Want to build the ChatGPT based Apps? Start here
Become a member
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
TECHNOLOGIES
ANSWERS
LEARN
NEWS
BLOGS
VIDEOS
INTERVIEW PREP
BOOKS
EVENTS
Training
Live
JOBS
MORE
CAREER
MEMBERS
About URI
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Viknaraj Manogararajah (9)
Abdul Basith (5)
Venkata Subbarao Polisetty (4)
C# Corner Live (3)
Mahesh Chand (3)
Shanuka Maheshwaran (3)
Subham Ray (3)
Rajat Jaiswal (3)
Sharad Gupta (3)
Wilson Mok (3)
Vinodh Kumar (3)
Sagar Lad (3)
Waqas Ahmed (2)
Abhishek Tiwari (2)
Mohamed Azarudeen (2)
Hadshana Kamalanathan (2)
Shivangi Rajde (2)
Tuhin Paul (2)
Mohamed Shifan Salideen (2)
Koshila Senadhira (2)
Ojash Shrestha (2)
Akash Kumhar (1)
Pradeep Chandraker (1)
Sardar Mudassar Ali Khan (1)
C# Curator (1)
Mukesh Nailwal (1)
Chris Love (1)
Praveen (1)
Mansi Rana (1)
George Papadopoulos (1)
Amit Mohanty (1)
Ishoo Anyal (1)
Ganesan C (1)
Sanjay Kumar Pathak (1)
Allen O'neill (1)
Nitin Bhardwaj (1)
Ritesh Sharma (1)
Lajapathy Arun (1)
John Charles Olamendy (1)
Naimish Makwana (1)
Ramprakash Duraisamy (1)
Sarthak Varshney (1)
Aravind Govindaraj (1)
Jaydeep Patil (1)
Rajkumar Jain (1)
Veena Sarda (1)
Manoj Kalla (1)
Raj Kumar (1)
Anu Viswan (1)
Ijas Ahamed (1)
Sourav Kayal (1)
George (1)
Deepak Kumar (1)
Arjit Soni (1)
Manikandan Murugesan (1)
Pankaj Patel (1)
Hugo Barona (1)
Mohomed Shihan (1)
Related resources for URI
No resource found
Architecting Secure-First Software for Developers
6/5/2023 5:54:07 PM.
In this session, software developers will learn what and how to architect software apps that are secure and hack-proof.
How To Fix "Input Source Is Not Correctly Formatted" Error During Lookup Field Value Comparison With String
6/1/2023 11:11:08 AM.
We encounter such kind of error in many different scenarios and in different programming languages as well. In this article we will see how and when this error appears using SharePoint 2013 designer w
Custom WSE 3.0 Policy Assertion - Modifying the Security Header Generated by WSE
5/31/2023 6:41:12 AM.
Recently I encoutered an issue in the WSE security header of an ASP.Net application consuming a Java web service using WSE 3.0 involving the automatic addition of a timestamp in the security header wh
Policy-Based Authorization in .NET Core API: User, Groups, and Permissions
5/30/2023 5:33:17 AM.
To create users, groups, and manage permissions using policy-based authorization in a .NET Core API
Efficient CRUD Operations with ElasticSearch and .NET Core API
5/29/2023 1:50:40 PM.
ElasticSearch is a powerful and highly scalable open-source search and analytics engine built on top of Apache Lucene.
Custom JWT Handler In ASP.Net Core 7 Web API
5/26/2023 10:50:50 AM.
In ASP.NET Core Web API, you can create a custom JWT (JSON Web Token) handler to handle token authentication and authorization. The custom handler lets you define your logic for validating and process
Inserting records in a database using stored procedure and ADO.NET technology
5/24/2023 6:37:22 AM.
In this article I will explain you how to use CommandType stored procedure to insert records in a database in a disconnected manner.
Enhancing Security with Microsoft 365 Secure Score
5/18/2023 8:17:29 AM.
By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
How to Add Security Headers to Your Website Using .htaccess
5/18/2023 5:25:17 AM.
Want to know how to add security headers to your website using .htaccess? Read this blog and add content security policy header in wordpress site.
Adapting to AWS's New Default Security Settings: Ensuring Public Website Access Using S3 Websites
5/16/2023 4:14:11 AM.
Solve the impact of recent AWS policy changes, understand the challenges of restricted access, and explore the solution to overcome Access Denied errors. Learn how to adapt your access control strateg
Top 10 Reasons to Migrate to the Cloud
5/12/2023 2:36:01 PM.
The benefits of moving your business operations and IT infrastructure to a cloud-based platform. The article highlights ten key reasons why organizations should consider migrating to the cloud, such a
iOS App Security: Best Practices for Protecting User Data
5/12/2023 6:39:13 AM.
This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jail
Why You Should Use Vooki DAST For Dynamic Application Security Testing
5/8/2023 6:11:09 AM.
Scanning and auditing your web applications is now made easier with the advent of Vooki. A Free version of Vooki is also available that gives you a perfect scan report about the scanned applications.
Unpacking Azure's Storage Account Options: Which One is Right for You?âš¡
5/5/2023 7:11:55 AM.
This article is a comprehensive guide to the different types of storage accounts available in Azure. It covers everything from general-purpose v2 storage accounts to specialized blob, file, queue, tab
Azure or AWS? Making the Right Choice for Your Cloud Infrastructure💥
5/5/2023 7:10:43 AM.
This article could compare and contrast Azure and AWS, two of the most popular cloud platforms on the market. It could cover their similarities and differences, and provide insights into which platfor
5 HTTP Security Headers You Should Know For SEO
5/2/2023 3:11:22 PM.
Being an SEO beginner, it's easy to overlook the security headers in the regular audits. However, security headers should be your top priority when it comes to optimizing your website. In this art
Create JSON Web Tokens For Development And Testing
4/28/2023 6:44:12 AM.
Developing and testing an API that requires authentication through a JSON Web Token can be challenging. Use the dotnet-devjwt tool to generate custom tokens for testing your endpoints locally
Azure Storage Security Focuses On Five Key Areas
4/28/2023 5:46:25 AM.
In this article, we will learn Azure storage security focuses on five key areas. In our next article, we will learn about Azure File Storage Service.
SQL Server Security Best Practices
4/25/2023 12:01:38 PM.
SQL Server Security Best Practices
Object Destructuring In JavaScript
4/19/2023 9:18:04 AM.
Object destructuring in JavaScript is an expression that lets us extract values objects and arrays. Learn how to use object destructuring in JavaScript.
Array Destructuring In JavaScript
4/19/2023 9:12:27 AM.
In this article, you will learn about array destructuring in JavaScript.
Secure Resources Using Azure Managed Identities
4/19/2023 6:42:27 AM.
In this article, we will learn how to secure resources on azure platform without using any type of security key of connection string.
Bitcoin on the Mac- The Advantages of Embedded Cryptocurrency
4/15/2023 5:10:02 PM.
This article discusses the advantages of using Bitcoin on a Mac. It covers the basics of Bitcoin, the different wallets available for macOS users, and the security and convenience of using a Bitcoin w
Azure User Group Sweden: Ten Things You Need to Do to Build Rock Solid Azure Tenant
4/11/2023 6:15:30 AM.
In this session, you will learn how Every Azure service has built-in security features, and we have services dedicated solely to security.
How To Implement Azure DDoS Protection Plan For Virtual Networks
4/10/2023 5:22:55 AM.
In this article, you will learn how to implement Azure DDoS Protection Plan for Virtual Networks.
Event Bubbling And Event Capturing In JavaScript
3/20/2023 10:55:54 AM.
In this article, you will learn about Event Bubbling and Event Capturing in Javascript.
Anonymization Techniques for Data Protection and Privacy
3/20/2023 10:30:57 AM.
An anonymizer is a tool or service that is used to anonymize data by removing or obfuscating identifying information from a dataset, while still allowing the data to be analyzed or used for research p
Understanding Proxy Servers and Anonymizers: Benefits and Risks
3/20/2023 10:19:28 AM.
In today's digital world, anonymity and privacy have become crucial considerations for many individuals and organizations. Proxy servers and anonymizers are two technologies that can help provide
Power Apps - Security Trimmed Controls Based On SharePoint Groups
3/20/2023 7:20:15 AM.
In this article we will see how to show/ hide some controls in a Power Apps screen based on logged in user’s role. We have SharePoint online as data source and managing all the security roles using Sh
Azure Key Vault - From Hardware To The Cloud!
3/18/2023 2:27:51 PM.
How to get from security hardware to the cloud with Azure Keyvault.
What is XDR?
3/17/2023 10:22:17 AM.
Learn about XDR [Extended Detection and Response] and its benefits.
SQL Security Tips - Dynamic Data Masking To Secure Data Access
3/9/2023 5:22:36 AM.
There are various aspects of security, and Dynamic Data Masking is one of the important concepts to know. We will describe here what is Dynamic masking and how to implement it with step-by-step exampl
SQL Tips - A Simple Way To Check Vulnerability Status Of Your SQL Server Database
3/7/2023 4:18:29 AM.
In this article, you will learn about the simple way to check SQL Vulnerability to avoid any issue.
SQL Security Tips - Implement Row Level Security Quickly
3/6/2023 9:56:11 AM.
RLS (row-level security) is one of the important concepts we need to understand to secure data access at a different role.
SQL Security Functions: Part 4
3/3/2023 12:05:58 PM.
In this article I describe the Transact-SQL security functions SUSER_ID , SUSER_NAME , SUSER_SID , SUSER_SNAME and SYSTEM_USER.
SQL Security Functions: Part 3
3/3/2023 11:41:12 AM.
In this article I describe the Transact-SQL security functions SUSER_ID, SUSER_NAME, SESSION_USER and SESSIONPROPERTY.
SQL Security Functions: Part 2
3/3/2023 11:09:53 AM.
In this article, I describe the Transact-SQL security functions IS_MEMBER , IS_SRVROLEMEMBER , LOGINPROPERTY, ORGINAL_LOGIN, and PERMISSION.
SQL Security Functions: Part 1
3/3/2023 7:15:56 AM.
In this article, I describe the Transact-SQL security functions CURRENT_USER, HAS_DBACCESS, HAS_PERMS_BY_NAME, and HASHBYTES.
Capturing Changes in SQL Server Tables
2/22/2023 9:01:27 AM.
For capturing the changes of DML statements we must be familiar with the Merge statement and Output clause in SQL Server. I am giving a general overview of these statements.
Capturing Information of Configuration in SQL Server Using Sys.configurations
2/22/2023 7:17:23 AM.
In this article you will learn how to capture configuration information in SQL Server using sys.configurations.
Cyber Security - A Big Opportunity For Developers
2/17/2023 2:41:44 PM.
In this article, I will cover another growing tech trend, cyber security, that has a growing need of experts, and presents a big opportunity for developers and IT professionals, who are looking to sec
Security in Database Systems
2/14/2023 7:17:15 AM.
In this article, I will cover the principles concerning security and its realization in Oracle database and Microsoft SQL Server.
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
How To Create Model Driven Apps With Security Role Restriction
2/8/2023 10:50:52 AM.
How to Create Model Driven Apps With Security Role Restriction.
What are Web3 Features?
2/7/2023 11:19:59 AM.
In this article, we'll discuss What is Web3 and its Features?
How To Deploy And Configure Exploit Protection In Windows Server 2022
2/6/2023 11:31:59 AM.
How to deploy exploit protection to your environment, exploit protection helps protect devices from malware that use exploits to spread and infect. You can enable exploit protection on an individual
AWS - Identity Access Management
2/6/2023 10:34:34 AM.
A guidewire for AWS IAM.
Azure Key Vault Configuration And Implementation Using .NET Core 7 Web API
2/6/2023 9:48:36 AM.
In this article, you will lean about Azure Key Vault Configuration and Implementation using .NET Core 7 Web API.
What Is SIEM
2/2/2023 10:47:59 AM.
Learn about what is SIEM [ Security information and event management ] and its roles.
Activate Enterprise Mobility + Security E5 Licenses Using Azure AD For Free
2/1/2023 10:41:22 AM.
Microsoft Enterprise Mobility + Security (EMS) is intelligent mobility management and security platform. What this means is that EMS helps protect and secure your organization with its products t
DevSecOps Overview
1/30/2023 3:49:01 AM.
In this article, you will learn the basic information about DevSecOps & it's benefits.
Need of Web 3.0 Security by Preetam Rao
1/27/2023 1:56:06 PM.
In this session, you will learn security in WEB 3.0.
Colored Image Compression in Python using Fourier Transformation
1/16/2023 11:27:58 AM.
This video explains how to compress a colored image in Python using numpy's fourier transformation.
Props Destructuring And PropTypes
1/16/2023 11:22:39 AM.
In this article, you will learn about Props Destructuring and PropTypes.
Configuring NAT And PAT For Azure Load Balancer
12/30/2022 6:17:33 AM.
In this article, you will learn how to configure NAT and PAT for Azure Load balancer.
Configuring Budget Alert In Azure
12/27/2022 6:01:28 AM.
In this article, you will learn how to configure Budget Alert in Azure.
How To Enable SSL In Visual Studio
12/27/2022 2:24:50 AM.
In this article, you will learn how to enable SSL in Visual Studio.
Static Abstract Interface Members In C# 11 And Curiously Recurring Template Pattern
12/23/2022 5:20:22 AM.
This articles explores the Static Abstract Interface Members in C# 11, along with understanding the Curiously Recurring Template Pattern
How To Setup Virtual Network Integration On Azure Data Lake Storage
12/14/2022 3:33:03 AM.
In this article, you will learn how to setup Virtual network integration on Azure Data lake storage to improve security.
How To Setup Azure Data Factory With Managed Virtual Network
12/14/2022 3:32:41 AM.
In this article, you will learn how to setup Azure Data Factory with Managed Virtual Network to improve security.
10 Must Tips to Build Secure Websites for Software Developers
12/2/2022 11:35:01 AM.
Here are the 10 tips for Web developers and administrators on how to build and maintain secure websites.
How To Configure Network Security For Azure App Service Plan
11/30/2022 5:32:37 AM.
In this article, you will learn how to configure network security for azure app service plan.
How To Configuring Hybrid Azure AD Join Devices In A Managed Domain
11/29/2022 5:37:52 AM.
In this article, you will learn how to Configuring Hybrid Azure AD Join Devices in a Managed Domain.
Configuring FTP Server For Azure App Service
11/23/2022 6:04:44 AM.
In this article, you will learn how to configure an FTP Server for Azure App Service.
Configuring Azure Virtual Network Manager
11/8/2022 6:13:16 AM.
This post will concentrate on Azure Virtual Network Manager connectivity configurations.
How To Generalize Virtual Machines And Create Image VMs In Azure Portal
10/28/2022 5:22:51 AM.
In this article, you will learn how to generalize virtual machines and create image vms in azure portal.
Installing And Configuring WSUS
10/26/2022 8:15:12 AM.
In this article, you will learn how to install and configure WSUS.
Configuring BGP Tunnel in Azure
10/11/2022 8:48:34 AM.
Configuring BGP Tunnel in Azure
Configuring An ADF Pipeline Activity Output To File In ADLS
10/7/2022 6:25:31 AM.
In this article, we will see the practical approach to configure the output of a pipeline activity to a file in Azure blob storage.
Azure Synapse Security: Static Data Masking
9/5/2022 10:51:05 AM.
This is the basic practical implementation of static data masking feature in the azure synapse. This feature is common for all the Microsoft data products such as SQL Server, Azure SQL, Azure SQL mana
What Is DMARC ? | Why DMARC Is Important ? | Understanding DMARC Records
8/16/2022 4:29:28 PM.
In this article we will learn about DMARC, why it is important for email, and also how to get the best understanding of DMARC records.
Azure Synapse Analytics Security - Dynamic Data Masking
8/9/2022 10:10:12 PM.
In this article, you will learn about Azure Synapse Analytics Security - Dynamic Data Masking.
How To Create A Transport Rule To Avoid Spoofing Email
7/31/2022 11:38:42 PM.
In this article, you will learn how to create a transport rule to avoid spoofing email.
Configuring Windows Admin Center (WAC)
6/28/2022 4:58:43 AM.
In this article, you will learn how to configure Windows Admin Center.
Web API With AJAX: Understand FormBody and FormUri Attribute In Web API
6/22/2022 9:54:55 AM.
This article exlains the FormBody and FormUri attributes and how to use them with an action parameter to consume data at the client end.
Configuring A Failover Group For A Production Database In Azure
6/15/2022 1:27:37 PM.
In this article, you will learn how to configure a failover group for a production database in azure.
Top 10 Web Application Security Risks
4/20/2022 4:14:01 AM.
This is a web app security discussion.
Best Practises For Kubernetes Container Security
4/11/2022 9:15:01 AM.
In this article, you will learn about best practises for Kubernetes Container Security.
How To Setup Azure Synapse Analytics With Private Endpoint
4/4/2022 5:43:41 AM.
In this article, you will learn how to setup Azure Synapse Analytics workspace with Private endpoint to improve security.
A Simple Dummy File Security System Using C Language
3/21/2022 3:01:50 PM.
A File Security System is a console application that can be used to prevent unauthorized access to a file. It prompts the user to enter a password before he/she can access the particular file. The Sys
Update Office 365 With Two Step Verification
3/8/2022 4:31:11 AM.
Turning two step verification in Office 365 on or Off.
Managing Storage Accounts On Microsoft Azure
3/2/2022 2:04:38 PM.
In this article, I will demonstrate an Azure storage account and configure access to the account from the perspective of security and networking.
Configuring The Application Rules In Azure Firewall
2/28/2022 1:47:01 PM.
In this article, you will learn how to configure the application rules in Azure Firewall.
Configuring The DNAT Rules In Azure Firewall
2/24/2022 6:23:06 PM.
In our previous article, we learned how to deploy the Azure firewall; in this article, we will learn how to connect our Virtual machine using the Azure Firewall.
Overview Of Azure Traffic Manager And Configuring Priority Based Endpoints
2/10/2022 9:05:38 AM.
In this article, you will learn about Azure Traffic Manager and Configuring Priority Based Endpoints Step By Step.
Securing Web App Using Private Endpoint And Connecting Through Point To Site VPN with Gateway Transit
1/30/2022 10:20:25 AM.
We will learn how to deploy an Azure Webapp, set up a point-to-site VPN, set up VNet Peering with Gateway Transit, and configure a private endpoint in this tutorial.
Configuring Azure Front Door For A Highly Available Web Application
1/12/2022 5:33:27 AM.
In this article, you will learn how to configure azure front door for a highly available web application.
Azure Synapse Analytics - Creating Firewall At Server-Level
1/5/2022 4:59:51 AM.
In this article, we'll learn to create firewall at server-level in Azure Synapse Analytics.
Configuring Azure ExpressRoute Virtual Network Gateway
11/24/2021 6:22:39 AM.
In this article, you will learn how to configure Azure ExpressRoute Virtual Network Gateway.
Performance - Leadership
10/12/2021 6:06:37 AM.
In this article, you will learn about Performance - Leadership.
Microsoft Certified - Azure Administrator Associate (AZ-104) Study Guide
9/23/2021 12:18:21 PM.
This is a study guide for the exam AZ-104 - Microsoft Azure Administrator and the Microsoft Certified: Azure Administrator Associate certification. It includes useful resources that you can use to pre
Cloud Computing Security Threats
9/15/2021 12:46:15 PM.
This is a second article from the series of article about security as a service for cloud computing. In this article, we will explore about more cloud security threats in detail
Configuring Route Server In Microsoft Azure
9/8/2021 6:00:45 AM.
In this article, you will learn how to configure Route Server in Microsoft Azure.
What Is mTLS And How It Works
8/31/2021 8:34:33 AM.
In this article, you will learn about mTLS for your Organization.
Security As A Service For Cloud Computing
8/30/2021 4:32:26 AM.
In this article, we are going to explore about potential security threats while working with Cloud computing.
Usage Of uriPath Function In Power Automate
8/26/2021 2:49:36 PM.
In Power Automate, one common scenario is to get the path after the host which will allow to configure url’s easily between environments automatically. uriPath function is used to extract path after h
URIHost Function In Power Automate
8/20/2021 6:06:13 AM.
In Power Automate, most of the common scenario is to extract host details URI where in power automate can be used to form a dynamic url to open any record from an email link which can be achieved eas
Usage Of uriQuery Function In Power Automate
8/19/2021 1:01:56 PM.
In Power Automate, most of the common scenario is to extract parameters that are present in website url, which can be achieved easily using uriQuery Function as an example.
How To Secure Azure Web App Using Private Endpoints
8/5/2021 6:16:55 AM.
In this article, we’ll learn the about Private Endpoint, various aspect about it, its pros and the way to configure DNS to reach web app privately. This will make the web app secure with private conne
Usage Of Decode URI In Power Automate
8/5/2021 5:09:26 AM.
In Power Automate, to return a normal url from URL Safe Characters embedded encoded URI decodeUriComponent function is used.