Security
IT Security

Articles

  • Writing Secure Code Using C#

    Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how to write secure code in C# and .NET.
  • I Don’t Know Crap About Security (Or At Least I Didn’t)

    Recently, I was involved in a project where I got a chance to work on its security and frankly, I didn't know anything about security. In this write-up, I have shared how I went through it.
  • Understanding JSON Web Tokens (JWT)

    In this article, we are going to understand about JSON Web Token which is known as JWT.
  • Generating Symmetric Private Key In C# and .NET

    Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and initialization vector.
  • Generating Public/Private Keys In C# And .NET

    How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider and DSACryptoServiceProvider classes are used for asymmetric encryption.
  • How To Enable HTTPS🔒 On Your Website For Free

    Today, a website security is one of the top priorities for developers and HTTPS is the firs step. This step by step walk-through tutorial teaches how to implement the SSL on a Website for free in 10 minutes.
  • Top 10 Tips To Protect From Online Hacking

    Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will most likely to keep hackers away from your personal data.
  • Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Securities for individuals, corporations, government bodies and other worldwide orgnisations. However It does not endorse or suggest commercial products or services. It has its own application security tutorial series.
  • LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult to crack for the hacker but it is never impossible to hack a database.
  • Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
  • Cross Site Scripting (XSS) - A Client Side Web Security Attack

    This article will be focusing on cross site scripting attack and prevention in general.
  • Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
  • Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
  • Known Wrongs In Securing Software

    In this article, you will learn about "known wrongs" in securing software.
  • Encrypting App.config For Multiple Machines

    Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
  • What About Data Privacy

    What developers need to know about data privacy law...
  • Sensitive Data Exposure And Its Securing Techniques

    In this article you will learn about sensitive data exposure and its securing techniques.
  • Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism

    In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
  • Missing Function Level Access Control And Its Prevention Mechanism

    In this article, you will learn about missing function level access control and its prevention mechanism.
  • Approaches To Security Misconfiguration

    In this article, you will learn about the approaches to security misconfiguration.
  • View More