TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About URI
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sarthak Varshney (6)
Monica Rathbun (5)
Mariusz Postol (5)
Kuppu Swami (4)
Abiola David (4)
Prabhakar Maurya (3)
Onkar Sharma (3)
Ajay Kumar (3)
Mushtaq M A (2)
Mahender Pal (2)
Prasad (2)
Gourav Jain (2)
Nitesh Jha (2)
Arun Choudhary (2)
C# Corner Live (2)
Ashutosh Singh (2)
Jithu Thomas (2)
Shiv Sharma (2)
Dijid Maddumakumara (2)
Hadshana Kamalanathan (2)
Keyur (2)
Abdul Raheem (2)
C# Curator (2)
Ishika Tiwari (1)
Ziggy Rafiq (1)
Bharat Chaudhary (1)
Praveen Sreeram (1)
Anubhav Chaudhary (1)
Satyaprakash Samantaray (1)
Ravi Raghav (1)
Humza Tufail (1)
Rohatash Kumar (1)
Raj Kumar (1)
Priyanka Jain (1)
Amit Mohanty (1)
Sreejith Gopinathan (1)
Ahsan Murshed (1)
Nilesh Jadav (1)
Aman Singhal (1)
Varun Setia (1)
Najath Risni (1)
Mohamed Shifan Salideen (1)
Md Sarfaraj (1)
Kjetil Roe (1)
Saksham Gupta (1)
Alpesh Maniya (1)
Tuhin Paul (1)
Sardar Mudassar Ali Khan (1)
Kisorjan Jakathiswaran (1)
Vithal Wadje (1)
Shubhankar Banerjee (1)
Subham Ray (1)
Gowtham K (1)
Shanuka Maheshwaran (1)
Syed Shanu (1)
Adam Stirtan (1)
Jefferson S. Motta (1)
Lokesh Varman (1)
Nandan Hegde (1)
Koshila Senadhira (1)
Related resources for URI
No resource found
Backup Encryption In SQL Server
3/28/2024 6:36:20 AM.
SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
SQL Server Vulnerability Assessment
3/28/2024 6:33:00 AM.
SQL Server Vulnerability Assessment (VA) in SQL Server Management Studio 17.4 or later lets SQL Server scan your databases for potential security vulnerabilities and can be run against SQL Server 2012
Static Data Masking (SSMS 18.0 Preview)
3/28/2024 6:31:38 AM.
Static Data Masking in SSMS 18.0 Preview enhances data security by obscuring sensitive information in databases. It safeguards privacy during testing by replacing real data with masked values, ensurin
How To Get Started With Always Encrypted For Beginners - Part One
3/28/2024 6:27:34 AM.
Encryption has always been intriguing to me but seemed like it could be a very complex process to set up. However, SQL Server made it very simple when they introduced Always Encrypted (AE) into SQL Se
How To Get Started With Always Encrypted For Beginners - Part Three
3/28/2024 6:26:32 AM.
Discover advanced techniques in data security with Always Encrypted in Microsoft SQL Server. Part Three of our beginner's guide delves deeper into encryption keys, transparent data encryption, and
Information Computation Mastery: Challenges, Concepts, Implementation
3/28/2024 4:53:53 AM.
To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
PiP - External Streaming Data - Useful Concepts - Part 1
3/27/2024 7:21:34 AM.
To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
Best Practices for Designing APIs in .NET
3/26/2024 11:55:39 AM.
This article provides a thorough overview of the fundamental principles, criteria, and concerns for creating APIs in.NET.
.NET MAUI - Root/Jail Broken Detection
3/26/2024 9:37:20 AM.
Learn how to secure your .NET MAUI app by detecting rooted/jailbroken devices, preventing security breaches. Follow steps to set up the project, install plugins, and implement detection in your app.
Ensuring Secure Coding in C#: Maintaining Security
3/22/2024 10:11:52 AM.
The article on secure coding in C# applications, written by Ziggy Rafiq, is a must-read for developers who want to fortify their applications against potential vulnerabilities and security threats. By
How to Learn About Amazon S3
3/22/2024 4:18:11 AM.
Amazon S3, an AWS service, provides secure, scalable object storage with high durability and availability. Key features include lifecycle policies, versioning, and security measures. Practical applica
Capturing Survey Response For Grid Questions - Voice Of The Customer
3/21/2024 9:42:08 AM.
Learn to capture training feedback survey responses in Dynamics 365 using Voice of the Customer. Create a workflow to send emails based on dissatisfied responses. Navigate through workflow creation, c
Configuring Git in Azure Data Studio for SQL & Synapse Pools
3/21/2024 8:30:14 AM.
In this article, we'll delve into the process of configuring Git to manage database objects within a Synapse Dedicated Pool environment (or Azure SQL Database) using Azure Data Studio.
How to Configure Permission For the Website on IIS
3/19/2024 11:55:53 AM.
In this article, you will learn the essential steps to configure website permissions on IIS, ensuring secure access control. Explore settings in IIS Manager to manage authentication methods, authoriza
Access Entity Based On N:N Relationship For Dynamics 365 Portal
3/15/2024 11:08:51 AM.
Securely access entities based on N: N relationships in Dynamics 365 Portals by configuring appropriate security roles and permissions. Customize relationship behavior to ensure efficient data managem
Steps For Configuring Git 📥📤 With Details
3/14/2024 10:48:11 AM.
Configuring Git involves setting preferences like user information, default text editor, and merging tool. Create or clone repositories, add remotes, commit changes, and push or pull code. Utilize bra
Provide Security Role Access for D365 Outlook
3/14/2024 7:00:05 AM.
In this article, we will customize permissions, manage user access, and enforce Role-Based Access Control (RBAC). Optimize Microsoft 365 settings to tailor access rights, enhancing data protection and
OKTA Authentication in .NET Core API
3/13/2024 3:20:25 AM.
Authentication in .NET Core API is crucial for securing endpoints, preventing unauthorized access, and ensuring data protection. This tutorial guides you through implementing Okta OAuth-based authoriz
Azure Monitoring Services Guide: Implementation and Examples
3/10/2024 7:27:11 AM.
This article is a comprehensive guide to Azure monitoring services, with implementation steps and examples. Real-world examples illustrate effective monitoring of Azure resources for optimal performan
Securing Your Cloud Infrastructure with Azure DDoS Protection: Strategies and Examples
3/8/2024 1:28:49 PM.
This article would talk about securing your cloud infrastructure with Azure DDOS protection with strategies, steps, and examples
Remote Access Of The Database Using SQL Server
3/7/2024 8:36:49 AM.
Remote access to SQL Server databases enables users to connect to and manage databases from a location outside the physical server. It involves configuring network settings, security measures like aut
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
How To Secure PII Data In SQL Server Using CLE (Column Level Encryption)
3/6/2024 10:45:53 AM.
PII (personally identifiable information) which is used to identify individual identity such as SSN, DOB, Bank Account Number etc. When you are working with financial application you face the scenario
Importing Access Database into SQL Server 2012
3/5/2024 10:40:07 AM.
Destructuring simplifies value extraction from objects/arrays. React's event handling enables dynamic responses to user interactions, crucial for interactive UIs. Components manage state/props, fa
How to Enable Remote Connections in SQL Server 2005
3/5/2024 10:39:30 AM.
This article provides guidance on enabling remote connections in SQL Server 2005, addressing the common error message encountered when attempting a remote connection. It outlines the security precauti
Destructuring And Event Handler In React
3/5/2024 8:59:40 AM.
Destructuring in React allows efficient extraction of values from objects or arrays. Event handlers manage user interactions, like clicks or input changes. They're essential for interactive UIs in
Securing Remote Access to SQL Server
3/5/2024 4:16:02 AM.
Securing remote access to SQL Server is paramount for data protection and compliance. Explore methods like VPNs, firewalls, encryption, and multi-factor authentication for enhanced security and protec
Capturing and Modifying Sharepoint Alerts Through Alert Handlers
3/4/2024 11:50:51 AM.
Explore how to enhance SharePoint functionality by capturing and modifying alerts through alert handlers. Learn to customize alerts to meet specific needs, improving user experience and system efficie
How to Get the MAC Address of System Using ASP.NET/C#
3/1/2024 10:35:18 AM.
In this article, we will learn how to retrieve the MAC address of a system using Asp.net/C#. Explore methods to access network interface information, retrieve hardware identifiers, and ensure system s
What are Virtual Switches and Standard Switches?
3/1/2024 10:32:11 AM.
In this article, we will explore the distinction between Virtual Switches and Standard Switches in networking for virtualized environments. Dive into their roles in managing network traffic, configuri
How To Reverse Engineer Using OllyDbg
3/1/2024 9:19:32 AM.
This article provides an introduction to obfuscation and reverse engineering, focusing on using OllyDbg as a reverse engineering tool. It explains the concept of obfuscation as a means to secure sourc
Rename or Delete User Account in Windows 8
2/27/2024 11:17:07 AM.
To rename or delete a user account in Windows 8, navigate to Control Panel, then User Accounts. From there, you can select the account you wish to modify and choose the option to rename or delete it.
Turn Off Pop-up Blocker in Internet Explorer Using Windows 8
2/27/2024 11:06:08 AM.
To disable the pop-up blocker in Internet Explorer on Windows 8, open the browser, go to "Tools" or click the gear icon, select "Internet options", navigate to the "Privacy&qu
Windows Defender in Windows 8 Includes MSE
2/27/2024 10:38:20 AM.
This article explains how Windows Defender in Windows 8 integrates Microsoft Security Essentials (MSE) to provide comprehensive virus protection.
Block a Program's Internet Access in Windows 8
2/26/2024 9:30:35 AM.
This article provides a guide on how to block a program's internet access using the Windows Firewall in Windows 8 for security purposes.
Logout From Microsoft Account in Windows 8
2/26/2024 9:29:43 AM.
This article provides instructions on how to disconnect or remove a Microsoft account from a Windows 8 PC to stop all Microsoft online services for security reasons.
Add Windows Defender to Context Menu in Windows 8
2/26/2024 9:24:25 AM.
Integrate Windows Defender into the context menu of Windows 8 for quick access to security features. Modify registry settings or use third-party tools to add Defender options to the right-click menu.
How To Check If Your System Is Ready For Windows 11
2/22/2024 11:32:18 AM.
This content provides an introduction to Windows 11, highlighting its key features, minimum system requirements, compatibility testing process, availability details, and useful links for further infor
How to Enable or Disable File and Printer Sharing in Windows 10
2/22/2024 11:29:50 AM.
To enable or disable file and printer sharing in Windows 10, navigate to "Settings" > "Network & Internet" > "Network and Sharing Center." From there, select &q
How To Enable Screen Saver In Windows 10
2/22/2024 6:36:58 AM.
To enable the screen saver in Windows 10, access "Settings," navigate to "Personalization," then "Lock screen," and select "Screen saver settings." Choose a scr
How To Find Your Wi-Fi Password In Windows 10
2/22/2024 6:33:54 AM.
In this tutorial, I have described how to Easily retrieve your Wi-Fi password in Windows 10 through network settings. Access the Network and Sharing Center or use Command Prompt to view network proper
How to Remove Your Gmail Account from Unwanted Website
2/21/2024 5:54:57 AM.
Once you've removed a website's access to your Email account, they will no longer be able to access your email.
Installing and Configuring XAMPP on Windows 11
2/20/2024 6:51:27 AM.
This article provides a comprehensive guide on installing XAMPP, the popular PHP development environment, on Windows 10/11. XAMPP includes Apache, MySQL, PHP, and Perl, making it a convenient solution
Cloud Security: Secure Access from your Applications to Azure SQL
2/19/2024 4:47:28 AM.
In this session, you will discover the differences between authentication on-premises and in the cloud and learn how to go way beyond the basic user/password for authentication.
Exploring the Anticipated Features of Android 15
2/18/2024 6:01:05 AM.
Get ready for a mobile revolution! Android 15 is on the horizon, promising enhanced privacy, personalized experiences, boosted performance, and exciting features for creators and professionals. This a
.Net MAUI - Capturing Screenshots
2/18/2024 4:57:53 AM.
This article guides you through capturing screenshots in cross-platform .NET MAUI applications. It covers project setup, and implementation steps, and provides a full code example for enhanced underst
Securing Your .NET Projects: Simple Strategies and Real Examples
2/18/2024 4:46:27 AM.
In today's digital world, keeping our software safe from cyber threats is super important. For developers working with .NET projects, it's not just a good idea but really necessary to make sur
Fortifying your .NET Project
2/16/2024 3:45:43 AM.
This article explores essential strategies to enhance the security of .NET projects, addressing common threats like SQL injection and XSS. It covers input validation, parameterized queries, authentica
Enable Audit History for an Entity in CRM
2/15/2024 9:16:31 AM.
Enable audit history in CRM to track entity changes. Enhance data security, compliance, and integrity by monitoring modifications. Configure settings to log and report on user actions for improved gov
Cybersecurity of External Streaming Data - Non-repudiation
2/14/2024 4:13:22 AM.
This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part co
Cybersecurity of External Streaming Data - Integrity
2/14/2024 4:04:35 AM.
This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity of b
Cybersecurity of External Streaming Data - Confidentiality
2/14/2024 4:02:06 AM.
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
Code Obfuscation in Flutter: Enhancing App Security
2/12/2024 7:06:05 AM.
Explore code obfuscation as a way to improve the security of your Flutter mobile applications. Safeguard your code from reverse engineering and tampering with effective strategies.
Xite Encryption
1/31/2024 10:06:02 AM.
This code provides an easy-to-use encryption and decryption solution in C#. It utilizes RSA cryptography, allowing seamless integration into Visual Studio projects. This class contains methods/functio
JavaScript Destructuring: Arrays, Functions, and Objects
1/31/2024 6:50:31 AM.
Destructuring is a powerful feature in JavaScript that allows you to extract values from arrays, objects, and function parameters easily.
Disabling Multifactor Authentication in Microsoft related Services
1/24/2024 6:47:10 AM.
This article describes the process to disable MFA for Microsoft related services using Microsoft Entra.
🖥️ Incident Handling: Common Malware Attacks
1/23/2024 9:57:06 AM.
Explore the realm of malware attacks, unveiling the intricacies of threats like ransomware, computer viruses, worms, Trojan horses, and adware. Delve into their types, characteristics, and potential i
🖥️ Incident Handling: Common Domain Attack Types
1/22/2024 7:18:18 AM.
In this article, we will go through different types of Domain Attacks. Domain attacks, including Typosquatting, Domain Hijacking, Pass the Hash, Pass the Ticket, LDAP Reconnaissance, and Brute Force,
Securing Your .NET Applications With Examples
1/20/2024 11:16:24 AM.
In the realm of software development, security remains a paramount concern. This is especially true for .NET applications, which often handle sensitive data and interact with critical systems. By adhe
🖥️ A Guide to Web Attack Incident Handling
1/17/2024 9:02:52 AM.
In this article, we will explore various types of web attacks, including Denial of Service (DoS) and Distributed Denial of Service (DDoS), SQL Injection, Cross-Site Scripting (XSS), Command Injection,
Securing PDF Uploads in MVC: Mitigating PDF Injection and Cross-site Scripting Vulnerabilities
1/15/2024 9:33:29 AM.
PDF Injection, also known as PDF XSS (Cross-site Scripting), can be a serious security vulnerability. To prevent such issues during PDF upload and viewing in an MVC (Model-View-Controller) applicatio
Handling CORS (Cross-Origin Resource Sharing) in ASP.NET Core Web API
1/15/2024 9:08:11 AM.
Demystify CORS in ASP.NET Core! Learn how to seamlessly handle Cross-Origin Resource Sharing and overcome origin-related errors in your Web API with this concise guide.
Building a Secure PHP MySQL Signup/Login Website with Email Verification
1/15/2024 8:48:49 AM.
Creating a secure signup/login system is essential for any web application that involves user authentication. In this article, I'll guide you through building a PHP MySQL login/signup website with
Mastering Permissions and Access Control in SharePoint
1/12/2024 10:37:35 AM.
Unlock the full potential of SharePoint permissions with this comprehensive guide. Dive deep into principles, strategies, and best practices for effective access control, ensuring a secure and organiz
Understanding Document Library in SharePoint
1/12/2024 6:05:36 AM.
In this article, we will learn about the full potential of SharePoint libraries with this in-depth guide. Explore document management, customization, integration, and security features, empowering org
Understanding the One-Way Nature of HASHBYTES in SQL
1/5/2024 10:48:17 AM.
This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
Generating X.509 Certificates with Private and Public Keys for IoT Device Security
1/2/2024 5:57:38 AM.
In this article, we will explore the process of generating X.509 certificates with private and public keys for IoT device security. This is essential for testing purposes, particularly when working wi
What are Solidity Modifiers and How do they boost the security of Smart Contracts?
12/28/2023 5:42:54 AM.
Explore the power of Solidity modifiers! From basic syntax to advanced implementations, learn how these tools enhance security, reusability, and efficiency in smart contract development.
Azure AD Group Based Licensing
12/20/2023 7:03:20 AM.
This setup is ideal for the organizations which has a number of licenses for different types of users. Also will be beneficial for the scenarios when not all the features needs to be activated for a g
Grant Workspace Permission to Users to Access & Write DQL Command In Fabric Warehouse
12/19/2023 9:29:37 AM.
In this video, I demonstrated how to grant workspace permission to users to access and write DQL command in Fabric Warehouse
Data Loss Prevention (DLP) in 2024
12/18/2023 11:58:25 AM.
In the ever-evolving landscape of cybersecurity, protecting sensitive data has become a paramount concern for organizations across industries. As we usher in the year 2024, the significance of robust
Column-Level Security in Fabric Data Warehouse
12/17/2023 7:47:05 AM.
In this video, I demonstrated how to implement column-level security in Microsoft Fabric Data Warehouse
CyberSafeguard: Navigating the Basics of Cybersecurity
12/14/2023 8:31:54 AM.
In this session, you will learn about CyberSafeguard, where we unravel the fundamentals of cybersecurity in a beginner-friendly atmosphere
Scaling Azure Databricks Secure Network Access to Azure Data Lake Storage
12/13/2023 1:36:49 PM.
Explore secure network access in Azure Databricks to Azure Data Lake Storage. Learn setup, RBAC, and secure coding with practical examples.
NCache Security: A Comprehensive Approach to Protecting Your Cached Data
12/13/2023 5:09:35 AM.
From this article, you will learn a comprehensive approach to protecting your cached data. In the realm of distributed caching, safeguarding cache nodes is crucial for protecting data and infrastructu
How to Configure Microsoft Entra Application Proxy?
12/12/2023 8:24:29 AM.
Learn how Azure Application Proxy facilitates secure remote access to on-premises applications without a VPN. From prerequisites to step-by-step guidance on setting up and configuring the App Proxy co
Configuring Data Connector And Producing Activity Data in Microsoft Sentinel
12/11/2023 5:46:47 AM.
Configuring the data connector and producing activity data in Microsoft Sentinel. the configuration process of a data connector and the generation of activity data in Microsoft Sentinel. It demonstrat
Dynamic Row-Level Security in Power BI Desktop & Service with different Users
12/5/2023 6:54:41 AM.
The RLS is one of the security measures in Power BI that helps to protect sensitive data and prevent unauthorized access. This vide shows how to create dynamic RLS in PBI Desktop and invoked the RLS i
Announcing the General Availability of .NET Chiseled Containers
12/4/2023 5:56:22 AM.
Explore the revolutionary .NET Chiseled Containers for cloud app deployment, offering size, security, and operational efficiency benefits.
Adopting Microsoft Entra ID Governance
12/2/2023 12:26:10 PM.
Lately, there has been a lot happened/ changed/ introduced in the Microsoft Entra ID Governance space and this is one of my favorite topics to write and explain as well.
How to Set Up Microsoft Sentinel?
11/28/2023 5:31:44 AM.
How to Set Up Microsoft Sentinel. Set up Microsoft Sentinel with ease using this step-by-step guide. Learn to navigate the Azure portal, create a new workspace, and install necessary components, ensu
Configuring Azure Key Vault in a .NET Core Web API
11/24/2023 5:08:28 AM.
This step-by-step guide explores integrating Azure Key Vault into a .NET Core Web API, enhancing security by securely managing sensitive information like API keys. Detailed instructions ensure a smoot
SSL/TLS Termination in API Gateway Pattern
11/22/2023 4:26:16 AM.
This article would be beneficial for readers seeking to understand the importance of SSL/TLS termination in enhancing API security and performance. It's great that you not only discuss the benefit
Securing Your .NET Core APIs
11/18/2023 6:19:41 AM.
This article explains how you can secure your .NET Core APIs with essential practices. It covers JWT authentication, role-based authorization, HTTPS implementation, input validation, and rate limiting
ASP.NET MVC 5 Security And Creating User Role
11/16/2023 5:39:03 AM.
In this article we will see how to use ASP.NET Identity in MVC Application for creating user roles and display the menu depending on user roles.
New feature for Authentication and Authorization in .NET 8
11/15/2023 10:44:06 AM.
Let's check out the cool new things that .NET 8 has added to help you keep your apps secure.
How to Secure your .Net Core API Through Identity Server 4
11/9/2023 5:08:59 AM.
A brief description of how to implement Identity Server 4. This article explains that setting up and configuring IdentityServer4 in a .NET application is comprehensive and provides a clear step-by-ste
What is Load Balancing?
10/31/2023 5:53:31 AM.
The article gives an extensive overview of load balancing, covering its definition, importance, functioning, types of load balancing algorithms, benefits, various types of load balancers, and the diff
Stop Writing Code During Interviews And Do This Instead
10/30/2023 5:09:38 AM.
The reality is we expect that you can code. It’s implied, its taught in schools to children, it’s integrated into video games like Roblox. Asking a professional software developer to write trivial cod
Optimizing File Security with Windows Sandbox
10/26/2023 12:37:01 PM.
Expert Tips for Utilizing Windows Sandbox to Enhance Downloaded File Security provides valuable insights on using Windows Sandbox, a built-in virtualization feature in Windows operating systems, to bo
How to Make .Net Core App Secure Through Identity Core?
10/25/2023 9:54:39 AM.
Converting a complex structure like the one you provided into a table format involves splitting the content into multiple tables due to its length. Below is the first part of the content formatted int
How Instagram Uses What You Speak About to Target Advertising?
10/25/2023 8:59:30 AM.
Have you ever pondered why you see so many advertisements on Instagram for goods and services that you find appealing? It's not by accident either. Facebook's parent company, Meta, also contr
Evidence In C#
10/25/2023 8:06:10 AM.
IIn C#, Evidence is a class within the System.Security.Policy namespace. It is used in .NET Framework applications to represent the evidence that is used to establish the permissions granted to an ass
Resource URI (Unique Resource Identifier) details of Common Microsoft Resources in Entra ID
10/23/2023 7:04:18 AM.
Resource URI (Unique Resource Identifier) details of Common Microsoft Resources in Entra ID.
NSX-T 4.0 Features and Updates: Revolutionizing Network Virtualization and Security
10/20/2023 10:11:46 AM.
This article introduces readers to VMware NSX-T 4.0, explores its key features and updates, and provides examples of how it impacts network virtualization and security. You can further expand on each
PermissionSet Class In C#
10/20/2023 4:58:58 AM.
The PermissionSet class in C# is a fundamental component of .NET security that allows developers to encapsulate a set of permissions for code execution. It enables the definition and management of fin
VMware NSX+
10/18/2023 12:14:25 PM.
VMware NSX+ is a cloud-delivered networking, security, and advanced load balancing service that allows networking, security, and operations teams to consume and operate NSX services from a single clou
How To integrate An Azure Storage Account With Azure Active Directory
10/17/2023 11:13:46 AM.
To integrate an Azure Storage Account with Azure Active Directory, you can use Azure AD authentication for your storage resources. This allows you to control access, implement role-based access contro
How to grant workspace permission to user to access and write DQL command in Fabric Data Warehouse
10/17/2023 6:51:26 AM.
This video demonstrate how to grant workspace permission to user to access and write DQL command in Fabric Data Warehouse.
SAML Authentication
10/16/2023 6:41:29 AM.
Understanding SAML Authentication: How It Works and Its Role in Modern Security