Articles

  • George

    Forms Authentication (A), Using XML

    This article discuss Forms Authentication by using XML
    George May 03, 2021
  • George

    Forms Authentication (B), Using Database

    This article discuss Forms Authentication using Database.
    George May 03, 2021
  • George

    Forms Authentication (C), Using Database With Filter

    This article discuss Forms Authentication using Database with MVC Filter
    George May 03, 2021
  • Vinay Ayinapurapu

    OAuth 2.0 Overview

    This article only talks about Oauth protocol.
    Vinay Ayinapurapu Apr 27, 2021
  • Mahesh Chand

    Top 10 Tips To Protect From Online Hacking

    Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will...
    Mahesh Chand Jul 24, 2018
  • Sourabh Somani

    How To Enable HTTPS On Your Website For Free

    Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 1...
    Sourabh Somani Mar 20, 2018
  • Sandeep Mishra

    Protection Against Busting Frame Busting

    In this article, you will learn about protection against Busting Frame Busting.
    Sandeep Mishra Dec 05, 2020
  • Sandeep Mishra

    Protection Against Clickjacking

    In this article, you will learn about protection against Clickjacking.
    Sandeep Mishra Dec 05, 2020
  • Sandeep Mishra

    Learn About Clickjacking

    In this article, you will learn about Clickjacking.
    Sandeep Mishra Dec 02, 2020
  • Sandeep Mishra

    Learn About Same Origin Policy (SOP)

    In this article, you will learn about Same Origin Policy (SOP)
    Sandeep Mishra Nov 23, 2020
  • Ashish Bhatnagar

    Implementing EJB Security

    In this article, you will learn how to implement EJB Security.
    Ashish Bhatnagar Nov 12, 2020
  • Anupam Maiti

    AccessToken Vs ID Token Vs Refresh Token - What? Why?When?

    In this article, you will learn about AccessToken vs ID Token vs Refresh Token – What? Why? When?
    Anupam Maiti Nov 06, 2020
  • Anupam Maiti

    OAuth2.0 And OpenID Connect (OIDC) Core Concepts - What? Why? How?

    In this article, you will learn about OAuth2.0 and OpenID Connect (OIDC) Core Concepts – What? Why? How?
    Anupam Maiti Oct 16, 2020
  • Anupam Maiti

    Understanding Workflow Of OAuth2.0 Authorization Grant Types

    In this article, you will learn about workflow Of OAuth2.0 Authorization Grant Types.
    Anupam Maiti Oct 15, 2020
  • Sandeep Mishra

    IT Security vs. Secure Coding

    In this article, you will learn about IT Security vs. Secure Coding.
    Sandeep Mishra Sep 18, 2020
  • Sandeep Mishra

    Session Fixation - Exercise

    In this article, we are going to look at Session Fixation in ASP.NET web applications with some code examples in VB.NET.
    Sandeep Mishra Sep 11, 2020
  • Sandeep Mishra

    From Infected Computer To Targeted Attacks

    In this article, you will learn about infected computers to targeted attacks.
    Sandeep Mishra Sep 04, 2020
  • Sandeep Mishra

    Vulnerabilities From Botnets To Cybercrime

    In this article, you will learn about the vulnerabilities of botnets and cybercrime.
    Sandeep Mishra Sep 04, 2020
  • Sandeep Mishra

    Transport Layer Security

    In this article, you will learn about Transport Layer Security.
    Sandeep Mishra Sep 02, 2020
  • Sandeep Mishra

    Web Application Security

    In this article, you will learn about Web Application Security.
    Sandeep Mishra Aug 30, 2020
  • View More