IT Security


  • Encrypting App.config For Multiple Machines

    Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
  • What About Data Privacy

    What developers need to know about data privacy law...
  • Sensitive Data Exposure And Its Securing Techniques

    In this article you will learn about sensitive data exposure and its securing techniques.
  • Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism

    In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
  • Missing Function Level Access Control And Its Prevention Mechanism

    In this article, you will learn about missing function level access control and its prevention mechanism.
  • Approaches To Security Misconfiguration

    In this article, you will learn about the approaches to security misconfiguration.
  • Secure Your Application's Config File

    In this article you will learn how to secure your Config Application’s Config File.
  • Check your Firewall Port Details

    In this blog you will learn how to Check your Firewall Port Details.
  • File Hash Comparison With MD5 And SHA1

    In this article you will learn about File Hash Comparison with MD5 and SHA1.
  • SSL Certificate Based Authentication In Web API Project

    In this article you will learn SSL Certificate based Authentication in Web API Project
  • Setting HTTPS On Your Website

    In this article we will try to learn how we can apply https on our website in a test environment.
  • Password Encryption Using Salt Hashing In ASP.NET MVC

    This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
  • Security On The Web By Advanced Encryption Standard (AES) and Security Assertion Markup Language ...

    In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
  • Efficiently Storing Passwords in .NET Framework

    In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
  • Brute Force Attacks And How to Block Them

    In this article we learn about Brute Force Attacks and how to prevent them.
  • Passphrase vs Password For Security

    In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
  • What a SSL Certificate Is and How It Works

    In this article you will learn about SSL Certificates and how they work.
  • What is SSL and How to Implement in ASP.Net Web Application

    This article explains SSL and how to implement SSL in an ASP.Net web application.
  • Vulnerable Encoded URLs

    In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text and is susceptible to MITM attack.
  • Code Injections: Injecting Spyware in EXE

    In this tutorial you will learn how to inject spyware into an EXE.
  • Applied Secure Socket Layer in .NET: Part 2 Installation and Testing

    This article is resuming the voyage by covering the applied aspect of SSL on .NET website via IIS webserver along with the creation of digital certificates.
  • Secure Socket Layer in .NET

    This article explains the Secure Sockets Layer (SSL) including the inherent issue of web server security and the process of SSL configuring and implementing in the form of digital certificates over an ASP.NET website.
  • OWASP Top 10 Risks #2: Broken Authentication and Session Management

    Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where things can go wrong and how to prevent it.
  • .NET Code Access Security (CAS)

    Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from unauthorized actions.
  • OWASP Top 10 Vulnerabilities

    The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.