Related resources for key
  • .NET Framework At A Glance4/25/2024 11:27:49 AM. .NET Framework At A Glance. In this post let's see what is the .NET Framework, benefits of the .NET Platform, introducing CLR, CTS, and CLS, Framework Class Library(FCL), Managed vs. Unmanaged Cod
  • Text Encrypt and Decrypt With a Specified Key4/25/2024 8:05:19 AM. Encrypting and decrypting text with a specified key involves using cryptographic algorithms to convert plain text into cipher text and vice versa, ensuring data security. The key serves as the paramet
  • Getting Started With ClimaCell Weather4/24/2024 7:59:32 AM. This article explores integrating the ClimaCell Weather API into JavaScript applications, covering API key retrieval, geolocation, API calls, and data visualization. A step-by-step guide demonstrates
  • Cache-Aside Pattern Using ASP.NET Core And Azure Redis Cache4/24/2024 7:54:32 AM. "Implement Cache-Aside pattern in ASP.NET Core with Azure Redis Cache for efficient data retrieval. Cache data on-demand, reducing database load and enhancing application performance through dist
  • Working with Registry Using .NET4/23/2024 8:53:01 AM. Explore efficient ways to interact with the Windows Registry using the .NET framework. Learn how to perform key management, editing, and manipulation operations seamlessly in C#. Master registry acces
  • Handling Events In AngularJS4/21/2024 2:20:18 PM. Handling events in AngularJS involves binding HTML elements to specific AngularJS expressions or functions using directives like ng-click, ng-change, or ng-submit. This allows for interactive user exp
  • MySQL Queries Cheat Sheet4/18/2024 3:54:25 AM. In this article, we will learn about MySQL querying essentials, covering basic SQL commands, data manipulation functions, constraints, and frequently asked questions, providing valuable insights for b
  • 🔒 Azure Key Vault Certificate Validation with C#4/16/2024 10:58:22 AM. In this informative article, we will delve into the world of secure certificate validation in the Azure Key Vault environment using C#. By leveraging the power of the X509Certificate2 class, we can im
  • Sending Email with Attachment using SendGrid Email Service 4/15/2024 11:42:50 AM. Learn to integrate SendGrid email service in ASP.NET Core MVC using C#. Set up SendGrid account, obtain API key, implement email sending functionality, and utilize ASP.NET Core MVC for web application
  • Handling Date Time In Excel To SharePoint List4/15/2024 11:42:15 AM. Automate handling Email attachments named "Excel.xlsx" in Outlook by adding them to SharePoint library. Read Excel data, insert/update in SharePoint list based on primary key. Manage Date Ti
  • Automate Azure Key Vault Key Refresh with Managed Identity 4/15/2024 8:41:39 AM. Automate key refresh in Azure Key Vault using Azure Function with Managed Identity. Enhance security and efficiency by managing secrets automatically within your Azure environment, ensuring seamless a
  • How To Encrypt And Decrypt In C# Using Simple AES Keys4/12/2024 11:29:58 AM. Learn how to encrypt and decrypt data in C# using simple AES keys. AES, a symmetric encryption algorithm, ensures secure communication by encoding and decoding messages.
  • Storing and Retrieve Value Using Session Storage in HTML54/11/2024 10:58:10 AM. Learn how to utilize HTML5 Session Storage to store and retrieve data on the client-side. This tutorial explores storing values, retrieving stored data, and displaying it dynamically on a webpage usin
  • How To Use Sequelize-CLI In Node4/11/2024 7:03:38 AM. Learn to use Sequelize CLI to create tables, set up relationships with foreign keys. Prerequisites include Node and MySQL. Set up project structure, install necessary packages. Configure Sequelize str
  • What is Record Keyword/Function in C#?4/3/2024 10:37:44 AM. Records introduced in C# 9.0 represent a significant enhancement to the language's capability for handling data. This article aims to explore records in-depth, covering their syntax, features, and
  • How to Limit the User to Typing Only Numeric Values in a TextBox Using JavaScript4/3/2024 9:40:05 AM. Limit user input to numeric values in a textbox using JavaScript. Implement event handling for keypress events to validate input against character codes, allowing only numeric values. Enhances user ex
  • Limit the User to Typing Only Letters Into a TextBox Using JavaScript4/3/2024 9:39:34 AM. Learn how to implement client-side input validation in JavaScript to restrict users from entering anything other than letters (including spaces) in specific input fields like Name, Father's Name,
  • Auth0 App Registration - JWT Generation & Validation with Public Key4/3/2024 4:19:56 AM. Auth0 offers robust solutions for app registration, JWT generation, and access token management. Developers configure settings, generate JWTs signed by Auth0's private key, and validate them using
  • What is Public Methods or Public Keyword in C#?4/2/2024 6:41:24 AM. Access modifiers play a crucial role in object-oriented programming languages like C#. They dictate the accessibility of classes, methods, properties, and other members within a program. In this artic
  • Configure SLA’s and KPI’s in Microsoft Dynamics 365 Service3/31/2024 3:51:46 AM. In this article, we will configure SLAs and KPIs in Microsoft Dynamics 365 Service involves setting up service level agreements to define response times and resolution targets, along with key performa
  • The "this" Keyword in C#3/28/2024 10:38:53 AM. The "this" keyword in C# is a reference to a class or a struct itself. In this article, you'll learn what the C# "this" keyword is, and how and when to use the "this"
  • Difference Between Const, ReadOnly and Static ReadOnly in C#3/28/2024 10:38:00 AM. Common keywords like Const, ReadOnly, and Static ReadOnly are quite confusing. So today we will discuss these keywords and try to understand the difference between Const, ReadOnly, and Static ReadOnly
  • ref vs out in C#3/28/2024 10:37:15 AM. Explore the distinction between 'ref' and 'out' keywords in C#. Learn how 'ref' passes arguments by reference for both input and output, while 'out' is used solely for
  • Backup Encryption In SQL Server3/28/2024 6:36:20 AM. SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
  • How To Get Started With Always Encrypted For Beginners - Part Three3/28/2024 6:26:32 AM. Discover advanced techniques in data security with Always Encrypted in Microsoft SQL Server. Part Three of our beginner's guide delves deeper into encryption keys, transparent data encryption, and
  • Boost Coding Productivity with Yield Keywords in C#3/28/2024 6:24:18 AM. In today's programming landscape, continuous learning is essential for developers to enhance productivity and efficiency. C# introduces new features like yield return and yield break, optimizing c
  • How to Open This PC Window in Windows 103/19/2024 11:55:13 AM. In this article, we will learn how to swiftly access the "This PC" window on Windows 10. Discover various methods such as using the desktop shortcut, taskbar icon, or keyboard shortcut (Win
  • Understanding Maps In JavaScript3/18/2024 12:02:38 PM. Maps in JavaScript offer a key-value data structure for efficient storage and retrieval of information. They provide methods for easy manipulation and iteration over key-value pairs, enhancing data ma
  • What Is DevOps And Its Key Principles3/15/2024 6:16:52 AM. DevOps merges development and operations, emphasizing collaboration, automation, and continuous integration. Key principles include infrastructure as code, agile practices, and a feedback loop for mon
  • Learn about Keyed Services Use in .NET3/11/2024 7:34:48 AM. .NET 8 introduces native support for keyed services in Dependency Injection (DI), eliminating the need for third-party packages. Learn about registering and resolving keyed services with examples for
  • How To Secure PII Data In SQL Server Using CLE (Column Level Encryption)3/6/2024 10:45:53 AM. PII (personally identifiable information) which is used to identify individual identity such as SSN, DOB, Bank Account Number etc. When you are working with financial application you face the scenario
  • Difference Between Var, Let And Const In JavaScript3/5/2024 9:00:34 AM. This article will explain the nuances of JavaScript variable declaration with var, let, and const. Explore their scope, hoisting behavior, and mutability. Learn when to use each for flexible and error
  • Azure DevOps: Integrate Key Vault Secrets with Local Self-Hosted Agent2/29/2024 10:29:13 AM. Learn how to integrate Azure Key Vault secrets into Azure Pipelines for secure CI/CD processes using Self-hosted Local Agents. The comprehensive guide covers Azure DevOps setup, Key Vault management,
  • How to Activate Windows 82/27/2024 11:55:39 AM. This article explains the process of activating Windows 8 using a valid product key and a network connection.
  • How To Boot Windows 8 Into Safe Mode2/27/2024 10:27:13 AM. To boot Windows 8 into Safe Mode, restart your computer and repeatedly press the F8 key. This will bring up the Advanced Startup Options menu. Alternatively, you can use the "Shift + Restart&quot
  • How to Change Windows 8 Product Key2/26/2024 12:06:26 PM. To change the product key in Windows 8, access activation settings via the Control Panel or Command Prompt using 'slmgr.vbs'. Alternatively, modify the registry with the new key. Ensure proper
  • How to Change Keyboard Language in Windows 82/26/2024 12:06:01 PM. In this article, you will discover the simple steps to change keyboard language in Windows 8. Easily navigate language settings to adjust input methods, enabling seamless multilingual support.
  • How Do You Define Custom Key Modifier Aliases in Vue.js2/26/2024 11:59:09 AM. In Vue.js, enhance keyboard event handling by defining custom key modifier aliases through Vue.config.keyCodes. This guide details the process, demonstrating how to create and utilize these aliases in
  • How to Take Screenshots in Windows 102/23/2024 6:52:59 AM. In this tutorial, I discuss how to Discover various methods to effortlessly capture screenshots in Windows 10. From utilizing keyboard shortcuts like Print Screen to leveraging built-in tools like Sni
  • How To Find Your Wi-Fi Password In Windows 102/22/2024 6:33:54 AM. In this tutorial, I have described how to Easily retrieve your Wi-Fi password in Windows 10 through network settings. Access the Network and Sharing Center or use Command Prompt to view network proper
  • Azure Key Vault Creation, RBAC Setup, User Addition, Secret Management2/21/2024 11:18:44 AM. Azure Key Vault empowers secure storage of secrets, keys, and certificates. Implement RBAC for fine-grained access control, manage users, and grant permissions. Easily create backup, delete, and resto
  • Third-party API Integration in Asp.NET Core Web API2/20/2024 6:21:52 AM. ASP.NET Core is a powerful framework for building web APIs, allowing developers to create robust and scalable applications. One of the key features of modern web development is the integration of thir
  • Learn SharePoint In Series - Part Fourteen - Enterprise Metadata And Keywords Settings In List2/15/2024 12:07:27 PM. Explore enterprise metadata and keyword settings in SharePoint lists. Learn to manage content classification, taxonomy, and information governance effectively within your organization's informatio
  • Using Azure Workbooks to Visualize Key Metrics for Your Website2/14/2024 8:14:50 AM. Learn how to create a workbook to visualize the region of origin for your website's traffic using Azure Monitor Application Insights.
  • Visual Studio Builds and Key Features2/14/2024 4:15:54 AM. Visual Studio Builds Since 2005 and main key features. Explore the growth of Visual Studio, Microsoft's premier Integrated Development Environment, from its inception in 1997 to the latest feature
  • Explain Keyed Services in .NET 82/12/2024 11:59:02 AM. This article explores the concept of keyed services in .NET 8, a new feature enhancing dependency injection capabilities. It explains the benefits of using keyed services, along with detailed steps on
  • How To Register An App In Azure Active Directory2/12/2024 9:27:07 AM. This guide outlines the steps to register an application in Azure Active Directory (AD). The purpose includes integrating apps and services with Azure AD, generating tokens for authentication, and lev
  • Data Insights: Analyzing Key Influencers with Power BI Visuals2/8/2024 11:13:07 AM. The key influencers visual helps to understand the factors that drive a metric you're interested in. It analyzes your data, ranks the factors that matter, and displays them as key influencers.
  • What Are Relationships in Power BI2/8/2024 7:08:14 AM. This content provides an overview of the different types of relationships that can be established between tables in Power BI. It discusses four main types of relationships: many-to-one, one-to-one, on
  • Key Design Patterns in Software Engineering2/8/2024 6:48:50 AM. Discover essential design patterns such as Singleton, Factory, Abstract Factory, Unit of Work, Repository, and Command Query Responsibility Segregation (CQRS). Learn their applications and implementat
  • Creating Keystore to Publish MAUI App from Scratch to End2/7/2024 11:00:43 AM. When you embark on the journey of app development, the prospect of publishing your creation to a vast audience is undoubtedly thrilling. Publishing an app is not just about making it available; it&#39
  • Easily Read Key Vault Secrets From ASP.NET Core Web API Application2/7/2024 5:29:31 AM. Azure Key Vault facilitates secure storage and access to sensitive information such as API keys and passwords. It organizes secrets into logical groups called vaults. Refer to Microsoft's document
  • What Are Event Modifiers in Vue.js2/7/2024 5:07:28 AM. Event handling in Vue.js becomes even more powerful with the use of event modifiers. These modifiers enhance your ability to precisely control how events trigger the execution of methods, making your
  • Data Vault Design in Azure SQL - Read PII with Customer Keys2/5/2024 11:00:54 AM. Data Vault design in Azure SQL - Utilizing Customer keys to read PII information in databases. Ensuring data security in the cloud era is crucial, especially with the rise in data attacks. Protecting
  • Using XML Key-Value Pairs in C# as a Dictionary1/30/2024 6:15:02 AM. To represent key-value pairs in XML, you typically use elements and attributes. how to represent key-value pairs in XML using C#. It covers XML file creation, interface and enum implementation, and m
  • Synchronous vs Asynchronous Programming in ASP.NET Core Web API1/21/2024 1:50:22 PM. Synchronous Programming: In synchronous programming, tasks are executed one after the other, in a sequential manner. When a request is made to a synchronous API, the server processes the request and w
  • Automating Azure Application Gateway Certificate using Key Vault and ACME Bot1/18/2024 3:07:13 PM. In this session, you will learn how to automate it using a function app and Key Vault.
  • What Are Key Modifiers in Angular?1/16/2024 8:22:07 AM. Unleash the power of key modifiers in Angular to capture precise keyboard events. Explore examples like (keyup.enter), (keydown.space), and more, enhancing user interaction in your Angular application
  • What Is Short keyword In C#1/16/2024 6:27:30 AM. In this article, you will learn about What is Short Keyword in C#
  • What Are Key Modifiers in Vue.js?1/12/2024 8:17:19 AM. Master Vue.js keyboard event handling with key modifiers. From @keyup.enter for Enter key to @keyup.ctrl.alt for Ctrl + Alt combination, explore precise event capture for seamless Vue.js applications.
  • Virtual Method in C#1/9/2024 9:15:39 AM. C# virtual keyword is used to create a virtual method in C#. Learn how to use virtual methods in C#.
  • Microsoft's Copilot Key: OH MY GOODNESS !1/7/2024 6:01:49 AM. A Window into AI-Powered Computing's Future with CoPilot Key. Microsoft unveils the Copilot key, envisioning an AI-powered future. This dedicated key on Windows 11 PCs promises personalized, ethic
  • Azure Key Vault Secret Client Library for Python SDK1/2/2024 8:59:29 AM. This module speaks about accessing Key Vault secrets through Python code. Key Vault is a service offered by Azure to store secrets such as passwords, certificates, keys etc in a safe and secure manner
  • Generating X.509 Certificates with Private and Public Keys for IoT Device Security1/2/2024 5:57:38 AM. In this article, we will explore the process of generating X.509 certificates with private and public keys for IoT device security. This is essential for testing purposes, particularly when working wi
  • HashMaps in C#12/26/2023 12:24:41 PM. HashMaps in C# using the Dictionary<TKey, TValue> class. This article delves into their basics, operations, and performance, providing essential insights for efficient key-value pair management
  • Configuration providers in .NET 12/22/2023 9:51:03 AM. Core concepts of configuring applications in .NET through versatile configuration providers. Learn how these providers bridge applications and settings, supporting various sources like files, environ
  • Beyond Keywords: Decoding the Hidden Meaning - Semantic Search12/20/2023 5:07:21 AM. Semantic Search represents a significant shift in how we interact with information. As technology advances, Engines will become even better at grasping complex concepts and nuances in language. As voi
  • Using RESTSharp for CRUD Operations in ASP.NET Core Web API12/19/2023 7:24:01 AM. Utilizing RESTSharp for CRUD operations in ASP.NET Core Web API offers a streamlined approach to interacting with APIs. This library simplifies HTTP requests and responses, allowing developers to focu
  • API Keys vs Tokens12/12/2023 4:41:31 AM. In the realm of APIs, API keys and tokens serve distinct roles. API keys authenticate requests with simplicity, while tokens, like JWTs, offer enhanced security and access control. This article elucid
  • How to Remove Malicious Software in Windows 1112/11/2023 9:00:03 AM. Learn the proper and easy method to remove malicious software. Utilize Microsoft's Malicious Software Removal Tool with a step-by-step guide for effective scans. #Cybersecurity #MalwareRemoval
  • Source Control (7-2), Setup SSH Key For GitLab12/8/2023 4:48:33 AM. This article will discuss how to Setup SSH Key for GitLab.
  • Difference between wallet, account, address11/29/2023 6:21:46 AM. Master digital finance with wallets, accounts, and addresses. Your gateway to a dynamic financial landscape awaits!
  • Configuring Azure Key Vault in a .NET Core Web API11/24/2023 5:08:28 AM. This step-by-step guide explores integrating Azure Key Vault into a .NET Core Web API, enhancing security by securely managing sensitive information like API keys. Detailed instructions ensure a smoot
  • How To Define Variables And Constants In R11/17/2023 6:28:57 AM. In this article, I am going to explain about variables and constants in R.
  • Keyed Dependency Injection in .NET 811/16/2023 7:44:47 AM. Keyed dependency injection, introduced in .NET 8, is a powerful feature allowing service resolution based on specific keys. This enables managing multiple implementations of the same interface efficie
  • What is an API Gateway and What are the Functionalities of the API Gateway?11/12/2023 8:58:35 AM. This article explains the overview of API Gateways and their key functionalities are well-structured and informative. It covers the fundamental concepts, roles, and capabilities of API Gateways in a w
  • How To Use Dynamic To Return Different Objects On Runtime In C#11/7/2023 11:29:41 AM. A lot of time you get a requirement to return different kind of object from a single method. Is it possible? Yes there are ways by which you can deliver different objects on run time and dynamic is on
  • Params Keyword With IEnumerable In C# 6.011/6/2023 11:31:48 AM. The params keyword in C# allows you to pass a variable number of arguments of the same type to a method. This feature simplifies method calls when you need to pass a variable number of arguments witho
  • What is Text Analysis in Artificial Intelligence11/2/2023 4:19:28 AM. what is text analysis in AI, what are the techniques available in the text analaysis, how it would be beneficial to the business, the number of use cases available for the text analaysis and finally t
  • 9 Key Concepts To Keyword 'Static'10/26/2023 7:05:54 AM. This article summarizes some of the key concepts around the keyword static that every developer must remember.
  • Azure Functions C#10/23/2023 6:55:51 AM. Microsoft’s primary compute service is Azure function C#. We gain agility in development by focusing on our code and not worrying about server maintenance by using Azure functions. We are seeing the a
  • How To validate Appsetting.json Configuration Values In .NET10/16/2023 9:26:04 AM. In .NET applications, the appsettings.json file is commonly used to store configuration settings. It's essential to validate the values stored in this file to ensure that they meet the required fo
  • TripleDES Encryption and Decryption in C#10/16/2023 5:35:37 AM. Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
  • Using API Key Authentication To Secure ASP.NET Core Web API 10/13/2023 8:46:44 AM. In this article, you will learn how to secure ASP.NET Core Web API using API Key authentication.
  • Understanding Yield Return in C#10/10/2023 5:28:29 AM. The C# yield keyword signals to the compiler that the method in which it appears is an iterator block. The compiler generates a class to implement the behavior that is expressed in the iterator block.
  • How to Set-up Trezor Hadware Wallet?10/9/2023 8:54:42 AM. Secure your cryptocurrencies with Trezor Hardware Wallet - the ultimate shield against cyber threats and unauthorized access.
  • Setting Business Constraint for Uniqueness of a Composite Key in Master Data Services10/5/2023 7:06:22 AM. Setting Business Constraint for Unique Combination of Multiple Columns in Master Data Services
  • C#.NET - Generate An API Key Using Nuget Library10/5/2023 6:47:45 AM. This article is about the integration of the Asmak9.AuthorizeRESTWebApiAK .NET library with a C#.NET Console Application.
  • How to Decrypt data using RSA algorithm in C#?10/3/2023 6:55:16 AM. In this article, we have sample code for decrypt an encrypted data with help of RSA Decryption algorithm and .pfx file which contains private key for decryption.
  • Angular Hydration: A Key Concept for Web Developers9/27/2023 10:13:37 AM. Angular Hydration A Key Concept for Web Developers explores the fundamental concept of Angular hydration, a critical element in Angular's rendering process. This concept is pivotal for web develop
  • 2 Ways to Implement Asynchronous Technique in C#9/25/2023 12:01:05 PM. In this article we will see how to implement asynchronous style in C# application (yes, even in .NET 4.0).
  • Implement Multiple Inheritance In C#9/25/2023 5:59:06 AM. C# does not support multiple inheritance for classes in the traditional sense, meaning a class cannot inherit from more than one class. However, C# provides mechanisms to achieve similar functionality
  • Object Vs var Vs Dynamic Type in C#9/22/2023 10:54:17 AM. In this article you will learn about Object Vs var Vs Dynamic type in C#.
  • Dictionary Overview In C#9/22/2023 8:33:21 AM. This article is an overview of Dictionary in C#. Dictionary is a generic class that belongs to the System.Collection namespace in . NET. A dictionary can store Keys and Values of any data type in .NET
  • C# ref Keyword9/21/2023 11:49:00 AM. C# ref and C# out keywords are used in method parameters. This article helps you decide whether to use a ref or out keyword, especially when the parameter types are value types.
  • How to Use Key Vault in Azure?9/21/2023 10:21:18 AM. I've noticed that you've pasted a detailed set of instructions on how to create an Azure Key Vault and manage secrets within it. Is there anything specific you would like to discuss or ask abo
  • How To Use Extension Methods In C#9/21/2023 4:17:56 AM. This article explains use of Extension Methods in C# to increase the functionality of a type (class).
  • Type Inference in C#9/20/2023 5:31:24 AM. Understand what is type Inference in C# and how to implement it in your code.
  • Microsoft Azure Key Vault9/18/2023 5:01:43 AM. Learn What is Microsoft Azure Key Vault and How does it Work.
  • Custom Extension Method In C#9/15/2023 5:05:51 AM. In C#, extension methods are a powerful feature that allows you to add new methods to existing classes without modifying their source code. A custom extension method in C# is a user-defined method tha