TECHNOLOGIES
ANSWERS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Security
In information technology the
Security
is set of restriction of information assets through the use of technology, processes and training. In Computer,
Security
is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains or even gaining access to them accidentally.
Security
is a branch of Information
Security
and is often used interchangeably with the term. It encompasses several
Security
measures such as software programs like anti-virus suites, firewalls, and user dependant measures such as activating deactivating certain software features like Java scripts, ActiveX and being vigilant in using the computer and the network resources. Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts.
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Ziggy Rafiq (6)
Cr Bhargavi (4)
Subham Ray (4)
Shubhankar Banerjee (3)
Sardar Mudassar Ali Khan (3)
Abhishek Tiwari (3)
Abdul Basith (3)
C# Corner Live (3)
Mahesh Chand (3)
Rajat Jaiswal (3)
Sharad Gupta (3)
Saravanan Ganesan (2)
Prashant Bansal (2)
George (2)
Sarthak Varshney (2)
Waqas Ahmed (2)
Mohamed Azarudeen Z (2)
Tuhin Paul (2)
Mohamed Shifan Salideen (2)
Wilson Mok (2)
Vinodh Kumar (2)
Mihai Popescu (1)
Nandan Hegde (1)
Mohomed Shihan (1)
Pietros Ghebremicael (1)
Swesh S (1)
Shaishav Desai (1)
Raja Msr (1)
Madhuri Hammad (1)
Ravikant Sahu (1)
Lokesh Varman (1)
Rathrola Prem Kumar (1)
Monica Rathbun (1)
Abhishek Shukla (1)
Nakul Chaudhari (1)
John Morehouse (1)
Shantanu (1)
Sriram Kumar Mannava (1)
Bhushan Gawale (1)
Ravi Raghav (1)
Pradeep Chandraker (1)
C# Curator (1)
Mukesh Nailwal (1)
Chris Love (1)
Praveen (1)
Mansi Rana (1)
George Papadopoulos (1)
Hadshana Kamalanathan (1)
Amit Mohanty (1)
Ishoo Anyal (1)
Shanuka Maheshwaran (1)
Sanjay Kumar Pathak (1)
Allen O'neill (1)
Nitin Bhardwaj (1)
John Charles Olamendy (1)
Naimish Makwana (1)
Ramprakash Duraisamy (1)
Aravind Govindaraj (1)
Jaydeep Patil (1)
Rajkumar Jain (1)
Raj Kumar (1)
Koshila Senadhira (1)
Sagar Lad (1)
Related resources for Security
No resource found
SHA-1 Bit Implementation In C#
9/25/2023 6:30:24 AM.
This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
Grant Admin Access on a Schema in Azure SQL Database
9/22/2023 11:23:28 AM.
Grant Admin Access on a Schema in Azure SQL Database. This guide explains how to grant admin access to an Azure AD group for a specific schema within the Azure SQL Database, including necessary SQL st
How to Transfer Tokens using Safe{Wallet}?
9/22/2023 4:03:42 AM.
Explore Safe{Wallet}'s multi-signature security for seamless token transfers. Learn the step-by-step process to manage digital assets securely and efficiently.
Simplified Access Control with Azure Temporary Access Passes
9/21/2023 4:59:59 AM.
In today's dynamic business landscape, Azure offers a solution to facilitate short-term resource access—Temporary Access Pass (TAP). This article explores TAP, guiding you through its activation a
Why is Smart Contract Auditing Important for Blockchain Security?
9/20/2023 4:52:47 AM.
Smart contract auditing enhances security, prevents losses, and builds trust in blockchain transactions.
Security ASP.net Core MVC (C#) Encryption and Decryption
9/20/2023 4:14:05 AM.
On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offe
Message-level Declarative Security Using WSE 3.0
9/14/2023 10:34:05 AM.
Web Services Enhancement version 3.0 (WSE 3.0) is a SOAP extension managed API (Microsoft.Web.Services3.dll) compatible with the .Net Framework 2.0. This article explores WSE 3.0 in terms of implement
Serverless Computing with Azure Functions with ASP.Net Core Web API
9/5/2023 5:25:01 AM.
ASP.NET Core Web API, along with a real-world use case, can be a powerful way to demonstrate the capabilities of serverless computing in Azure. In this example, we'll create a serverless Azure Fun
What are the Copilots Offered by Microsoft for Productivity?
9/4/2023 6:29:08 AM.
This article will focus on the various copilots offered by Microsoft combined with existing range of products like Microsoft 365 suites, Web browsers, OS, Apps, File Explorers, Power Platform, Analyti
Protecting Data Integrity and Privacy in Testing
9/1/2023 9:30:31 AM.
Data Integrity and Privacy in Testing: Essential for Reliability and Compliance. Explore the significance, best practices, and a real-time example of safeguarding sensitive data during testing.
Elevating Cloud Security with Azure Key Vault
9/1/2023 7:20:40 AM.
In a digital age where data security is crucial, Azure Key Vault by Microsoft Azure stands as a powerful solution. It centralizes and secures cryptographic keys, secrets, and certificates in the cloud
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
9/1/2023 4:42:17 AM.
This article will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to preven
C# Security: Best Practices for Secure Coding
8/31/2023 5:05:34 PM.
In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
Azure Firewall Cloud-Native, Intelligent, and Scalable Network Security
8/31/2023 5:32:18 AM.
Discover the power of Azure Firewall in safeguarding cloud environments against modern threats. This cloud-native security service provides granular control over inbound and outbound traffic, leveragi
Empower Resource Security with Azure RBAC
8/30/2023 8:54:42 AM.
The title provided is concise and should be easily searchable on Google. However, the final search ranking depends on various factors, including the specific keywords used, competition, and other SEO
Top 13 JavaScript Secure Coding Best Practices
8/29/2023 8:38:35 AM.
Learn how to write secure and robust JavaScript code with these best practices. Avoid common pitfalls and prevent vulnerabilities in your web applications.
Securing Azure Functions
8/28/2023 4:18:44 AM.
Enhance Azure Functions Security: Practical Measures for Robust Protection. Discover authentication, sensitive data safeguarding, network defense, code fortification, and more. Strengthen your functio
How to Verify Your Smart Contract on PolygonScan?
8/27/2023 2:11:36 AM.
Discover Polygon's world of smart contracts. Verify and publish with PolygonScan for transparent, secure DApps. Boost trust, and open doors to transparency.
Future Scope of Cyber Security Engineer in India
8/26/2023 7:35:06 AM.
In this article, you will learn more about what the future holds for cyber security engineers in India.
Lock Screen in Jetpack Compose
8/25/2023 6:03:22 AM.
This article will describe how we can create a lock screen in Android with Jetpack Compose.
Activation Link Vulnerability
8/24/2023 9:15:31 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Enhancing Security and Access Management with Microsoft Entra
8/24/2023 7:02:57 AM.
Unveiling Microsoft Entra: Elevating Secure Identity and Access Management" is a resource that likely introduces and explores Microsoft Entra, a solution focused on enhancing identity and access
Exploring AWS EC2 Instances: Features, Deployment, and Hands-On Insights
8/23/2023 10:04:19 AM.
Explore AWS Article Collection: Unveil AWS EC2 Instances and More. Discover the versatility of virtual servers, from lifecycle management to load balancing. Embrace the cloud revolution and embark on
Strategic Alert and Security Configuration
8/21/2023 5:47:49 AM.
Today I ran into something on a client-server that unfortunately I see too often. The DBA goes through the trouble of configuring and setting up alerts/operators but doesn’t really understand what th
Control access to private data using Azure storage shared access signatures
8/17/2023 12:19:38 PM.
Learn how an architecture shift using a middleware service and short-duration Azure Storage Shared Access Signatures (SAS) improves data protection and access control. Understand the significance of A
How to Create Records for Salesforce SObjects using SOAP API?
8/14/2023 10:09:42 AM.
In this article, we explore how we can create new records for Salesforce Standard & Custom SObjects using SOAP API Endpoints available for the Salesforce Platform.
Understanding SSH Authentication
8/10/2023 4:57:38 AM.
Unveil the significance of SSH (Secure Shell) in securing network communication. Explore SSH authentication's core concepts, methods, and integration into .NET Core applications for fortified remo
Extended Security Updates No More Freebies
8/9/2023 10:57:19 AM.
As data professionals, we should always strive to keep our systems updated and patched to ensure proper security of our environments. Microsoft has moved away from releasing service packs to releasing
How to Find UDID for Apple Devices?
8/8/2023 11:18:41 AM.
Discover the importance of the Unique Device Identifier (UDID) for Apple devices in this comprehensive guide. Explore its role in app development, beta testing, enterprise device management, technical
Fix: GitHub Access Error - Failed to Connect to github.com port 443, Time Out
8/7/2023 8:04:40 AM.
This article discusses a bug in access to GitHub.
AspNetCore.Security.Jwt - JWT Bearer Token Security Package
8/4/2023 12:06:17 PM.
I have built a package which integrates JWT Bearer Token Security into an Asp Net Core 2.0+ application.
Capturing Phishing Email Using Custom Middleware in ASP.Net Core Web API
8/2/2023 9:08:59 AM.
To capture and detect phishing emails using custom middleware in an ASP.NET Core Web API, you can follow these general steps:Create Custom Middleware: Create a custom middleware that will intercept
Azure IoT Security : Safeguarding the Internet of Things
8/2/2023 7:12:25 AM.
Explore Microsoft's Azure IoT Secure, a robust platform fortifying IoT against cyber threats. With secure communication, edge security, and threat detection, organizations confidently embrace IoT
Token based Authentication and Authorization Grants Explained
8/2/2023 5:37:02 AM.
In this article, let us learn about what is a token based authentication and the different authorization grants used in modern day applications
Getting Started with Azure Key Vault
7/28/2023 6:27:47 AM.
Azure key vault provides a store where you can manage all your keys and secrets effectively. In this article you will learn about Azure Key Vault.
How To Prepare Environment For Salesforce API Based Development
7/21/2023 8:41:16 AM.
In this article, we will discuss the detailed steps on how to set up the environment for API Development in Salesforce with all prerequisites tools & permissions.
Role of AI in Cybersecurity: Safeguarding the Future
7/20/2023 1:18:07 PM.
As technology advances at an unprecedented pace, so does the sophistication of cyber threats. In this digital age, where data breaches and cyberattacks are prevalent, the role of Artificial Intelligen
Ensuring Secure Coding in C#: Maintaining Security
7/20/2023 9:38:52 AM.
This guide provides essential best practices to ensure secure coding in C# applications, addressing potential vulnerabilities and security threats. By implementing these practices, developers can fort
Exploring VMware SaltStack's Configuration Management Capabilities
7/18/2023 9:10:12 AM.
This article delves into the powerful configuration management capabilities of VMware SaltStack, including declarative syntax, enforcing desired system states, and reducing configuration drift.
Azure Functions Security Best Practices
7/13/2023 12:58:40 PM.
Azure Functions Security Best Practices Ensuring a Secure Serverless Environment
How to Maintain Application Security and Prevent Vulnerabilities in C#?
7/12/2023 6:33:15 AM.
This article provides essential best practices for ensuring secure coding in C#. By implementing these practices, developers can maintain the security of their applications and mitigate vulnerabilitie
OKTA Authentication in .NET Core API
7/6/2023 9:01:24 AM.
OKTA Authentication in .NET core API
Disabling the "Remember Me" Option from Azure Account
6/10/2023 5:52:16 AM.
In today's digital landscape, user privacy and data security are paramount concerns. Online platforms and services often provide a "Remember Me" or "Keep me signed in" option,
Architecting Secure-First Software for Developers
6/5/2023 5:54:07 PM.
In this session, software developers will learn what and how to architect software apps that are secure and hack-proof.
Custom WSE 3.0 Policy Assertion - Modifying the Security Header Generated by WSE
5/31/2023 6:41:12 AM.
Recently I encoutered an issue in the WSE security header of an ASP.Net application consuming a Java web service using WSE 3.0 involving the automatic addition of a timestamp in the security header wh
Policy-Based Authorization in .NET Core API: User, Groups, and Permissions
5/30/2023 5:33:17 AM.
To create users, groups, and manage permissions using policy-based authorization in a .NET Core API
Efficient CRUD Operations with ElasticSearch and .NET Core API
5/29/2023 1:50:40 PM.
ElasticSearch is a powerful and highly scalable open-source search and analytics engine built on top of Apache Lucene.
Custom JWT Handler In ASP.Net Core 7 Web API
5/26/2023 10:50:50 AM.
In ASP.NET Core Web API, you can create a custom JWT (JSON Web Token) handler to handle token authentication and authorization. The custom handler lets you define your logic for validating and process
Inserting records in a database using stored procedure and ADO.NET technology
5/24/2023 6:37:22 AM.
In this article I will explain you how to use CommandType stored procedure to insert records in a database in a disconnected manner.
Enhancing Security with Microsoft 365 Secure Score
5/18/2023 8:17:29 AM.
By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
How to Add Security Headers to Your Website Using .htaccess
5/18/2023 5:25:17 AM.
Want to know how to add security headers to your website using .htaccess? Read this blog and add content security policy header in wordpress site.
Adapting to AWS's New Default Security Settings: Ensuring Public Website Access Using S3 Websites
5/16/2023 4:14:11 AM.
Solve the impact of recent AWS policy changes, understand the challenges of restricted access, and explore the solution to overcome Access Denied errors. Learn how to adapt your access control strateg
Top 10 Reasons to Migrate to the Cloud
5/12/2023 2:36:01 PM.
The benefits of moving your business operations and IT infrastructure to a cloud-based platform. The article highlights ten key reasons why organizations should consider migrating to the cloud, such a
iOS App Security: Best Practices for Protecting User Data
5/12/2023 6:39:13 AM.
This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jail
Why You Should Use Vooki DAST For Dynamic Application Security Testing
5/8/2023 6:11:09 AM.
Scanning and auditing your web applications is now made easier with the advent of Vooki. A Free version of Vooki is also available that gives you a perfect scan report about the scanned applications.
Unpacking Azure's Storage Account Options: Which One is Right for You?⚡
5/5/2023 7:11:55 AM.
This article is a comprehensive guide to the different types of storage accounts available in Azure. It covers everything from general-purpose v2 storage accounts to specialized blob, file, queue, tab
Azure or AWS? Making the Right Choice for Your Cloud Infrastructure💥
5/5/2023 7:10:43 AM.
This article could compare and contrast Azure and AWS, two of the most popular cloud platforms on the market. It could cover their similarities and differences, and provide insights into which platfor
5 HTTP Security Headers You Should Know For SEO
5/2/2023 3:11:22 PM.
Being an SEO beginner, it's easy to overlook the security headers in the regular audits. However, security headers should be your top priority when it comes to optimizing your website. In this art
Create JSON Web Tokens For Development And Testing
4/28/2023 6:44:12 AM.
Developing and testing an API that requires authentication through a JSON Web Token can be challenging. Use the dotnet-devjwt tool to generate custom tokens for testing your endpoints locally
Azure Storage Security Focuses On Five Key Areas
4/28/2023 5:46:25 AM.
In this article, we will learn Azure storage security focuses on five key areas. In our next article, we will learn about Azure File Storage Service.
SQL Server Security Best Practices
4/25/2023 12:01:38 PM.
SQL Server Security Best Practices
Secure Resources Using Azure Managed Identities
4/19/2023 6:42:27 AM.
In this article, we will learn how to secure resources on azure platform without using any type of security key of connection string.
Bitcoin on the Mac- The Advantages of Embedded Cryptocurrency
4/15/2023 5:10:02 PM.
This article discusses the advantages of using Bitcoin on a Mac. It covers the basics of Bitcoin, the different wallets available for macOS users, and the security and convenience of using a Bitcoin w
Azure User Group Sweden: Ten Things You Need to Do to Build Rock Solid Azure Tenant
4/11/2023 6:15:30 AM.
In this session, you will learn how Every Azure service has built-in security features, and we have services dedicated solely to security.
How To Implement Azure DDoS Protection Plan For Virtual Networks
4/10/2023 5:22:55 AM.
In this article, you will learn how to implement Azure DDoS Protection Plan for Virtual Networks.
Anonymization Techniques for Data Protection and Privacy
3/20/2023 10:30:57 AM.
An anonymizer is a tool or service that is used to anonymize data by removing or obfuscating identifying information from a dataset, while still allowing the data to be analyzed or used for research p
Understanding Proxy Servers and Anonymizers: Benefits and Risks
3/20/2023 10:19:28 AM.
In today's digital world, anonymity and privacy have become crucial considerations for many individuals and organizations. Proxy servers and anonymizers are two technologies that can help provide
Power Apps - Security Trimmed Controls Based On SharePoint Groups
3/20/2023 7:20:15 AM.
In this article we will see how to show/ hide some controls in a Power Apps screen based on logged in user’s role. We have SharePoint online as data source and managing all the security roles using Sh
Azure Key Vault - From Hardware To The Cloud!
3/18/2023 2:27:51 PM.
How to get from security hardware to the cloud with Azure Keyvault.
What is XDR?
3/17/2023 10:22:17 AM.
Learn about XDR [Extended Detection and Response] and its benefits.
SQL Security Tips - Dynamic Data Masking To Secure Data Access
3/9/2023 5:22:36 AM.
There are various aspects of security, and Dynamic Data Masking is one of the important concepts to know. We will describe here what is Dynamic masking and how to implement it with step-by-step exampl
SQL Tips - A Simple Way To Check Vulnerability Status Of Your SQL Server Database
3/7/2023 4:18:29 AM.
In this article, you will learn about the simple way to check SQL Vulnerability to avoid any issue.
SQL Security Tips - Implement Row Level Security Quickly
3/6/2023 9:56:11 AM.
RLS (row-level security) is one of the important concepts we need to understand to secure data access at a different role.
SQL Security Functions: Part 4
3/3/2023 12:05:58 PM.
In this article I describe the Transact-SQL security functions SUSER_ID , SUSER_NAME , SUSER_SID , SUSER_SNAME and SYSTEM_USER.
SQL Security Functions: Part 3
3/3/2023 11:41:12 AM.
In this article I describe the Transact-SQL security functions SUSER_ID, SUSER_NAME, SESSION_USER and SESSIONPROPERTY.
SQL Security Functions: Part 2
3/3/2023 11:09:53 AM.
In this article, I describe the Transact-SQL security functions IS_MEMBER , IS_SRVROLEMEMBER , LOGINPROPERTY, ORGINAL_LOGIN, and PERMISSION.
SQL Security Functions: Part 1
3/3/2023 7:15:56 AM.
In this article, I describe the Transact-SQL security functions CURRENT_USER, HAS_DBACCESS, HAS_PERMS_BY_NAME, and HASHBYTES.
Cyber Security - A Big Opportunity For Developers
2/17/2023 2:41:44 PM.
In this article, I will cover another growing tech trend, cyber security, that has a growing need of experts, and presents a big opportunity for developers and IT professionals, who are looking to sec
Security in Database Systems
2/14/2023 7:17:15 AM.
In this article, I will cover the principles concerning security and its realization in Oracle database and Microsoft SQL Server.
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
How To Create Model Driven Apps With Security Role Restriction
2/8/2023 10:50:52 AM.
How to Create Model Driven Apps With Security Role Restriction.
What are Web3 Features?
2/7/2023 11:19:59 AM.
In this article, we'll discuss What is Web3 and its Features?
How To Deploy And Configure Exploit Protection In Windows Server 2022
2/6/2023 11:31:59 AM.
How to deploy exploit protection to your environment, exploit protection helps protect devices from malware that use exploits to spread and infect. You can enable exploit protection on an individual
AWS - Identity Access Management
2/6/2023 10:34:34 AM.
A guidewire for AWS IAM.
Azure Key Vault Configuration And Implementation Using .NET Core 7 Web API
2/6/2023 9:48:36 AM.
In this article, you will lean about Azure Key Vault Configuration and Implementation using .NET Core 7 Web API.
What Is SIEM
2/2/2023 10:47:59 AM.
Learn about what is SIEM [ Security information and event management ] and its roles.
Activate Enterprise Mobility + Security E5 Licenses Using Azure AD For Free
2/1/2023 10:41:22 AM.
Microsoft Enterprise Mobility + Security (EMS) is intelligent mobility management and security platform. What this means is that EMS helps protect and secure your organization with its products t
DevSecOps Overview
1/30/2023 3:49:01 AM.
In this article, you will learn the basic information about DevSecOps & it's benefits.
Need of Web 3.0 Security by Preetam Rao
1/27/2023 1:56:06 PM.
In this session, you will learn security in WEB 3.0.
How To Enable SSL In Visual Studio
12/27/2022 2:24:50 AM.
In this article, you will learn how to enable SSL in Visual Studio.
How To Setup Virtual Network Integration On Azure Data Lake Storage
12/14/2022 3:33:03 AM.
In this article, you will learn how to setup Virtual network integration on Azure Data lake storage to improve security.
How To Setup Azure Data Factory With Managed Virtual Network
12/14/2022 3:32:41 AM.
In this article, you will learn how to setup Azure Data Factory with Managed Virtual Network to improve security.
10 Must Tips to Build Secure Websites for Software Developers
12/2/2022 11:35:01 AM.
Here are the 10 tips for Web developers and administrators on how to build and maintain secure websites.
How To Configure Network Security For Azure App Service Plan
11/30/2022 5:32:37 AM.
In this article, you will learn how to configure network security for azure app service plan.
Azure Synapse Security: Static Data Masking
9/5/2022 10:51:05 AM.
This is the basic practical implementation of static data masking feature in the azure synapse. This feature is common for all the Microsoft data products such as SQL Server, Azure SQL, Azure SQL mana
What Is DMARC ? | Why DMARC Is Important ? | Understanding DMARC Records
8/16/2022 4:29:28 PM.
In this article we will learn about DMARC, why it is important for email, and also how to get the best understanding of DMARC records.
Azure Synapse Analytics Security - Dynamic Data Masking
8/9/2022 10:10:12 PM.
In this article, you will learn about Azure Synapse Analytics Security - Dynamic Data Masking.
How To Create A Transport Rule To Avoid Spoofing Email
7/31/2022 11:38:42 PM.
In this article, you will learn how to create a transport rule to avoid spoofing email.
Top 10 Web Application Security Risks
4/20/2022 4:14:01 AM.
This is a web app security discussion.
Best Practises For Kubernetes Container Security
4/11/2022 9:15:01 AM.
In this article, you will learn about best practises for Kubernetes Container Security.