TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Protect
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Arun Choudhary (6)
Sandeep Mishra (5)
Tuhin Paul (3)
Sateesh Arveti (3)
Ajay Yadav (2)
C# Curator (2)
Onkar Sharma (2)
Shanuka Maheshwaran (2)
Mohamed Shifan Salideen (2)
Mahesh Chand (2)
Shubham Srivastava (2)
Allen Oneill (2)
manish Mehta (2)
Sarthak Varshney (1)
Munesh Sharma (1)
Kaviya Balasubramanian (1)
Baibhav Kumar (1)
Abdul Basith (1)
Arun Ramaswamy (1)
Nilesh Jadav (1)
Monica Rathbun (1)
Ziggy Rafiq (1)
Gourav Jain (1)
Nitesh Jha (1)
Amit Mohanty (1)
Aman Singhal (1)
Kaveendra Dhilhan (1)
Alagunila Meganathan (1)
Shubhankar Banerjee (1)
Gowtham K (1)
Kirtesh Shah (1)
Aravind Govindaraj (1)
Keyur (1)
Ajay Kumar (1)
Shaishav Desai (1)
Raj Bhatt (1)
Abhishek Tiwari (1)
Sachin Kalia (1)
Jay Krishnareddy (1)
Munib Butt (1)
Vithal Wadje (1)
Anupam Maiti (1)
Divyang Desai (1)
Jaymin Dangi (1)
Prabhakar Maurya (1)
Satya Prakash (1)
Viknaraj Manogararajah (1)
John Morehouse (1)
Radhakrishnan Govindan (1)
Faisal Pathan (1)
Varun Bhandarkar (1)
Vidyadharran G (1)
Kapil Gaur (1)
Elavarasan R (1)
Andrea Angella (1)
Nithya Mathan (1)
Suketu Nayak (1)
Santosh Kumar Adidawarpu (1)
Jinal Shah (1)
Ramesh Kartik (1)
Mozart He (1)
Pramod Thakur (1)
Sharad Gupta (1)
Gaurav Chauhan (1)
Bechir Bejaoui (1)
Gaurav Gupta (1)
Moses Soliman (1)
Vulpes (1)
Dmitiriy Salko (1)
Saradha Gnanavel (1)
Related resources for Protect
No resource found
How Secure Sockets Layer (SSL) Protects Data Online?
5/7/2024 5:53:30 AM.
Learn how SSL works in a step-by-step guide for beginners and professionals, ensuring secure internet communication and data protection.
Password Protection Using Code in Windows Forms
5/3/2024 9:01:09 AM.
Learn how to implement robust password protection in Windows Forms using C# code. This tutorial covers creating a secure login form in Visual Studio, handling user authentication, and validating passw
Create Secure Store Application In SharePoint O365
5/2/2024 9:51:15 AM.
Learn how to enhance security in SharePoint Online (O365) by creating a secure store application. Explore secure credential management, authentication, and integration with Azure Active Directory for
Protection Against Clickjacking
5/1/2024 11:40:40 AM.
Protection against clickjacking involves implementing measures like frame-busting scripts, X-Frame-Options HTTP header, and Content Security Policy to prevent malicious actors from hijacking clicks on
Protection Against Busting Frame Busting
5/1/2024 11:40:26 AM.
Learn effective techniques to protect against frame busting vulnerabilities on websites. Discover how to implement robust security measures, such as Content Security Policy (CSP), to prevent clickjack
What is Friend Function in C++
4/30/2024 5:50:49 AM.
Data hiding is a core principle in object-oriented programming, but C++ introduces friend functions that defy this rule, enabling access to private and protected class members from outside.
Microsoft Defender for Endpoint (MDE), Common Actions
4/23/2024 11:18:53 AM.
This article provides concise instructions for managing antivirus software on Windows and Linux Azure Virtual Machines using Microsoft Defender for Cloud. It covers tasks such as checking protection s
Applied Reverse Engineering With OllyDbg
4/23/2024 8:25:53 AM.
This paper explores executable cracking using OllyDbg, focusing on reverse engineering without source code. It emphasizes Assembly Programming and tools like OllyDbg and CFF Explorer. Methods include
Azure File Share Snapshot And Implementation
4/15/2024 9:34:25 AM.
Azure File Share Snapshot provides point-in-time backups for file shares in Azure Storage, enabling data protection and recovery. Snapshots capture the state of files at specific moments, offering pea
Save Encrypted Password In Database In ASP.NET
4/3/2024 9:36:57 AM.
In this article, Discover how to enhance security in your ASP.NET application by saving encrypted passwords in the database. Learn the process of encrypting passwords before storing them, ensuring dat
What Are Access Modifiers In C#
3/29/2024 6:45:30 AM.
Access modifiers in C# regulate the accessibility of class members, impacting encapsulation and object-oriented principles. They control the visibility and accessibility of members within classes and
Backup Encryption In SQL Server
3/28/2024 6:36:20 AM.
SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
Secure Coding in C# - Protecting Applications and User Data
3/20/2024 4:27:46 PM.
Protecting applications and user data is crucial in today's digital age. Secure coding practices play a vital role in ensuring the security of the code written in C# on the Microsoft.net Framework
Securing Your Cloud Infrastructure with Azure DDoS Protection: Strategies and Examples
3/8/2024 1:28:49 PM.
This article would talk about securing your cloud infrastructure with Azure DDOS protection with strategies, steps, and examples
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
Securing Remote Access to SQL Server
3/5/2024 4:16:02 AM.
Securing remote access to SQL Server is paramount for data protection and compliance. Explore methods like VPNs, firewalls, encryption, and multi-factor authentication for enhanced security and protec
Windows Defender in Windows 8 Includes MSE
2/27/2024 10:38:20 AM.
This article explains how Windows Defender in Windows 8 integrates Microsoft Security Essentials (MSE) to provide comprehensive virus protection.
How To Enable Delete Confirmation Dialog In Windows 10
2/22/2024 11:33:54 AM.
To enable the delete confirmation dialog in Windows 10, access "Recycle Bin Properties" by right-clicking the Recycle Bin icon. Check "Display delete confirmation dialog" to ensure
Device Endpoint Protection settings configuration in Microsoft Intune
1/17/2024 6:20:33 AM.
Steps to create configuration profile of Endpoint protection in Microsoft Intune.
Protecting Your Web Application From Session Replay Attacks In Azure Cloud
1/15/2024 4:41:58 AM.
In today's world of increasing digital interconnectedness, online security threats are continuously increasing, and cybercriminals are finding new and innovative ways to exploit system vulnerabili
How to Create a Logic App to Protect the PDF with Password
1/3/2024 10:53:35 AM.
In this article, we are going to learn about How to create a Logic App to Protect the PDF with a Password and how to create an Azure Logic App that automatically protects PDF files with passwords and
What are Solidity Modifiers and How do they boost the security of Smart Contracts?
12/28/2023 5:42:54 AM.
Explore the power of Solidity modifiers! From basic syntax to advanced implementations, learn how these tools enhance security, reusability, and efficiency in smart contract development.
NCache Security: A Comprehensive Approach to Protecting Your Cached Data
12/13/2023 5:09:35 AM.
From this article, you will learn a comprehensive approach to protecting your cached data. In the realm of distributed caching, safeguarding cache nodes is crucial for protecting data and infrastructu
ASP.NET Core Data Protection API
12/11/2023 6:40:33 AM.
ASP.NET Core Data Protection API. In web applications, ensuring authenticity is pivotal during round trips. This article delves into the Asp.Net Core Data Protection API, discussing its implementation
OpenID Connect and OAuth 2.0 Cognizance
11/1/2023 7:37:02 AM.
An overview of OpenConnect and OAuth and its usage in the digital world. It introduces a standardized method for verifying user identities, allowing users to authenticate across different sites or app
Networking Components in Microsoft Azure
10/22/2023 7:29:22 AM.
In this article, we delve into the world of networking within Microsoft Azure. Networking is a vital component of any cloud solution, facilitating communication between resources and users. Azure boas
Encapsulation in C#: Understanding and Implementing Data Protection
10/3/2023 8:44:36 AM.
In this article, we'll explore the significance of encapsulation in C# and demonstrate its implementation with practical examples.
Protecting Data Integrity and Privacy in Testing
9/1/2023 9:30:31 AM.
Data Integrity and Privacy in Testing: Essential for Reliability and Compliance. Explore the significance, best practices, and a real-time example of safeguarding sensitive data during testing.
Access Modifiers in C#
7/5/2023 11:03:28 AM.
Access Modifiers in C#
iOS App Security: Best Practices for Protecting User Data
5/12/2023 6:39:13 AM.
This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jail
8 Ways to Protect Excel Files in Java
4/21/2023 9:10:39 AM.
Microsoft Excel also offers users many other ways to protect Excel files. This article will introduce 8 ways to protect Excel files using Java.
How To Implement Azure DDoS Protection Plan For Virtual Networks
4/10/2023 5:22:55 AM.
In this article, you will learn how to implement Azure DDoS Protection Plan for Virtual Networks.
Anonymization Techniques for Data Protection and Privacy
3/20/2023 10:30:57 AM.
An anonymizer is a tool or service that is used to anonymize data by removing or obfuscating identifying information from a dataset, while still allowing the data to be analyzed or used for research p
Deploy And Manage BitLocker On Windows Server
2/27/2023 10:15:35 AM.
In this article, you will learn how to deploy and manage the BitLocker Drive Encryption on windows server,
Exploring The Benefits And Limitations Of Data Anonymization - Use Cases And Considerations For Protecting Privacy
2/17/2023 10:37:15 AM.
In this article, you will learn about exploring the benefits and limitations of Data Anonymization - Use Cases and Considerations for Protecting Privacy.
How To Deploy And Configure Exploit Protection In Windows Server 2022
2/6/2023 11:31:59 AM.
How to deploy exploit protection to your environment, exploit protection helps protect devices from malware that use exploits to spread and infect. You can enable exploit protection on an individual
Few Ways to Prevent Instantiation of Class
11/17/2022 9:05:34 AM.
Let’s go with very interesting facts about oops. There are few ways Stop Instantiation of class.
How To Backup Virtual Machines By Using Azure Portal
11/1/2022 5:25:56 AM.
In this article, you will learn how to backup virtual machines by using azure portal.
Use Dynamic Data Masking To Protect Sensitive Data In Azure SQL Database
9/1/2021 11:07:42 AM.
In this article, you will learn how to use dynamic data masking to protect sensitive data in Azure SQL database.
Creating A .NET 5 Client To Call An API Protected By Certificates
7/15/2021 1:00:13 PM.
In this article, you will learn how to create a .NET 5 client to call an API protected by certificates.
Password-Protected PDF File Using ASP.Net C#
4/28/2021 4:13:57 PM.
This article shows how to send a report to a password-protected PDF format.
Top 10 Tips To Protect From Online Hacking
1/10/2021 7:55:59 PM.
Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will mo
Protecting JavaScript Code
11/28/2020 11:57:54 AM.
In this article, you will learn about protecting JavaScript code.
Web Protection Library (WPL)
9/12/2020 11:28:05 AM.
In this article, you will learn about Web Protection Library (WPL).
Protect APIs With Security Headers Using Azure API Management Policies
8/24/2020 8:41:55 AM.
In this article, you will learn about how to protect APIs with Security Headers using Azure API Management Policies.
SQL Injection Protection Methods
8/18/2020 7:39:54 AM.
In this article, you will learn about SQL Injection Protection Methods.
Cryptojacking - How To Protect Yourself
6/5/2020 1:45:47 AM.
Cryptojacking is a technique that employs unauthorized use of devices for cryptocurrency mining by site owners or cybercriminals. In this article, we'll go through what cryptojacking is and how yo
Overview Of IoT Security Risks Associated With The Healthcare Industry
4/8/2020 2:51:27 AM.
In this article, you will learn about Healthcare IoT Security Risks and Protection Mechanisms.
How To Protect Files And Folders In Windows 10
3/11/2020 11:26:46 AM.
In this tutorial, I have discussed how to create a protection on file and folder in Windows 10.
How to Create Protection on Folder in Windows 8
12/16/2019 3:38:29 AM.
In this article we are going to explain how to create protection of file and folder in Windows 8.
Protect Portable Storage With BitLocker in Windows 8
12/13/2019 12:22:11 AM.
This article describes protection of Portable Storage with BitLocker To Go in Windows 8.
Disable Password Protect the Screen Saver in Windows 8
12/12/2019 11:38:55 PM.
This article describes how to disable password protection by the screen saver in Windows 8.
Turn Off System Restore in Windows 8
12/8/2019 11:16:04 PM.
This article describe about How to Turn Off System Restore in Windows 8.
Update Virus Protection and Windows Defender in Windows 8
12/5/2019 10:31:02 PM.
This article explains how to update Virus Protection and Windows Defender in Windows 8.
Use of Windows Defender to Protect Windows 8 PC From Viruses
12/5/2019 12:00:41 AM.
This article explains how to protect Windows 8 PCs against viruses.
Enable Password Protect the Screen Saver in Windows 8
12/4/2019 4:16:28 AM.
In this article I will describe how to enable password protection by the Screen Saver.
Disable Drive Accessibility in Windows 8
12/4/2019 12:50:49 AM.
In this article we will describe how to protect your local computer drive in Windows 8 from unauthorized access.
How to Turn on System Protection in Windows 8
12/1/2019 11:44:54 PM.
System Protection can really be a necessary and important feature that constantly saves information regarding your computer’s system settings and files.
How to Protect an Azure Storage Account using Shared Access Signatures
11/14/2019 6:39:26 PM.
How to protect an Azure storage account using a Shared Access Signature.
Protecting Your Data At Conferences
10/29/2019 7:17:03 AM.
In this article, learn how to protect your data at conferences.
How Exchange Hybrid Mail Flow Works | Exchange Online Protection (EOP) | Exchange Hybrid
9/24/2019 1:16:41 AM.
In this video, we are going to see how the mail flow works when you have Exchange Hybrid Environment.
Protecting Routes With Auth Guard In Angular 7
7/19/2019 10:05:43 AM.
We will learn about protecting our routes with Auth Guard in Angular 7.
Private Protected Access Modifier In C#
2/21/2019 10:16:06 PM.
Access Modifiers are special keywords used in a C# program to specify the scope of the members of the class. We will learn about the newly introduced Private Protected Access Modifiers in this article
Protect APIs With API Management
1/15/2019 11:57:41 PM.
Protect APIs With API Management. In this article, I will explain an API product that allows the developer to make a call using the limit call rate and usage quota per subscriptions policy.
Understanding Access Modifiers In C# (Video)
1/2/2019 6:46:44 AM.
In this important C# video, I have discussed, in details, what access modifiers are in C#. Also, I have explained the respective properties of all access modifiers - public, private, protected, intern
Overview Of The Azure DDoS Protection Standard
8/10/2018 9:00:17 AM.
Distributed denial of service (DDoS) is a form of attacks, and it has top availability and security concerns from the customers during their network utility. These concerns confirm from the number of
Private Protected Access Modifier In C# 7.2
3/9/2018 4:03:34 AM.
Learn about the new private protected access modifier in C# 7.2 and how it relates to all the other access modifiers.
Creating A SQL Database And SQL Server On The Azure Portal
11/20/2017 10:10:01 AM.
This article shows how to create a SQL Database and Server on the Azure Portal and also the process of configuring the threat protection to our Database.
Microsoft Azure Security And Protection Against DDoS
6/14/2017 12:56:11 PM.
Microsoft Azure Security And Protection Against DDoS.
Angular 2 Guards To Protect Routes
4/6/2017 4:17:03 PM.
In this article, I will show you the real uses of Angular 2 Guards to protect the routes.
Getting Started With Firebase And Protecting Routes From Unauthorized Users in Angular
2/16/2017 10:48:00 AM.
In this article you will learn about Firebase and protecting routes from unauthorized users.
How To Protect Your Most Valuable Professional Asset
11/29/2016 12:07:59 AM.
This article describes your most valuable professional asset.
Secure Your Customer Data With Bitlocker Or Truecrypt
11/22/2016 2:17:57 PM.
If you work on a Windows machine with customer data, you need to secure it - learn how!
What About Data Privacy
8/23/2016 6:58:55 AM.
What developers need to know about data privacy law...
Protection Level In WCF
5/16/2016 11:23:29 AM.
In this article you will learn about Protection Level in WCF.
Protect PDF Via Digital Signature Using Spire.PDF
9/9/2015 3:00:57 AM.
In this article we will learn about protecting PDF Via Digital Signature using Spire.PDF.
Make a Controller Protected in MVC
12/13/2014 6:32:46 PM.
In this article we learn that it is possible to make a controller protected.
Protection Against Buffer Overflow Attack in .NET
10/22/2014 9:47:44 AM.
This article explained how buffer overflows occur and how to prevent it.
Access Control Modifier in PHP
2/18/2013 2:09:53 PM.
In this article I will go to explain access control modifier in PHP
Displaying Search in XML and Accessing Protected Data in JIRA Tool in Testing
12/15/2012 9:35:10 AM.
In this article we discuss how to display search in XML and accessing protected data in JIRA Tool
Protecting IL Code from Unauthorized Disassembling in VB.NET
11/10/2012 2:31:09 AM.
Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This is an excellent mechanism to abstract the high level code from the underlying hardware.
Introduction to SLP Services Internals
10/13/2012 5:39:08 AM.
This article explains about SLP Services Architecture and internals of Code Protection.
Introduction to SLP Services Environment Setup
10/13/2012 5:36:27 AM.
This article explains about SLP Environment setup followed by Code Protection sample.
Encrypt and Decrypt Sensitive Metadata Within Your Config file
10/4/2012 9:54:52 AM.
In a certain cases, metadata embedded within your configuration file is sensitive. In fact, imagine that you develop an application that uses a data base as data source; all information about this data base is located in the configuration file. What if a hacker success to log into your configuration files and obtains the connection string and other metadata about your data base??
How to Protect Presentation in PowerPoint 2013
8/28/2012 3:53:02 PM.
This article describe about how to protect a presentation in PowerPoint 2013.
How to Protect Workbook in Excel 2013
8/4/2012 2:41:40 PM.
In this article we see new options provided in Excel 2013 to protect Excel workbooks.
Protecting IL Code from unauthorised Disassembling
5/19/2012 7:41:28 AM.
Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This is an excellent mechanism to abstract the high level code from the underlying hardware.
Using the DPAPI through ProtectedData Class in .Net Framework 2.0
5/13/2012 3:21:02 AM.
The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
Using Windows Data Protection
3/31/2011 4:05:01 AM.
Windows Data Protection (or WDP) is an encryption system provided by the operating system based on a key which is automatically generated from the logged-in user’s password.
Introduction to Microsoft SLP Services
3/19/2009 4:33:39 AM.
This article gives an introduction of Microsoft Software Licensing and Protecting Services.
Building ASP.NET bot protection (CAPTCHA-like)
2/29/2008 10:20:07 AM.
This article shows how to build captcha-like protection from spam and other bots in ASP.NET.
Digging Deeper - Structures in C#
12/19/2005 1:21:29 AM.
Structures in C# are similar to structures in C and C++ but with several prominent differences. In C#, structures are value types.