IT Security


  • Understanding JSON Web Tokens (JWT)

    In this article, we are going to understand about JSON Web Token which is known as JWT.
  • Generating Symmetric Private Key In C# and .NET

    Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and init...
  • Generating Public/Private Keys In C# And .NET

    How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvid...
  • How To Enable HTTPSđź”’ On Your Website For Free

    Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 1...
  • Top 10 Tips To Protect From Online Hacking

    Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will...
  • Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
  • LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
  • Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
  • Cross Site Scripting (XSS) - A Client Side Web Security Attack

    This article will be focusing on cross site scripting attack and prevention in general.
  • Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
  • Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
  • Known Wrongs In Securing Software

    In this article, you will learn about "known wrongs" in securing software.
  • Encrypting App.config For Multiple Machines

    Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
  • What About Data Privacy

    What developers need to know about data privacy law...
  • Sensitive Data Exposure And Its Securing Techniques

    In this article you will learn about sensitive data exposure and its securing techniques.
  • Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism

    In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
  • Missing Function Level Access Control And Its Prevention Mechanism

    In this article, you will learn about missing function level access control and its prevention mechanism.
  • Approaches To Security Misconfiguration

    In this article, you will learn about the approaches to security misconfiguration.
  • Secure Your Application's Config File

    In this article you will learn how to secure your Config Application’s Config File.
  • File Hash Comparison With MD5 And SHA1

    In this article you will learn about File Hash Comparison with MD5 and SHA1.
  • View More