In this article you will learn how to secure your Config Application’s Config File.
In this article you will learn about File Hash Comparison with MD5 and SHA1.
Varun Bansal Apr 02, 2016 In this article you will learn SSL Certificate based Authentication in Web API Project
In this article we will try to learn how we can apply https on our website in a test environment.
This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
In this article we learn about Brute Force Attacks and how to prevent them.
In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
In this article you will learn about SSL Certificates and how they work.
This article explains SSL and how to implement SSL in an ASP.Net web application.
Divya Sharma Dec 17, 2014 In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text ...
In this tutorial you will learn how to inject spyware into an EXE.
This article is resuming the voyage by covering the applied aspect of SSL on .NET website via IIS webserver along with the creation of digital certificates.
This article explains the Secure Sockets Layer (SSL) including the inherent issue of web server security and the process of SSL configuring and implementing in the form of digital certificates over...
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where thin...
Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from u...
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
This application an be used to encrypt a text message using AES encryption as well as send it to the person whose email is provided. This could be used as the security software for any of us. But t...
This article describes a simple approach to determining whether or not a logged in user is a member of a group within the context of a desktop application. The approach shown relies upon the use o...