify the problem of version information disc
Save Encrypted Password In Database In ASP.NET
4/3/2024 9:36:57 AM.
In this article, Discover how to enhance security in your ASP.NET application by saving encrypted passwords in the database. Learn the process of encrypting passwords before storing them, ensuring dat
Hashing Password With Bcrypt In Node
4/3/2024 9:36:34 AM.
Learn how to use bcryptjs library for hashing and comparing passwords in a Node.js application. Build a simple API for user registration and login, ensuring password security through bcrypt hashing. U
Make Password Hash In ASP.NET Using C#
4/3/2024 9:07:42 AM.
Learn how to enhance security in your ASP.NET applications by implementing password hashing using C#. This tutorial guides you through the process of creating hashed passwords, ensuring better protect
ZeroThreat: The Ultimate Web App and API Security Scanning Tool
4/3/2024 5:10:04 AM.
Identify critical vulnerabilities at 5x speed without any configuration required with world's most intelligent web app & API security scanning platform, ZeroThreat. Avoid pitfalls of 90% manua
Embedding Power BI Report in SharePoint Online
4/3/2024 4:09:21 AM.
Learn how to seamlessly integrate Power BI reports into SharePoint Online with our step-by-step guide. Unlock the power of data visualization and collaboration in a Microsoft 365 environment. Follow a
Streamlining Security: A Guide to Certificate Management in VCF
4/1/2024 10:02:49 AM.
Learn how to enhance security in VMware Cloud Foundation through effective certificate management. Step-by-step guide and best practices included.
Form Authentication in MVC 5: Part 1
4/1/2024 8:18:03 AM.
In this article we will learn what Authentication and Authorization is with a small demo of what we will accomplish by the end of this series.
Backup Encryption In SQL Server
3/28/2024 6:36:20 AM.
SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
SQL Server Vulnerability Assessment
3/28/2024 6:33:00 AM.
SQL Server Vulnerability Assessment (VA) in SQL Server Management Studio 17.4 or later lets SQL Server scan your databases for potential security vulnerabilities and can be run against SQL Server 2012
Static Data Masking (SSMS 18.0 Preview)
3/28/2024 6:31:38 AM.
Static Data Masking in SSMS 18.0 Preview enhances data security by obscuring sensitive information in databases. It safeguards privacy during testing by replacing real data with masked values, ensurin
How To Get Started With Always Encrypted For Beginners - Part One
3/28/2024 6:27:34 AM.
Encryption has always been intriguing to me but seemed like it could be a very complex process to set up. However, SQL Server made it very simple when they introduced Always Encrypted (AE) into SQL Se
How To Get Started With Always Encrypted For Beginners - Part Three
3/28/2024 6:26:32 AM.
Discover advanced techniques in data security with Always Encrypted in Microsoft SQL Server. Part Three of our beginner's guide delves deeper into encryption keys, transparent data encryption, and
Information Computation Mastery: Challenges, Concepts, Implementation
3/28/2024 4:53:53 AM.
To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
PiP - External Streaming Data - Useful Concepts - Part 1
3/27/2024 7:21:34 AM.
To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
Best Practices for Designing APIs in .NET
3/26/2024 11:55:39 AM.
This article provides a thorough overview of the fundamental principles, criteria, and concerns for creating APIs in.NET.
.NET MAUI - Root/Jail Broken Detection
3/26/2024 9:37:20 AM.
Learn how to secure your .NET MAUI app by detecting rooted/jailbroken devices, preventing security breaches. Follow steps to set up the project, install plugins, and implement detection in your app.
Ensuring Secure Coding in C#: Maintaining Security
3/22/2024 10:11:52 AM.
The article on secure coding in C# applications, written by Ziggy Rafiq, is a must-read for developers who want to fortify their applications against potential vulnerabilities and security threats. By
How to Learn About Amazon S3
3/22/2024 4:18:11 AM.
Amazon S3, an AWS service, provides secure, scalable object storage with high durability and availability. Key features include lifecycle policies, versioning, and security measures. Practical applica
How to Configure Permission For the Website on IIS
3/19/2024 11:55:53 AM.
In this article, you will learn the essential steps to configure website permissions on IIS, ensuring secure access control. Explore settings in IIS Manager to manage authentication methods, authoriza
Access Entity Based On N:N Relationship For Dynamics 365 Portal
3/15/2024 11:08:51 AM.
Securely access entities based on N: N relationships in Dynamics 365 Portals by configuring appropriate security roles and permissions. Customize relationship behavior to ensure efficient data managem
Provide Security Role Access for D365 Outlook
3/14/2024 7:00:05 AM.
In this article, we will customize permissions, manage user access, and enforce Role-Based Access Control (RBAC). Optimize Microsoft 365 settings to tailor access rights, enhancing data protection and
OKTA Authentication in .NET Core API
3/13/2024 3:20:25 AM.
Authentication in .NET Core API is crucial for securing endpoints, preventing unauthorized access, and ensuring data protection. This tutorial guides you through implementing Okta OAuth-based authoriz
Azure Monitoring Services Guide: Implementation and Examples
3/10/2024 7:27:11 AM.
This article is a comprehensive guide to Azure monitoring services, with implementation steps and examples. Real-world examples illustrate effective monitoring of Azure resources for optimal performan
Securing Your Cloud Infrastructure with Azure DDoS Protection: Strategies and Examples
3/8/2024 1:28:49 PM.
This article would talk about securing your cloud infrastructure with Azure DDOS protection with strategies, steps, and examples
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
How To Secure PII Data In SQL Server Using CLE (Column Level Encryption)
3/6/2024 10:45:53 AM.
PII (personally identifiable information) which is used to identify individual identity such as SSN, DOB, Bank Account Number etc. When you are working with financial application you face the scenario
How to Enable Remote Connections in SQL Server 2005
3/5/2024 10:39:30 AM.
This article provides guidance on enabling remote connections in SQL Server 2005, addressing the common error message encountered when attempting a remote connection. It outlines the security precauti
How to Get the MAC Address of System Using ASP.NET/C#
3/1/2024 10:35:18 AM.
In this article, we will learn how to retrieve the MAC address of a system using Asp.net/C#. Explore methods to access network interface information, retrieve hardware identifiers, and ensure system s
What are Virtual Switches and Standard Switches?
3/1/2024 10:32:11 AM.
In this article, we will explore the distinction between Virtual Switches and Standard Switches in networking for virtualized environments. Dive into their roles in managing network traffic, configuri
How To Reverse Engineer Using OllyDbg
3/1/2024 9:19:32 AM.
This article provides an introduction to obfuscation and reverse engineering, focusing on using OllyDbg as a reverse engineering tool. It explains the concept of obfuscation as a means to secure sourc
Rename or Delete User Account in Windows 8
2/27/2024 11:17:07 AM.
To rename or delete a user account in Windows 8, navigate to Control Panel, then User Accounts. From there, you can select the account you wish to modify and choose the option to rename or delete it.
Turn Off Pop-up Blocker in Internet Explorer Using Windows 8
2/27/2024 11:06:08 AM.
To disable the pop-up blocker in Internet Explorer on Windows 8, open the browser, go to "Tools" or click the gear icon, select "Internet options", navigate to the "Privacy&qu
Windows Defender in Windows 8 Includes MSE
2/27/2024 10:38:20 AM.
This article explains how Windows Defender in Windows 8 integrates Microsoft Security Essentials (MSE) to provide comprehensive virus protection.
Block a Program's Internet Access in Windows 8
2/26/2024 9:30:35 AM.
This article provides a guide on how to block a program's internet access using the Windows Firewall in Windows 8 for security purposes.
Logout From Microsoft Account in Windows 8
2/26/2024 9:29:43 AM.
This article provides instructions on how to disconnect or remove a Microsoft account from a Windows 8 PC to stop all Microsoft online services for security reasons.
Add Windows Defender to Context Menu in Windows 8
2/26/2024 9:24:25 AM.
Integrate Windows Defender into the context menu of Windows 8 for quick access to security features. Modify registry settings or use third-party tools to add Defender options to the right-click menu.
How To Check If Your System Is Ready For Windows 11
2/22/2024 11:32:18 AM.
This content provides an introduction to Windows 11, highlighting its key features, minimum system requirements, compatibility testing process, availability details, and useful links for further infor
How to Enable or Disable File and Printer Sharing in Windows 10
2/22/2024 11:29:50 AM.
To enable or disable file and printer sharing in Windows 10, navigate to "Settings" > "Network & Internet" > "Network and Sharing Center." From there, select &q
How To Enable Screen Saver In Windows 10
2/22/2024 6:36:58 AM.
To enable the screen saver in Windows 10, access "Settings," navigate to "Personalization," then "Lock screen," and select "Screen saver settings." Choose a scr
How To Find Your Wi-Fi Password In Windows 10
2/22/2024 6:33:54 AM.
In this tutorial, I have described how to Easily retrieve your Wi-Fi password in Windows 10 through network settings. Access the Network and Sharing Center or use Command Prompt to view network proper
How to Remove Your Gmail Account from Unwanted Website
2/21/2024 5:54:57 AM.
Once you've removed a website's access to your Email account, they will no longer be able to access your email.
Cloud Security: Secure Access from your Applications to Azure SQL
2/19/2024 4:47:28 AM.
In this session, you will discover the differences between authentication on-premises and in the cloud and learn how to go way beyond the basic user/password for authentication.
Exploring the Anticipated Features of Android 15
2/18/2024 6:01:05 AM.
Get ready for a mobile revolution! Android 15 is on the horizon, promising enhanced privacy, personalized experiences, boosted performance, and exciting features for creators and professionals. This a
Securing Your .NET Projects: Simple Strategies and Real Examples
2/18/2024 4:46:27 AM.
In today's digital world, keeping our software safe from cyber threats is super important. For developers working with .NET projects, it's not just a good idea but really necessary to make sur
Fortifying your .NET Project
2/16/2024 3:45:43 AM.
This article explores essential strategies to enhance the security of .NET projects, addressing common threats like SQL injection and XSS. It covers input validation, parameterized queries, authentica
Enable Audit History for an Entity in CRM
2/15/2024 9:16:31 AM.
Enable audit history in CRM to track entity changes. Enhance data security, compliance, and integrity by monitoring modifications. Configure settings to log and report on user actions for improved gov
Cybersecurity of External Streaming Data - Non-repudiation
2/14/2024 4:13:22 AM.
This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part co
Cybersecurity of External Streaming Data - Integrity
2/14/2024 4:04:35 AM.
This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity of b
Cybersecurity of External Streaming Data - Confidentiality
2/14/2024 4:02:06 AM.
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
Code Obfuscation in Flutter: Enhancing App Security
2/12/2024 7:06:05 AM.
Explore code obfuscation as a way to improve the security of your Flutter mobile applications. Safeguard your code from reverse engineering and tampering with effective strategies.
Xite Encryption
1/31/2024 10:06:02 AM.
This code provides an easy-to-use encryption and decryption solution in C#. It utilizes RSA cryptography, allowing seamless integration into Visual Studio projects. This class contains methods/functio
Disabling Multifactor Authentication in Microsoft related Services
1/24/2024 6:47:10 AM.
This article describes the process to disable MFA for Microsoft related services using Microsoft Entra.
🖥️ Incident Handling: Common Malware Attacks
1/23/2024 9:57:06 AM.
Explore the realm of malware attacks, unveiling the intricacies of threats like ransomware, computer viruses, worms, Trojan horses, and adware. Delve into their types, characteristics, and potential i
🖥️ Incident Handling: Common Domain Attack Types
1/22/2024 7:18:18 AM.
In this article, we will go through different types of Domain Attacks. Domain attacks, including Typosquatting, Domain Hijacking, Pass the Hash, Pass the Ticket, LDAP Reconnaissance, and Brute Force,