In this article, we are going to look at Session Fixation in ASP.NET web applications with some code examples in VB.NET.
In this article, you will learn about infected computers to targeted attacks.
In this article, you will learn about the vulnerabilities of botnets and cybercrime.
In this article, you will learn about Transport Layer Security.
In this article, you will learn about Web Application Security.
In this article, you will learn about the Seven Pernicious Kingdoms.
In this article, you will learn about the nature of security flaws.
This article describes a step-by-step procedure from scratch on how to generate a server-side X509 certificate on Windows 7 for SSL/TLS TCP communication using OpenSSL.
This article will be focusing on cross site scripting attack and prevention in general.
This article discusses a topic that is very confusing, and many people have posted questions about their doubts on the terms related to Authorization, Authentication, and Security protocols.
Shweta Lodha Mar 19, 2019 Writing secure code is an important part of software development. .NET provides code access security mechanism that grants/denies access to resources within a method call. This article explains how...
Recently, I was involved in a project where I got a chance to work on its security and frankly, I didn't know anything about security. In this write-up, I have shared how I went through it.
Rion Williams Jan 21, 2019 In this article, we are going to understand about JSON Web Token which is known as JWT.
Generating Symmetric Private Key In C# and .NET. Major symmetric algorithms are AES, DES, RC2, Rijndael, and TripleDES. The GenerateKey and GenerateIV methods return the private secret key and init...
Mahesh Chand Jul 07, 2018 OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
Pradeep Yadav Sep 06, 2017 Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
Sahil Sharma Feb 02, 2015 In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
In this article, you will learn how it is possible to secure application ideas without a patent.
If you work on a Windows machine with customer data, you need to secure it - learn how!
Allen Oneill Nov 22, 2016 In this article, you will learn about "known wrongs" in securing software.