Why Join
Become a member
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
TECHNOLOGIES
ANSWERS
LEARN
NEWS
BLOGS
VIDEOS
INTERVIEW PREP
BOOKS
EVENTS
CAREER
MEMBERS
JOBS
About Security
In information technology the
Security
is set of restriction of information assets through the use of technology, processes and training. In Computer,
Security
is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains or even gaining access to them accidentally.
Security
is a branch of Information
Security
and is often used interchangeably with the term. It encompasses several
Security
measures such as software programs like anti-virus suites, firewalls, and user dependant measures such as activating deactivating certain software features like Java scripts, ActiveX and being vigilant in using the computer and the network resources. Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts.
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sandeep Mishra (19)
Thiago Vivas (4)
Prabhakar Maurya (4)
Manish Sharma (3)
Shivprasad (2)
Hadshana Kamalanathan (2)
Saad Aslam (2)
Anupam Maiti (2)
Deepak Kaushik (2)
Ramesh Kartik (2)
Sagar Pardeshi (1)
Anand Thakur (1)
Sean Franklin (1)
Kapil Deo Malhotra (1)
Cecil Phillip (1)
Miroslav Adamec (1)
Rion Williams (1)
Nimit Joshi (1)
Rahul Bansal (1)
Mike Gold (1)
Akhil Mittal (1)
Ashish Bhatnagar (1)
Kokul Jose (1)
Krunal Barot (1)
Prashant Bansal (1)
Vinodh Narayanan (1)
Ajith Mohan (1)
Vijai Anand Ramalingam (1)
Lokesh Varman (1)
Allen O'neill (1)
Vijay K (1)
Ankur Mishra (1)
Stephen Simon (1)
Jaymin Dangi (1)
Dhruvin Shah (1)
Sr Karthiga (1)
Noble Dhas (1)
Sivanandham D (1)
Kuppurasu Nagaraj (1)
Gokulakrishna (1)
Mahesh Chand (1)
Sonu Kumar (1)
John Bhatt (1)
Rizwan Ali (1)
Amit Tyagi (1)
Kartik Kumar (1)
Aman Singhal (1)
Deepak Middha (1)
Ashutosh Gupta (1)
Arun Choudhary (1)
Sanjoli Gupta (1)
Aadarsh Sharma (1)
Manoj Singh Panwar (1)
Edinbiro James (1)
John Charles Olamendy (1)
Nishant Mittal (1)
Satyaki Chakraborty (1)
Sibeesh Venu (1)
Manas Mohapatra (1)
Shivom Agarwal (1)
Thivagar Segar (1)
Ria Sur (1)
Sandesh Salunke (1)
Sairam (1)
Alexej Sommer (1)
Deepak Garg (1)
Chandrakant Parmar (1)
Abhinav Galodha (1)
Related resources for Security
No resource found
Code Acceptance Checklist in .NET
2/12/2021 10:11:07 AM.
This article provides a Code Acceptance Checklist for .NET.
Code Access Security - Implementing Publishers Based Security Using Digital Certificates
2/5/2021 5:30:07 AM.
This article explains how to implement publishers based security using digital certificates.
CAS (Code Access Security) & .NET 4.0 Security Model FAQ (With Full Video Demonstration)
2/3/2021 9:57:23 AM.
This article first starts with the basic concepts of CAS like evidence, permission, code groups and caspol.exe. It then moves ahead to demonstrate how CAS can be implemented in real world. This articl
AWS - API Gateway - š Only Allow Requests From Your IP
1/21/2021 2:59:56 PM.
In this short reference, I will describe how to quickly secure your API Gateway so that it will only accept requests from your IP address. This will effectively prevent any malicious attacks to your A
Authentication Modes in ASP.Net for Security
1/21/2021 11:28:29 AM.
In this article, we will investigate the different types of authentication provided by Asp.net.
What is MSAL + Microsoft.Identity.Web
1/7/2021 4:49:25 AM.
Microsoft.Identity.Web enables developers to create web apps that sign-in users and create protected Web APIs using the Microsoft identity platform.In this episode, Kyle Marsh comes on to catch wit
Authorize ASP.NET Core App By Azure AD Groups Using Graph API
1/5/2021 11:18:25 AM.
In this article, you will learn how to authorize asp.net core app by Azure ad groups using graph API.
Manage Security Alerts In Azure Security Center
12/30/2020 1:56:12 PM.
In this article, you will learn how to manage security alerts in azure security center.
Hands-Free Security Scanning Within .NET Applications
12/15/2020 8:45:48 AM.
I'm sure if you follow any news sources at all, you see countless hacks, breaches, and leaks from various big-name companies which you might assume would be better at protecting your information.
Learn About AJAX Security
12/15/2020 7:07:02 AM.
In this article, you will learn about AJAX Security.
OpenID Connect Availability in OWIN Security Components
12/8/2020 3:23:14 AM.
This article shows how to use the the brand new feature of OWIN security components used in the ASP.NET, OpenID Connect. You can use it in ASP.NET Web Applications.
Protection Against Busting Frame Busting
12/5/2020 4:45:12 PM.
In this article, you will learn about protection against Busting Frame Busting.
Protection Against Clickjacking
12/5/2020 4:19:19 PM.
In this article, you will learn about protection against Clickjacking.
Hiding the Version Information of .Net Framework Due to Security Issue
12/3/2020 1:59:25 AM.
In this article I will demonstrate how to hide version information of the .Net Framework, which is the medium level security issue named Information Disclosure.
Monitoring Remote Log Remotely using WMI in C# and .NET
12/2/2020 11:04:34 PM.
WMI (Windows Management Instrumentation) is a component of the Microsoft operating system that allows you to monitor virtually every piece of the system (either locally or remotely) as well as control
Learn About Clickjacking
12/2/2020 8:52:29 PM.
In this article, you will learn about Clickjacking.
RESTful Day #5 - Security in Web API - Basic & Token Based Custom Authorization in Web APIs Using Action Filters
12/2/2020 12:49:59 AM.
This article explains security in Web APIs including Basic Authentication and Token Based Custom Authorization in Web APIs using Action Filters.
Learn About Same Origin Policy (SOP)
11/23/2020 10:37:16 PM.
In this article, you will learn about Same Origin Policy (SOP)
Implementing EJB Security
11/12/2020 8:28:16 AM.
In this article, you will learn how to implement EJB Security.
Using Components With Known Vulnerabilities
11/6/2020 8:22:21 PM.
In this article, you will learn how to use components with known vulnerabilities.
Learn About Vulnerability Attributes
11/2/2020 9:57:33 PM.
In this article, you will learn about Vulnerability Attributes.
Common Vulnerability Scoring System - CVSS
11/2/2020 9:54:18 PM.
In this article, you will learn about Common Vulnerability Scoring System ā CVSS.
Accessing A Model In Form Recognizer Sample Labeling Tool By A Different Machine Or In Different Browser (Resuming The Project)
10/12/2020 4:22:01 PM.
In this article, you will learn how to resume the model training from a different browser/machine.
Command Injection Exercise - Starting Netcat
9/30/2020 1:51:32 PM.
In this article, you will learn about the Command Injection exercise ā Starting Netcat.
IT Security vs. Secure Coding
9/18/2020 12:55:03 PM.
In this article, you will learn about IT Security vs. Secure Coding.
Conditional Access to force the user to update the Security info for Azure MFA from Known Network
9/15/2020 9:29:40 PM.
Force the user to update security info for MFA in Azure from known location only
Session Fixation - Exercise
9/11/2020 12:20:10 PM.
In this article, we are going to look at Session Fixation in ASP.NET web applications with some code examples in VB.NET.
Cryptography In The Digital Era
9/9/2020 1:41:06 PM.
This article covers different cryptographic techniques that ensure data Confidentiality, Integrity and Availability.Information Security involves preventing or at least reducing the probability of una
Vulnerabilities From Botnets To Cybercrime
9/4/2020 7:36:14 AM.
In this article, you will learn about the vulnerabilities of botnets and cybercrime.
Transport Layer Security
9/2/2020 3:10:07 PM.
In this article, you will learn about Transport Layer Security.
Web Application Security
8/30/2020 2:11:39 PM.
In this article, you will learn about Web Application Security.
The Seven Pernicious Kingdoms
8/26/2020 8:12:48 AM.
In this article, you will learn about the Seven Pernicious Kingdoms.
How To Prepare Environment For Salesforce API Based Development
8/24/2020 8:45:10 AM.
In this article, we will discuss the detailed steps on how to set up the environment for API Development in Salesforce with all prerequisites tools & permissions.
Protect APIs With Security Headers Using Azure API Management Policies
8/24/2020 8:41:55 AM.
In this article, you will learn about how to protect APIs with Security Headers using Azure API Management Policies.
Nature Of Web-Security Analysis
8/19/2020 11:04:12 AM.
In this article, you will learn about the nature of web security analysis.
Nature Of Security Flaws
8/19/2020 10:59:13 AM.
In this article, you will learn about the nature of security flaws.
Cookie Injection
8/19/2020 7:29:58 AM.
In this article, you will learn about Cookie Injection.
Cyber Security - What Is Risk?
8/17/2020 8:18:24 AM.
In this article, you will learn about risk in Cyber Security.
Secure Web Application Using HTTP Security Headers In ASP.NET Core
8/17/2020 7:36:59 AM.
In this article, you will learn about Secure Web Application using HTTP Security Headers in ASP.NET Core.
Fetch An Access Token To Access Microsoft Graph API Using Msal.JS (Microsoft Security Authentication Library)
7/3/2020 7:44:34 AM.
In this article, I have explained how to fetch an access token using MSAL JS.
A Beginner's Guide to Cyber Security
5/3/2020 6:56:41 PM.
This article looks at the fundamentals of cybersecurity, including basic terms and terminologies of security, the importance of data, attributes of data. and the CIA triad, confidentiality, integrity,
Azure Encryption at Rest
4/26/2020 3:01:17 PM.
In this article, you will learn about Azure Encryption.
Secure Web Application via Web.config File in ASP.NET MVC
4/24/2020 3:43:54 PM.
Here, I have listed items that can be added to the web.config file which can help to secure your ASP.NET web application.
PnP Security Trimmed Control In SharePoint Framework
4/24/2020 8:07:26 AM.
In this article, you will see how to use PnP Security Trimmed Control in SharePoint Framework.
Activation Link Vulnerability
4/22/2020 8:00:01 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Azure IoT - Good Security Practices
4/21/2020 12:40:38 AM.
Businesses face security, privacy and compliance challenges which are unique to the IoT. Security for IoT solutions includes ensuring that devices are securely provisioned, that there is secure connec
Location Analysis
4/20/2020 6:49:18 PM.
This article shows how to track someone's location.
Security Policies in JavaScript
4/16/2020 6:20:12 PM.
JavaScript uses a security policy that is a set of rules allowing you to perform different actions under different circumstances.
Security In IoT
4/10/2020 12:16:11 AM.
In this article, you will learn about security in IoT.
Overview Of IoT Security Risks Associated With The Healthcare Industry
4/8/2020 2:51:27 AM.
In this article, you will learn about Healthcare IoT Security Risks and Protection Mechanisms.
Get Users Or Members From The AD Security Group In PowerApps
4/3/2020 8:05:45 AM.
In this blog, we will discuss about how we can get the users information from the specific Security Group in Power Apps.
Security Based Alarm System With Arduino Mega 2560
4/3/2020 2:46:44 AM.
In this article I will explain about Security Based Alarm System with Arduino Mega 2560
Azure Virtual Machines - Advanced
4/1/2020 4:48:45 PM.
In this article, you will learn about Azure Virtual Machines (Advanced).
Demo On SQL Injection
3/31/2020 9:13:05 AM.
This article explains about SQL Injection with Java source code and My Sql application.
Introduction to Security, Identity and Compliance in AWS
3/7/2020 7:20:42 AM.
In this article, we are going to see an introduction to security, identity, and compliance in AWS
Azure Key Vault For Securing Azure Function Apps
2/19/2020 9:19:02 AM.
In this article, we are going to learn how to secure Azure Function Apps using Azure Key Vault
A Short Note On AWS Networking
2/17/2020 9:12:30 AM.
In this article, you will learn about AWS Networking.
Top 10 Tips To Build Secure Websites
1/22/2020 10:06:41 AM.
Here are the 10 tips for Web developers and administrators on how to build and maintain secure websites.
How To Secure A Folder In Windows 10
1/18/2020 12:46:40 PM.
In this article we can learn how to lock and safe your private data and folder in Windows 10 without any software.
View Wi-Fi Password in Windows 10 Without External Application
1/17/2020 5:15:56 PM.
This article shows how to view the Wi-Fi password in Windows 10 without an external application.
Security Enhancements in Windows 10
1/17/2020 4:38:58 PM.
In this article we will learn what the new security enhancements are in Windows 10 to make it more secure.
Getting Started With VPC (Virtual Private Cloud) - Part One
1/13/2020 9:25:32 AM.
In this series of articles around VPC, we are going to learn in detail what is VPC and how can we actually set it up.
How To Use Security In Windows 10
1/13/2020 1:03:47 AM.
In this article, you will learn, how to use security in Windows 10.
Restrict Access to Drive in Windows 8
12/30/2019 11:59:36 PM.
This article explains how to restrict access to a hard drive partition in Windows 8.
Windows Defender in Windows 8 Includes MSE
12/30/2019 4:47:29 AM.
In this article we are going to explain windows defender in windows 8 includes MSE
How To Use an AppLocker App in Windows 8
12/20/2019 5:08:13 AM.
In this article I have described how to use an AppLocker App in Windows 8.
How to Completely Disable UAC in Windows 8
12/20/2019 12:47:18 AM.
In this article we are explaining how to disable the User Account Control (UAC) in Windows 8.
How to Disable Synchronization in Windows 8
12/19/2019 11:44:38 PM.
In this article we are going to explain how to disable synchronization feature for all use in windows 8.
Azure Blob Storage With Security Using .NET
12/19/2019 12:58:08 PM.
How to create Azure Blob Storage in Azure using Blob security and push and pull images into Azure Blob using .NET code.
How to Turn on Security Centre Alerts in Windows 8
12/17/2019 3:09:42 AM.
In this article I have described how to turn on the Windows Security Center alerts popup message in Windows 8.
How To Enable Network Discovery In Windows 8
12/17/2019 12:24:24 AM.
In this article I have described how to enable Network Discovery In Windows 8.
How to Create Protection on Folder in Windows 8
12/16/2019 3:38:29 AM.
In this article we are going to explain how to create protection of file and folder in Windows 8.
Turn off User Account Control Done by Admin Only in Windows 8
12/16/2019 3:18:10 AM.
In this article I have described how to turn off User Account Control for Administrators only in Windows 8.
Turn Off Windows Security Center Alerts in Windows 8
12/3/2019 11:29:52 PM.
In this article I will describe how to turn off the Windows Security Center Alerts in Windows 8.
How to Disable the Open File Security Warning in Windows 8
12/3/2019 9:58:06 PM.
In this article we will learn how to disable an open file security warning in Windows 8
Azure Security Foundation: Safety First In An Uncertain World
11/20/2019 8:59:11 AM.
In this article you will learn about Azure Security Foundation -- Safety First in an Uncertain World.
Introduction to AWS Well Architected Framework
11/11/2019 8:46:35 AM.
This articles is an introduction to an AWS well architected framework
Sandbox Security in HTML5
10/31/2019 11:36:31 PM.
In this article I have explored the basic if sandbox attributes in HTML5 to provide security to the host pages while using IFRAME.
How To Identify The Security Issues And Use Security Scanner In Google Cloud Platform
10/16/2019 9:57:49 AM.
In this article, Iām going to describe how to deploy a sample Hello world application to run Security scanner.
Basics Of WCF Security
9/26/2019 3:33:49 AM.
This article is all about the basics of the WCF Security; in other words, this is the starting point of diving into the WCF Security concepts.
Authentication Using WCF Message Security - 1
9/26/2019 3:32:40 AM.
In this article, we will see how authentication can be done using Windows Authentication over message security, custom username and password authentication over the message security and finally the Mu
WCF Application Implementing the Anonymous Client over Certificate WS-Security scenario
9/26/2019 1:28:50 AM.
This article explains the techniques, architecture and design strategies in order to address one of the most common scenarios of secure communication in Internet, the Anonymous client over Certificate
WCF Security Implementation
9/24/2019 11:46:31 PM.
In this article, you will learn WCF Security Implementation. Learn WCF securities - Message Security, Transport Security, TransportWithMessageCredential.
ASP.NET Core Token Authentication And Authorization Using JWT
9/24/2019 9:06:06 AM.
These days JSON Web Token (JWT) has become more popular in web application development, it has a standard way of transmitting data between multiple parties.
WCF FAQ Part 3 - 10 Security Related FAQ
9/16/2019 4:50:21 AM.
In this article, we will start with transport and message security understanding. We will then see simple code samples of how to implement transport and message security using WsHTTP bindings. We will
Security Alerts Configuration For Azure Active Directory (Azure AD) Roles In Privileged Identity Management (PIM)
9/11/2019 8:19:56 AM.
In this article, you will learn about security alerts configuration for Azure Active Directory (Azure AD) roles in privileged identity management (PIM).
Encrypt an Azure Virtual Machine VHD File in 5 Minutes
9/4/2019 1:09:09 AM.
In this video, I will show how you can encrypt an Azure VM (VHD) file manually.
Implementing Username Password Security in WCF Service
9/3/2019 1:54:02 AM.
This article explains username and password authentication with mixed security mode in WCF Service.
SQL Database Mail Profile Name is Not Valid in SQL Server 2012
6/10/2019 5:05:14 AM.
This article explains how to send emails using the msdb.dbo.sp_send_dbmail Stored Procedure as a non-sysadmin user in SQL Server 2012.
Implement Brandings And Security To Your Office 365
5/31/2019 9:00:00 AM.
This article may help you to customize your Office 365 with your existing company theme and implement a secure login to users.
SPSecurity.RunWithElevatedPriviledges Vs SpUserToken Vs AllowUnsafeUpdates In SharePoint
5/29/2019 11:41:24 PM.
In this article, you will learn about the concept of SPSecurity.RunWithElevatedPriviledges vs SpUserToken vs AllowUnsafeUpdates In SharePoint.
WCF Message Security Using Certificates
5/23/2019 10:02:59 AM.
In this article, you will learn about WCF Message Security using certificates.
Outlook Integration in C#
5/9/2019 3:47:32 AM.
This article describes how we can manipulate outlook from Visual Studio 2005.
ASP.NET Core Security Headers
4/17/2019 8:22:38 AM.
In this article, you will learn about ASP.NET Core security headers.
Azure Security Strategies You Ought To Know
4/1/2019 11:00:14 AM.
In this video, learn Azure cloud security and how it is much better.
Demystifying SAS Tokens - Basics
3/29/2019 4:48:27 PM.
In this article, I will be covering the basics of SAS tokens - why they are required and how to delegate access to resources within the storage account to external clients.
Writing Secure Code Using C#
3/13/2019 11:56:41 AM.
Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how to
All You Wanted To Know About CORS
3/5/2019 11:07:17 AM.
This article will provide a simplistic explanation of CORS using a real-world analogy. We will go into the details of what you need to understand & troubleshoot CORS Issues.
Demystifying The Resultant Objects From Service Fabric Cluster Creation - Part Two
2/9/2019 10:01:55 AM.
In this article, I will be going through the details of all the objects that result from the "Create Service Fabric Cluster" template, the default template used by Visual Studio Publish wiza
Demystifying The Resultant Objects From Service Fabric Cluster Creation
1/24/2019 9:26:23 AM.
In this article, I will be going through all the objects that result from the Create Service Fabric Cluster template.