In this article you will learn security on the web by Advanced Encryption Standard (AES) and Security Assertion Markup Language (SAML).
In this article I provide a general advice for storing passwords, how to manage them in a database and a few other tips. Plus source code examples for storing the passwords.
In this article we learn about Brute Force Attacks and how to prevent them.
In this article we learn about passphrases, how to make a strong passphrase and what the benefits are over passwords.
In this article you will learn about SSL Certificates and how they work.
This article explains SSL and how to implement SSL in an ASP.Net web application.
Divya Sharma Dec 17, 2014 In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text ...
In this tutorial you will learn how to inject spyware into an EXE.
This article is resuming the voyage by covering the applied aspect of SSL on .NET website via IIS webserver along with the creation of digital certificates.
This article explains the Secure Sockets Layer (SSL) including the inherent issue of web server security and the process of SSL configuring and implementing in the form of digital certificates over...
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where thin...
Security is an essential part of an application and it should be taken into consideration from the grass root level from an application’s design. Security is all about protecting your assets from u...
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
This application an be used to encrypt a text message using AES encryption as well as send it to the person whose email is provided. This could be used as the security software for any of us. But t...
This article describes a simple approach to determining whether or not a logged in user is a member of a group within the context of a desktop application. The approach shown relies upon the use o...
In a certain cases, metadata embedded within your configuration file is sensitive. In fact, imagine that you develop an application that uses a data base as data source; all information about this ...
To run the excel report, security settings are required for excel application because while working with the excel application we are going to use some of the classes for manipulating the data insi...
In this article, I will propose a method of how to encrypt data and store it using symmetric algorithms whose are, in fact, four integrated classes within the .Net framework, namely DES,RC2,Rijnda...
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
This article is intended to explore the provider pattern in the context of a membership provider.