TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Crypto
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
CSharp TV (16)
Shubhankar Banerjee (11)
Lalit Bansal (9)
Punar Dutt Rajput (3)
Ziggy Rafiq (3)
Vijayaragavan S (3)
Nitin (3)
Vignesh Kumar (2)
Nikunj Satasiya (2)
Sarfaraj Ansari (2)
Ashish Tiwari (2)
Dileep Singh (2)
Mahesh Chand (2)
Mohit Mishra (2)
Lokesh Varman (2)
Satya Karki (2)
Rohit Gupta (2)
Douglas Wagner (1)
Jitendra Mesavaniya (1)
Jake Creasy (1)
Rinki (1)
Henry He (1)
Ajay Kumar (1)
Ayush Gupta (1)
Ajay Yadav (1)
Vikas Gupta (1)
Rohatash Kumar (1)
Vijay Pratap Singh (1)
Mariusz Postol (1)
Kjetil Roe (1)
Kuppu Swami (1)
Arjit Soni (1)
Keyur (1)
Aymen Amri (1)
Asma Khalid (1)
Mihai Popescu (1)
Dinesh Gabhane (1)
Nakul Chaudhari (1)
lsitaraman (1)
Vikas Hooda (1)
Guest User (1)
Abhishek Tiwari (1)
Naimish Makwana (1)
John Iwasz (1)
Maruthi Palllamalli (1)
Ryan Jason (1)
Muhammad Shakir (1)
Darly Dixon (1)
Vinay Ayinapurapu (1)
Related resources for Crypto
No resource found
The Best Ordinal Wallets for Beginners in 2024
10/25/2024 5:34:27 AM.
In 2024, choosing the right ordinals wallet is crucial for managing digital assets securely. Options like Xverse and Hiro wallets offer user-friendly interfaces and strong security for beginners and v
Blockchain Beyond Cryptocurrency: Hidden Potentials Across Industries
9/17/2024 8:28:05 AM.
Blockchain technology extends far beyond cryptocurrency, offering transformative potential across various industries. From enhancing supply chains and healthcare to improving data security and finance
Encryption and Decryption using AES in .NET Core and .NET Framework
9/2/2024 7:24:40 AM.
AES (Advanced Encryption Standard) is a symmetric encryption algorithm using the same key for both encryption and decryption. In C#, AES encryption involves setting up a RijndaelManaged instance with
Encryption and Decryption using RSA (asymmetric) in Angular
8/30/2024 8:35:23 AM.
This guide explores implementing RSA asymmetric encryption and decryption in Angular. It covers how to integrate RSA public and private key pairs for secure data transmission.
What is JWS HMAC?
7/29/2024 2:58:59 PM.
Using JWS HMAC in ASP.NET is an effective way to securely handle tokens for authentication and information exchange. It ensures that the tokens are not tampered with and are from a trusted sender, pro
Encrypting and Decrypting Files using .NET Core
7/28/2024 1:06:15 PM.
Learn how to implement AES encryption and decryption in .NET Core with a detailed guide. Secure your sensitive data using systematic file encryption techniques. This comprehensive tutorial will equip
How Artificial Intelligence is Reshaping the Landscape of Crypto Trading Platforms?
7/24/2024 11:54:46 AM.
In this article, we will know Artificial Intelligence is revolutionizing crypto trading platforms by enhancing predictive analytics, automating trading strategies, and optimizing decision-making proce
Exploring the Decentralized Finance (DeFi)
7/24/2024 9:35:02 AM.
This article covers the basics of DeFi, including its core technologies like smart contracts and decentralized exchanges, and explores innovations such as yield farming, liquidity pools, and governanc
Understanding Crypto Wallets
7/24/2024 5:35:44 AM.
A crypto wallet is a secure app or device for storing, managing, and transacting cryptocurrencies like Bitcoin and Ethereum. It stores private keys, enabling access to digital assets on the blockchain
Cryptocurrency Basics: Pros, Cons and How It Works
7/23/2024 5:04:24 AM.
Cryptocurrency is a decentralized digital currency using cryptography and blockchain for secure transactions. It offers peer-to-peer exchanges, transparency, and security, with popular examples like B
Impact of Quantum Computing on Data Security
7/17/2024 12:15:07 PM.
Explore the transformative effects of quantum computing on data security in this insightful study. Delve into the potential vulnerabilities posed by quantum algorithms to traditional encryption method
Prefer Static HashData Method over ComputeHash in C# .NET
7/8/2024 12:20:33 PM.
In .NET, the HashData method offers a modern, efficient way to perform hashing operations, eliminating the need for instantiating hashing algorithm classes like SHA256. It simplifies code, enhances pe
All About NFTs Profits and Losses in Blockchain Technology
7/3/2024 7:55:25 AM.
NFTs (Non-Fungible Tokens) are unique digital assets verified using blockchain technology. Unlike cryptocurrencies, NFTs cannot be exchanged on a like-for-like basis. They are used for digital art, co
What is Tokens & Crypto Currencies? Its Future Scope in Market & MNCs
7/2/2024 5:13:42 AM.
Cryptocurrency and tokens represent a revolutionary shift in the financial landscape, blending technology and finance to create a new paradigm of value exchange. At their core, cryptocurrencies are di
Everything About NFTs: Creation to Investment Guide
7/1/2024 6:36:48 AM.
Explore NFTs (Non-Fungible Tokens), unique digital assets authenticated by blockchain, enabling ownership of art, music, and more. Discover their role in digital markets, from creation to trading, and
Blockchain Beyond Crypotcurrency: Applications in Business
6/21/2024 1:34:07 PM.
Blockchain, renowned for its role in cryptocurrencies like Bitcoin, extends beyond finance to revolutionize industries. It offers decentralized, secure, and transparent solutions for supply chain mana
The Role of Nonces in Ethereum and EVM Transactions
6/19/2024 9:33:55 AM.
Explore the role of nonces in EVM-based blockchains like Ethereum. Learn how nonces ensure transaction security, prevent double-spending, and maintain blockchain integrity.
Generating Public/Private Keys In C# And .NET
6/14/2024 10:40:14 AM.
How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
How to Set Up Core Crypto Wallet?
6/14/2024 5:46:18 AM.
Discover Core Crypto Wallet: A secure, user-friendly solution to manage cryptocurrencies. Learn its features, benefits, and setup in this comprehensive guide.
Transaction Confirmation and Expiration in Solana
6/11/2024 7:11:52 AM.
Explore Solana's high-performance blockchain, designed for decentralized applications and cryptocurrencies. Learn about its rapid transaction confirmation, the role of validators, and mechanisms b
Building A Blockchain In .NET Core - Basic Blockchain
6/6/2024 11:46:24 AM.
Blockchain technology is the foundation of the Bitcoin. With the popular of Bitcoin, Blockchain gets popular too. People start to use Blockchain other than cryptocurrency in all kinds of applications.
The Difference Between SSL and TLS
6/5/2024 5:39:35 AM.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are encryption protocols securing data transmission over networks. TLS succeeded SSL, offering improved security and compatibility. Both f
Blockchain: Transforming Trust and Security in the Digital Age
5/29/2024 4:31:21 AM.
Blockchain initially for cryptocurrencies like Bitcoin, has evolved into a versatile technology impacting various industries. Satoshi Nakamoto's 2008 proposal, blockchain has introduced smart cont
10 Best Crypto Wallets for Secure Storage of Your Digital Assets
5/27/2024 12:14:27 PM.
Explore the top 10 crypto wallets for secure storage of digital assets like Bitcoin and Ethereum. From hardware wallets like Ledger Nano X to user-friendly options like Coinbase Wallet and MetaMask, d
Solana's Top Explorers: Navigating the Blockchain Landscape
5/10/2024 8:14:35 AM.
Discover Solana's top explorers in the blockchain landscape! Dive into the innovative world of decentralized applications (DApps), digital assets, and DeFi. Explore Solana's scalability and in
A Guide to Secure Your Assets on Decentralized Exchanges (Dex)
5/8/2024 11:26:57 AM.
Decentralized exchanges (DEXs) revolutionize cryptocurrency trading, enabling peer-to-peer transactions without intermediaries. Using smart contracts and blockchain technology, DEXs offer transparency
Bypassing Obfuscation: Ciphered Code Reverse Engineering
5/8/2024 10:13:08 AM.
In this article, we have performed reverse engineering over a protected binary by deep analysis of both obfuscated source code and MSIL assembly code.
Top Wallets for Securely Managing Your Solana Assets
5/8/2024 9:15:54 AM.
In this article, we will explore the crypto wallets that support the Solana blockchain. This article explores the best wallets tailored for Solana tokens, aiding users in making informed decisions for
The Role Of Blockchain As A Service In The Tech Industry
5/7/2024 11:29:45 AM.
Blockchain as a Service (BaaS) revolutionizes tech by offering scalable, secure, and transparent solutions. It enhances industries like finance, healthcare, and supply chain with decentralized data ma
Encryption for Data Security: Creating Digital Certificates
5/6/2024 6:15:44 AM.
Encryption secures data by converting it into unreadable ciphertext using algorithms and keys, preventing unauthorized access. SSL/TLS certificates enable secure communication between websites and use
Top Innovative Blockchain Trends to Watch in 2024
5/3/2024 11:30:04 AM.
In this blog, we will look at the key blockchain trends in 2024 and beyond. We will also look into how they influence businesses and how they help sectors change, particularly as we approach a new pha
How To Design A Cryptocurrency With Stablecoins
4/30/2024 9:23:33 AM.
Explore the intricate process of designing a cryptocurrency ecosystem with stablecoins. Dive into concepts like blockchain, smart contracts, and monetary policy to create a digital asset that ensures
Top 10 Crypto Market Makers in 2024
4/17/2024 5:25:24 AM.
Here is a list of top crypto market makers. Market-making in the crypto world ensures smooth trading by acting as a bridge between buyers and sellers. Learn about market makers' roles, strategies,
Security ASP.net Core MVC (C#) Encryption and Decryption
4/9/2024 6:14:18 PM.
On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offe
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
Generate Random Password in ASP.NET
4/3/2024 10:46:55 AM.
Generate Random Password in ASP.NET: Enhance security with ASP.NET by creating a randomized password generator. Utilize built-in features or custom code to generate strong, unpredictable passwords, bo
The Best Decentralized Apps of 2024
4/3/2024 8:30:18 AM.
Explore the world of decentralized applications (DApps) and their impact on various industries. Learn about the benefits of DApps, including privacy, security, and cost-effective transactions. Discove
What Are EOAs and How to Create Ethereum Wallets Using C#?
3/22/2024 4:48:38 AM.
Discover how to harness the power of Ethereum with C# by learning about EOAs and creating secure wallets for transactions. Dive into the world of blockchain development now
What is New in .NET 9
3/4/2024 8:06:59 AM.
.NET 9, succeeding .NET 8, places particular emphasis on cloud-native applications and enhancing performance. It will receive standard-term support (STS) for 18 months.
Cybersecurity of External Streaming Data - Confidentiality
2/14/2024 4:02:06 AM.
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
Xite Encryption
1/31/2024 10:06:02 AM.
This code provides an easy-to-use encryption and decryption solution in C#. It utilizes RSA cryptography, allowing seamless integration into Visual Studio projects. This class contains methods/functio
Understanding the One-Way Nature of HASHBYTES in SQL
1/5/2024 10:48:17 AM.
This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
Buillding Crypto Wallet with Ethers.js and Node.js
12/14/2023 5:22:46 AM.
In this article, we will build a basic crypto wallet using ethers.js and Node.js. Ethers.js simplifies Ethereum development, acting as a guide for developers by streamlining wallet management, smart c
Secure Password Hashing with SHA-256 and Salt in Python
12/7/2023 5:46:50 AM.
In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
How Businesses are Utilising Dynamics 365
11/30/2023 10:49:44 AM.
This article explores the numerous impact?of Microsoft Dynamics 365 for companies, highlighting the major features and functionalities that provide them a competitive edge.
Crypto Token vs Crypto Coin
11/23/2023 4:42:03 AM.
In This article, we will discuss crypto token and crypto coin and their difference. Crypto coins, like Bitcoin (BTC) and Ethereum (ETH), operate on independent blockchains, facilitating secure transac
Types of Crypto Wallets
11/1/2023 5:45:42 AM.
Explore the world of cryptocurrency wallets, from convenient hot wallets for daily transactions to ultra-secure cold wallets for long-term storage. Choose wisely for a balanced approach to digital ass
TripleDES Encryption and Decryption in C#
10/16/2023 5:35:37 AM.
Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
Creating MultiSig Wallet Contract
10/13/2023 5:31:54 AM.
Learn to create secure multi-sig wallet contracts using Solidity, enhancing cryptocurrency protection.
Introduction To Symmetric Encryption
10/11/2023 5:01:07 AM.
In this article, you will learn about Symetric Engryption.
How to Set-up Trezor Hadware Wallet?
10/9/2023 8:54:42 AM.
Secure your cryptocurrencies with Trezor Hardware Wallet - the ultimate shield against cyber threats and unauthorized access.
How to connect Trezor Hardware Wallet with Metamask
10/6/2023 5:53:41 AM.
Enhance your crypto security: Connect Trezor hardware wallet with Metamask for a powerful blend of offline storage and user-friendly access.
How to connect metamask with different blockchain networks?
10/6/2023 5:20:31 AM.
Unlock the full potential of MetaMask! Learn to connect to various blockchain networks and manage your digital assets with ease.
C#.NET - Generate An API Key Using Nuget Library
10/5/2023 6:47:45 AM.
This article is about the integration of the Asmak9.AuthorizeRESTWebApiAK .NET library with a C#.NET Console Application.
Best Practices for Trezor Wallet Security
9/27/2023 1:39:59 PM.
Safeguard your digital assets with Trezor Wallet's top security practices. From setup to transactions, navigate the crypto world securely.
SHA-1 Bit Implementation In C#
9/25/2023 6:30:24 AM.
This is a bit implementation of the SHA-1. It supports messages 2^32 - 65 bits long.
How to Transfer Tokens using Safe{Wallet}?
9/22/2023 4:03:42 AM.
Explore Safe{Wallet}'s multi-signature security for seamless token transfers. Learn the step-by-step process to manage digital assets securely and efficiently.
What is Web3
9/8/2023 6:26:22 AM.
Web3, the next-gen web, emphasizes decentralization, blockchain, user control, and interconnectedness. It holds potential in DeFi, NFTs, supply chains, voting, healthcare, gaming, content monetization
Governance Tokens vs Utility Tokens
9/4/2023 3:38:17 PM.
Explore the world of blockchain tokens! Discover the differences between governance and utility tokens in decentralized ecosystems.
C# Security: Best Practices for Secure Coding
8/31/2023 5:05:34 PM.
In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
Activation Link Vulnerability
8/24/2023 9:15:31 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Understanding SSH Authentication
8/10/2023 4:57:38 AM.
Unveil the significance of SSH (Secure Shell) in securing network communication. Explore SSH authentication's core concepts, methods, and integration into .NET Core applications for fortified remo
How To Install And Stake With STRAX Wallet
7/19/2023 6:27:57 AM.
This article describes the steps to install and stake from Strax Wallet.
XML Signatures in Microsoft .NET
7/18/2023 5:26:02 AM.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
How To Configure SMTP O365 Migration Using TLS 1.2 For SQL Database Mail
7/6/2023 4:49:23 AM.
This article will explain to you how exactly you need to configure TLS 1.2 as a default protocol and setup SMTP O365 migration using SQL 2012 Database mail and above versions for Windows Server 2012 a
Rivest Shamir Adleman(RSA) Algorithm and Functions
6/19/2023 7:13:37 AM.
In Java, you can leverage the built-in cryptographic libraries to generate RSA key pairs, encrypt and decrypt messages, and perform digital signatures. This article explores the RSA application and it
Cryptography actions with Hashing in Desktop flow using Microsoft Power Automate
6/19/2023 7:06:18 AM.
Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Powe
Cryptography actions with File in Desktop flow using Microsoft Power Automate
6/16/2023 7:31:15 AM.
Reading this article, you can learn how to encrypt or decrypt a file using Encrypt from file with AES action and Decrypt to file with AES action with the Desktop flow in Microsoft Power Automate
Cryptography Actions with Plain Text in Desktop Flow using Microsoft Power Automate
6/15/2023 4:42:49 AM.
Reading this article, you can learn how to encrypt or decrypt plain text using Encrypt text with AES action and Decrypt text with AES action with Desktop flow in Microsoft Power Automate.
Generating Cryptographic Hashes with SHA-256 in JavaScript
6/12/2023 6:53:43 AM.
Difference Between Meta And Metaverse
5/2/2023 5:37:35 AM.
Facebook's Rebranding As Meta
Securely Set Up Your Algorand Account on Ledger Nano
4/18/2023 12:58:55 PM.
Using this guide you will learn how you can set up an algorand account on the ledger Nano
Bitcoin on the Mac- The Advantages of Embedded Cryptocurrency
4/15/2023 5:10:02 PM.
This article discusses the advantages of using Bitcoin on a Mac. It covers the basics of Bitcoin, the different wallets available for macOS users, and the security and convenience of using a Bitcoin w
How To Set Up Ledger Nano S
4/15/2023 9:04:17 AM.
In this article, I will discuss Ledger Nano S, a cryptocurrency hardware wallet, and how we can set it up.
Microsoft Is Testing A Cryptocurrency Wallet Built Into The Edge Browser
3/29/2023 4:57:55 AM.
Learn about Microsoft Edge's new cryptocurrency wallet. Who has access and how you can use it to safely store your crypto.
How To Perform Transaction Using Stratis Cirrus Core Private Net Wallet
3/22/2023 3:18:18 AM.
This article provides insights into different types of blockchain networks and guides beginners to perform the transaction using Stratis Cirrus Core Private Net Wallet.
Is NFT Hedge Against Crypto Market
2/20/2023 12:33:44 PM.
In this session, you will know about NFT Hedge Against Crypto Market.
Taxation on Digital Asset (Cryptocurrency & NFTs)
2/16/2023 2:30:38 PM.
In this session, you will know about Taxation on Digital assets (Cryptocurrency & NFTs).
Why Banks Are Blocking the Crypto
2/15/2023 3:08:06 PM.
In this session, you will know Why Banks Are Blocking Crypto.
Difference Between Web 3.0 And Metaverse
2/15/2023 10:30:02 AM.
For some tech-savvy individuals, the metaverse is Web3.0, and vice versa!
How Do You Launch Your Own Token
2/14/2023 2:13:31 PM.
In this session, you will learn How Do You Launch Your Own Token.
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
How to build a Crypto Wallet by Rohit Gupta
2/10/2023 1:49:51 PM.
In this session, you will learn How to build a Crypto Wallet.
Marketing in the NFT Space by Jagriti Gupta
1/30/2023 3:11:49 PM.
In this session, you will learn about marketing in the NFT Space.
Introduction To Homomorphic Encryption With Microsoft SEAL
12/20/2022 5:05:57 AM.
Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preser
PGP (Pretty Good Privacy) Using C#
11/18/2022 6:31:02 AM.
In this article you will learn about PGP (Pretty Good Privacy) using C#.
Create A Cryptocurrency From Scratch Using Python
10/26/2022 8:18:27 AM.
Excited to get started with your first cryptocurrency project? Let’s start with something easy. In this tutorial, we’ll use Python programming language as it has powerful libraries to support blockcha
Blockchain, Gaming and MetaVerse
9/18/2022 4:41:22 AM.
Watch this session to learn about Blockchain, Gaming and MetaVerse
Encrypt a File Using Rijndael
8/22/2022 8:52:57 AM.
In this article, we will encrypt a file and embed an encrypted key through which we encrypt that file.
Top 5 NFT Marketplaces That Have Achieved Success With Their Business Models!
7/21/2022 4:29:42 AM.
The top NFT marketplaces can mean the difference between selling a brand-new masterpiece and discovering a brand-new project to collect. NFT marketplaces are also a gateway into a community of ardent
Setting Up OpenSSL On Windows 10 Machine
7/17/2022 1:37:05 PM.
This article explains what openssl is and steps to install properly in windows 10 machines.
Current Markets & What to Expect from Summer
7/8/2022 5:03:47 PM.
Watch this session to learn about Current Markets & what to expect from Summer.
Crypto Investors are Making Millions from NFT, is NFT Hedge against Crypto Market
7/7/2022 12:58:12 AM.
Watch this session to learn about Crypto Investors are Making Millions from NFT, is NFT Hedge against Crypto Market.
The Easiest Way To Give The Gift Of Crypto
7/3/2022 7:23:58 AM.
Watch this session to learn about The Easiest Way To Give The Gift Of Crypto
Minting & The Regulatory Issues of Marketing NFTs Linked to Properties & Assets in the Real World
6/28/2022 12:54:27 PM.
Watch this session to learn about Minting & The Regulatory Issues of Marketing NFTs Linked to Properties & Assets in the Real World.
Social Good & the Global Future of Finance
6/22/2022 5:47:13 PM.
Watch this session to learn about Social Good & the Global Future of Finance
Investment in Blockchain, Crypto, Metaverse or NFT Companies
6/20/2022 1:41:08 PM.
Watch this session to learn about Investment in Blockchain, Crypto, Metaverse, or NFT Companies
Blockchain & Real Estate with RE Tokenization via NFTs & Metaverse Properties
6/19/2022 5:30:06 AM.
Watch this session to learn about Blockchain & Real Estate with RE Tokenization via NFTs & Metaverse Properties
BCrypt Conference 2022 - Blockchain and The Future of NFTs
6/17/2022 3:09:21 PM.
Watch this session to learn about Blockchain and The Future of NFTs
BCrypt Conference 2022 - Opening Note by Jordan French
6/16/2022 5:29:35 AM.
Be a part of the largest global blockchain, cryptocurrency, and NFTs conference. BCrypt is a conference streaming live from around the globe.