TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Encryption
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Nilesh Jadav (4)
Vignesh Kumar (4)
Sarthak Varshney (4)
Mohamed Shifan (3)
Mahesh Chand (3)
Monica Rathbun (3)
Mariusz Postol (3)
Nikunj Satasiya (2)
Douglas Wagner (2)
Ajay Kumar (2)
Ziggy Rafiq (2)
Nitesh Jha (2)
Keyur (2)
Sangeetha Sundaramoorthy (2)
Amit Mohanty (2)
Saad Aslam (2)
Vinodh Kumar (1)
Hadshana Kamalanathan (1)
Dhruvin Shah (1)
Siddhesh Chavan (1)
Abhishek Jaiswal (1)
Prashant Kumbhar (1)
John Godel (1)
Priyanshu Agnihotri (1)
Velladurai (1)
Gajendra Jangid (1)
Jake Creasy (1)
Habibul Rehman (1)
Arvind Singh (1)
Vithal Wadje (1)
Jobin S (1)
Vikas Gupta (1)
Arun Ramaswamy (1)
Shubham Kumar (1)
Sean Franklin (1)
Santhosh Teja (1)
Kunal Patil (1)
Onkar Sharma (1)
Ashutosh Singh (1)
Kjetil Roe (1)
Alpesh Maniya (1)
Kisorjan Jakathiswaran (1)
Subham Ray (1)
Kirtesh Shah (1)
Raj Kumar (1)
Aymen Amri (1)
Vaibhav Patil (1)
Koshila Senadhira (1)
Shaishav Desai (1)
Cr Bhargavi (1)
Arjun Panwar (1)
Senthilkumar (1)
Guest User (1)
Abdul Basith (1)
Abhishek Tiwari (1)
Jaydip Trivedi (1)
Naimish Makwana (1)
Vivek Kumar (1)
John Iwasz (1)
Toufik El Azzaoui (1)
Saif Ullah Rao (1)
Pankaj Lohani (1)
Manish Dwivedi (1)
Thiago Vivas (1)
Ecco Suprastyo (1)
Abhishek Dubey (1)
Sibeesh Venu (1)
Priyaranjan K S (1)
Srihari Chinna (1)
Mahesh Verma (1)
Allen Oneill (1)
Felipe Ramos (1)
Kishore Chowdary (1)
Krunal Trivedi (1)
Related resources for Encryption
No resource found
Data Loss Prevention in Microsoft Fabric Internals
10/28/2024 9:20:50 AM.
Microsoft Fabric’s Data Loss Prevention (DLP) feature protects sensitive data across services like SharePoint, Teams, and Exchange by enabling policy creation, scanning, and enforcement through Micros
Activate Server-Side Encryption for Azure Disks with Customer Keys
10/21/2024 6:21:07 AM.
Azure Disk Storage offers server-side encryption (SSE) with customer-managed keys, allowing users to control encryption for managed disks. By utilizing Azure Key Vault, users can manage access and enh
Understanding Wi-Fi Technology: Standards, Strengths, & Weaknesses
10/5/2024 6:37:31 AM.
This document provides an overview of Wi-Fi technology, covering its key standards, strengths like wireless connectivity and easy setup, and weaknesses such as limited range and security risks. It als
Send Email to Gmail in ASP.Net Using C#
10/1/2024 8:35:17 AM.
Create a simple email system in ASP.NET C# using Visual Studio 2010. The system allows users to input an email address and a message in two TextBoxes. It sends the email via Gmail's SMTP server us
Overview Of Data Gateway In Power BI
9/16/2024 11:19:33 AM.
A Power BI Gateway connects on-premise data sources, such as SQL Server or SharePoint, to online services like Power BI. It ensures secure communication, supports both Personal and Enterprise Modes, a
Encryption and Decryption using AES in .NET Core and .NET Framework
9/2/2024 7:24:40 AM.
AES (Advanced Encryption Standard) is a symmetric encryption algorithm using the same key for both encryption and decryption. In C#, AES encryption involves setting up a RijndaelManaged instance with
RSA Encryption and Decryption in .NET Core and Framework Explained
8/30/2024 9:37:27 AM.
The RSA algorithm is an asymmetric cryptography method that uses a pair of keys: a public key for encryption and a private key for decryption. This example demonstrates how to use the BouncyCastle lib
Encryption and Decryption using RSA (asymmetric) in Angular
8/30/2024 8:35:23 AM.
This guide explores implementing RSA asymmetric encryption and decryption in Angular. It covers how to integrate RSA public and private key pairs for secure data transmission.
Encryption and Decryption using AES (Symmetric) in Angular
8/30/2024 5:01:16 AM.
AES (Advanced Encryption Standard) is a symmetric encryption algorithm used for secure data transmission. Implement AES in Angular using the crypto-js library, supporting modes like CBC, ECB, and CTR,
Learn Database Mail in SQL Server
8/29/2024 10:53:40 AM.
Database Mail in SQL Server is a robust feature that enables sending emails via an SMTP server without relying on MAPI clients like Outlook. It offers secure SSL encryption, asynchronous processing, e
Cloud Security For Windows Azure
8/2/2024 5:04:22 AM.
In this article, we will learn about key aspects like data encryption, threat detection, identity management, and compliance to protect your resources and maintain robust cloud security.
Overview Of Azure On-Premise Data Gateway
7/30/2024 6:05:54 AM.
Learn about the Azure On-Premises Data Gateway, which acts as a bridge between on-premise resources and Azure services like Logic Apps, Power BI, and Microsoft Flow. This article covers its role in se
AlbertAGPT Bird's Eye Architectural View
7/29/2024 6:51:51 AM.
AlbertAGPT is a cutting-edge AI architecture featuring domains for updating, interacting, retrieving, and researching information. It integrates advanced NLP, NLU, and NLG technologies with robust saf
Google Storage Services for Robust Data Management Solutions
7/29/2024 6:31:00 AM.
Google Cloud Storage offers versatile solutions including object, block, and file storage. It provides scalable, secure, and cost-effective options like Persistent Disk, Filestore, Archive, Nearline,
Encrypting and Decrypting Files using .NET Core
7/28/2024 1:06:15 PM.
Learn how to implement AES encryption and decryption in .NET Core with a detailed guide. Secure your sensitive data using systematic file encryption techniques. This comprehensive tutorial will equip
The Evolution of Cyber Threats and How to Stay Protected
7/26/2024 6:03:19 AM.
As cyber threats evolve, from simple viruses to sophisticated ransomware and advanced persistent threats (APTs), staying protected is crucial. Key measures include using strong, unique passwords, enab
Understanding TLS and SSL: Securing Your Digital Communications
7/24/2024 9:31:22 AM.
TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are cryptographic protocols designed to secure data transmitted over the internet by encrypting and authenticating the com
Impact of Quantum Computing on Data Security
7/17/2024 12:15:07 PM.
Explore the transformative effects of quantum computing on data security in this insightful study. Delve into the potential vulnerabilities posed by quantum algorithms to traditional encryption method
C# Method Designed to Make a POST Request to a Web API Endpoint
7/4/2024 5:31:08 AM.
This guide covers API integration in C#, detailing serialization, encryption, HTTP requests, and error handling. Learn how to set up an API integration method, handle responses, and follow best practi
Transparent Data Encryption (TDE) in SQL Server
7/1/2024 7:04:40 AM.
Transparent Data Encryption (TDE) in SQL Server encrypts data at rest, ensuring database and log file protection against unauthorized access. TDE uses a database encryption key (DEK), secured by a cer
Blockchain Beyond Crypotcurrency: Applications in Business
6/21/2024 1:34:07 PM.
Blockchain, renowned for its role in cryptocurrencies like Bitcoin, extends beyond finance to revolutionize industries. It offers decentralized, secure, and transparent solutions for supply chain mana
Mastering Azure Blob Storage with ASP.NET Core MVC
6/16/2024 2:50:12 PM.
Azure Blob Storage offers scalable, cost-effective storage for unstructured data like images and documents. Integrated seamlessly with ASP.NET Core MVC, it provides secure uploads, downloads, and mana
Generating Public/Private Keys In C# And .NET
6/14/2024 10:40:14 AM.
How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
Cyber Security vs. Cloud Security
6/11/2024 12:17:44 PM.
Explore the distinctions between Cyber Security and Cloud Security through real-world examples. Cyber Security focuses on safeguarding networks, systems, and data from digital threats, while Cloud Sec
The Difference Between SSL and TLS
6/5/2024 5:39:35 AM.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are encryption protocols securing data transmission over networks. TLS succeeded SSL, offering improved security and compatibility. Both f
Introduction To AES And DES Encryption Algorithms In .NET
6/5/2024 5:38:31 AM.
Explore encryption methods like Symmetric (DES, 3DES, AES) and Asymmetric (RSA, DSA), highlighting key differences in key management, security, and performance. Understand DES vulnerabilities and adva
Password-Protected PDF File Using ASP.Net C#
5/31/2024 9:56:31 AM.
Learn how to enhance document security by creating password-protected PDF files using ASP.NET C#. Explore encryption techniques with libraries like iTextSharp to ensure data confidentiality. Safeguard
API Security Best Ways Implemented in .NET Core API
5/17/2024 4:50:03 AM.
This article covers essential API security practices, including encryption, authentication, authorization, input validation, rate limiting, and continuous monitoring, to protect APIs against security
How Secure Sockets Layer (SSL) Protects Data Online?
5/7/2024 5:53:30 AM.
Learn how SSL works in a step-by-step guide for beginners and professionals, ensuring secure internet communication and data protection.
Encryption for Data Security: Creating Digital Certificates
5/6/2024 6:15:44 AM.
Encryption secures data by converting it into unreadable ciphertext using algorithms and keys, preventing unauthorized access. SSL/TLS certificates enable secure communication between websites and use
Understanding IPSec & IKEv2 Tunnels
5/6/2024 4:59:27 AM.
Explore the world of IPSec and IKEv2 tunnels, vital for secure internet communication. IPSec acts as a security guard, while IKEv2 establishes VPN tunnels, offering speed, stability, and auto-reconnec
What is VPN Gateway in Alibaba Cloud?
4/29/2024 3:53:00 AM.
Alibaba Cloud VPN Gateway encrypts data transfer between your Virtual Private Cloud (VPC) and on-premises networks or internet clients, offering a secure and cost-effective solution.
Text Encrypt and Decrypt With a Specified Key
4/25/2024 8:05:19 AM.
Encrypting and decrypting text with a specified key involves using cryptographic algorithms to convert plain text into cipher text and vice versa, ensuring data security. The key serves as the paramet
Blazor Server - How To Store Encrypted Session Data In The Browser
4/23/2024 11:17:21 AM.
Learn how to enhance security in your Blazor Server applications by storing encrypted session data in the browser. Explore techniques to safeguard sensitive user information using ASP.NET Core and cli
Alibaba Cloud Security: Ensuring Your Digital Journey's Safety
4/22/2024 4:20:18 AM.
Embark on your cloud adventure with confidence! Explore Alibaba Cloud's comprehensive security solutions for worry-free data protection and a fortified digital landscape. #CloudSecurity #AlibabaCl
A Comprehensive Guide to Secure Coding in C#
4/16/2024 10:56:29 AM.
A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
Alibaba Cloud Security Best Practices for Safeguarding Your Data
4/14/2024 5:24:57 AM.
Secure your data on Alibaba Cloud! Learn best practices for encryption, access control, & threat detection to ensure data security & compliance. #AlibabaCloudSecurity
How To Encrypt And Decrypt In C# Using Simple AES Keys
4/12/2024 11:29:58 AM.
Learn how to encrypt and decrypt data in C# using simple AES keys. AES, a symmetric encryption algorithm, ensures secure communication by encoding and decoding messages.
Security ASP.net Core MVC (C#) Encryption and Decryption
4/9/2024 6:14:18 PM.
On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offe
Implementation of Base64 Encryption/Decryption in Power App
4/5/2024 7:12:00 AM.
Base64 is a method for encoding binary data into text, ensuring data integrity during transmission. Implemented in Power Apps using Power Fx, it's vital for tasks like email (MIME), XML, or JSON d
Save Encrypted Password In Database In ASP.NET
4/3/2024 9:36:57 AM.
In this article, Discover how to enhance security in your ASP.NET application by saving encrypted passwords in the database. Learn the process of encrypting passwords before storing them, ensuring dat
Backup Encryption In SQL Server
3/28/2024 6:36:20 AM.
SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
How To Get Started With Always Encrypted For Beginners - Part One
3/28/2024 6:27:34 AM.
Encryption has always been intriguing to me but seemed like it could be a very complex process to set up. However, SQL Server made it very simple when they introduced Always Encrypted (AE) into SQL Se
How To Get Started With Always Encrypted For Beginners - Part Three
3/28/2024 6:26:32 AM.
Discover advanced techniques in data security with Always Encrypted in Microsoft SQL Server. Part Three of our beginner's guide delves deeper into encryption keys, transparent data encryption, and
PiP - External Streaming Data - Useful Concepts - Part 1
3/27/2024 7:21:34 AM.
To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
How To Secure PII Data In SQL Server Using CLE (Column Level Encryption)
3/6/2024 10:45:53 AM.
PII (personally identifiable information) which is used to identify individual identity such as SSN, DOB, Bank Account Number etc. When you are working with financial application you face the scenario
How To Lock File And Folder Using Command Prompt (CMD) In Windows 10
2/27/2024 11:56:01 AM.
In this article, I have described how to Lock and Unlock any file and folder using the command prompt (Cmd) in windows 10.
Securing Your .NET Projects: Simple Strategies and Real Examples
2/18/2024 4:46:27 AM.
In today's digital world, keeping our software safe from cyber threats is super important. For developers working with .NET projects, it's not just a good idea but really necessary to make sur
Cybersecurity of External Streaming Data - Non-repudiation
2/14/2024 4:13:22 AM.
This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part co
Cybersecurity of External Streaming Data - Confidentiality
2/14/2024 4:02:06 AM.
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pract
Xite Encryption
1/31/2024 10:06:02 AM.
This code provides an easy-to-use encryption and decryption solution in C#. It utilizes RSA cryptography, allowing seamless integration into Visual Studio projects. This class contains methods/functio
Securing Your .NET Applications With Examples
1/20/2024 11:16:24 AM.
In the realm of software development, security remains a paramount concern. This is especially true for .NET applications, which often handle sensitive data and interact with critical systems. By adhe
Building a Secure PHP MySQL Signup/Login Website with Email Verification
1/15/2024 8:48:49 AM.
Creating a secure signup/login system is essential for any web application that involves user authentication. In this article, I'll guide you through building a PHP MySQL login/signup website with
Data Loss Prevention (DLP) in 2024
12/18/2023 11:58:25 AM.
In the ever-evolving landscape of cybersecurity, protecting sensitive data has become a paramount concern for organizations across industries. As we usher in the year 2024, the significance of robust
ASP.NET Core Data Protection API
12/11/2023 6:40:33 AM.
ASP.NET Core Data Protection API. In web applications, ensuring authenticity is pivotal during round trips. This article delves into the Asp.Net Core Data Protection API, discussing its implementation
SSL/TLS Termination in API Gateway Pattern
11/22/2023 4:26:16 AM.
This article would be beneficial for readers seeking to understand the importance of SSL/TLS termination in enhancing API security and performance. It's great that you not only discuss the benefit
TripleDES Encryption and Decryption in C#
10/16/2023 5:35:37 AM.
Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
How To Enable SSL In Visual Studio
10/11/2023 6:24:51 AM.
In this article, you will learn how to enable SSL in Visual Studio.
Introduction To Symmetric Encryption
10/11/2023 5:01:07 AM.
In this article, you will learn about Symetric Engryption.
How to Decrypt data using RSA algorithm in C#?
10/3/2023 6:55:16 AM.
In this article, we have sample code for decrypt an encrypted data with help of RSA Decryption algorithm and .pfx file which contains private key for decryption.
Hill Cipher In C#
9/20/2023 9:38:38 AM.
Hill Cipher is a polygraphic substitution cipher that encrypts and decrypts plaintext into ciphertext and vice versa using matrix operations. It is more secure than traditional Caesar ciphers and subs
Setting Up Azure Blob Storage Encryption
9/13/2023 7:04:25 AM.
Learn how to configure encryption for Azure Blob Storage to enhance data security. Follow these steps to establish encryption using customer-managed keys in Microsoft Azure.
Protecting Data Integrity and Privacy in Testing
9/1/2023 9:30:31 AM.
Data Integrity and Privacy in Testing: Essential for Reliability and Compliance. Explore the significance, best practices, and a real-time example of safeguarding sensitive data during testing.
Securing Azure Functions
8/28/2023 4:18:44 AM.
Enhance Azure Functions Security: Practical Measures for Robust Protection. Discover authentication, sensitive data safeguarding, network defense, code fortification, and more. Strengthen your functio
Working With The Encryption Password Function In MySQL
8/7/2023 11:21:11 AM.
In this article we will explain the password encryption function and how to return a password string from a plain text password in a string.
Encryption of Stored Procedures in SQL Server
7/25/2023 6:06:04 AM.
The encryption of stored procedures in SQL Server is a security feature that enables developers to protect the sensitive business logic implemented within the database. By using the WITH ENCRYPTION op
Rivest Shamir Adleman(RSA) Algorithm and Functions
6/19/2023 7:13:37 AM.
In Java, you can leverage the built-in cryptographic libraries to generate RSA key pairs, encrypt and decrypt messages, and perform digital signatures. This article explores the RSA application and it
Encryption and Decryption in ASP.NET Windows Console Application using C#
5/22/2023 10:09:44 AM.
In this article, I have explained how to encrypt and decrypt the text using the AES Encryption standard. Open Visual Studio, Create a new console application.
Enhancing Security with Microsoft 365 Secure Score
5/18/2023 8:17:29 AM.
By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
GCM mode Encryption and Decryption in ASP.NET Console App
5/15/2023 5:31:44 AM.
In this article, I have explained how to encrypt and decrypt the text using AES Encryption standard using GCM mode.
iOS App Security: Best Practices for Protecting User Data
5/12/2023 6:39:13 AM.
This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jail
Best Practices for SQL Server Backup and Restore Operations
4/28/2023 7:32:18 AM.
Best Practices for SQL Server Backup and Restore Operations
SQL Server Security Best Practices
4/25/2023 12:01:38 PM.
SQL Server Security Best Practices
Encryption - Decryption In JavaScript Like A Student Thought
3/17/2023 8:56:39 AM.
In this article, you will learn about Encryption - Decryption in JavaScript.
AES Encryption In C#
3/15/2023 4:42:38 AM.
AesManaged class is a managed implementation of the AES algorithm. This article demonstrates how to use the AesManaged class to apply the AES algorithm to encrypt and decrypt data in .NET and C#.
Manage Disk Encryption Keys For Azure Virtual Machines
2/28/2023 10:32:56 AM.
In this article, I will guide you to manage disk encryption keys for Azure virtual machine by using azure Key vault, Azure Key Vault for managing encryption keys that can be used for encrypting our da
Deploy And Manage BitLocker On Windows Server
2/27/2023 10:15:35 AM.
In this article, you will learn how to deploy and manage the BitLocker Drive Encryption on windows server,
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
Encryption And Decryption Using A Symmetric Key In C#
1/30/2023 6:21:47 AM.
In this article, we are going to learn how to use the symmetric key for encrypting and decrypting data in C#.
Introduction To Homomorphic Encryption With Microsoft SEAL
12/20/2022 5:05:57 AM.
Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preser
Generate A Strongly Secured Encrypted PDF File Using PDFFileEcrypter
10/19/2022 5:35:48 AM.
The purpose of this article is to present an effective approach for strong encryption of PDF files using a password and a complicated algorithm.
AD Connect Synced Users Restore After On-Prem AD Encryption Or Loss
8/9/2022 9:42:36 PM.
Restore the syncing of AD users to Azure AD from the newly created domain. Note: On-prem requirements are not covered here.
Password Encryption For Forms Authentication in ASP.Net
2/3/2021 10:28:39 AM.
This article explains Forms Authentication and how to generate the encrypted password for Forms Authentication.
Encrypting and Decrypting Cookies in ASP.NET 2.0
2/3/2021 9:18:44 AM.
This article demonstrate how to encode and decode cookies in ASP.NET 2.0
Comparison Of TDEA And Rijndael Advance Encryption Standard (AES)
7/16/2020 5:48:28 AM.
This article covers the description of TDEA Algorithm, considerations for use of TDEA.Algorithm, security for TDEA Algorithm, and recommendations for reducing the risk. It also covers the origin of t
A Beginner's Guide to Cyber Security
5/3/2020 6:56:41 PM.
This article looks at the fundamentals of cybersecurity, including basic terms and terminologies of security, the importance of data, attributes of data. and the CIA triad, confidentiality, integrity,
Azure Encryption at Rest
4/26/2020 3:01:17 PM.
In this article, you will learn about Azure Encryption.
Advanced Encryption Standard (AES) In C#
2/14/2020 9:06:47 AM.
In this article, you will learn about advanced Encryption Standard (AES) in C#.
Working With Cipher Class in Java
9/17/2019 6:42:03 AM.
In this article, we are going to describe crypto graphic data security by using cipher class of java. I describe a Cipher class with its constructor or method details.
Encrypt an Azure Virtual Machine VHD File in 5 Minutes
9/4/2019 1:09:09 AM.
In this video, I will show how you can encrypt an Azure VM (VHD) file manually.
Implement Column Level Encryption/ Decryption In SQL Server 2016
7/8/2019 11:46:05 PM.
This article familiarizes you with implementing column level encryption/decryption in SQL Server 2016.
Data Encryption and Decryption in SQL Server 2008
6/11/2019 4:32:33 AM.
Cryptography can be implemented in the SQL Server. This article explains about the encryption and decryption of data in SQL Server.
Encryption and Decryption Using Cryptool
5/28/2019 9:21:01 AM.
Cryptool is an open-source freeware for encryption. In this article, learn how to encrypt and decrypt using Cryptool.
AES Encryption/Decryption With Angular 7
1/16/2019 10:40:53 PM.
In this article, I am going to explain AES encryption/decryption with Angular 7 so that we can communicate with each other securely via an Angular app.
Overview Of Data Encryption In Azure
11/27/2018 9:33:36 AM.
Microsoft Azure offers a range of data storage solutions, depending on your organisation’s needs, including file, disk, blob, and table storage. Data at rest is any stored data that is kept in persist
Extension Methods for Daily Use
9/11/2018 4:16:56 AM.
Extension Methods allows the programmer to extend the functionality of a type without having to derive from the type.
TripleDES Encryption In C# And .NET Core
9/7/2018 9:20:26 AM.
TripleDesCryptoServiceProvider class provides the functionality of TripleDES algorithm. This article demonstrates how to use TripleDesCryptoServiceProvider class to apply DES algorithm to encrypt and
SSL Certificates in Azure Web Apps
6/4/2018 12:16:37 AM.
This demo is about adding an SSL certificate to a web app service in azure for security purpose.
Azure Virtual Machine Disk Encryption With Azure Key-Vault
1/28/2018 3:12:36 AM.
This article explains how to encrypt Azure VM Disks with the help of Azure Key-Vault. Azure Key-Vault is a key management as a service which provides Hardware-based key management via Hardware Securit