TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Ln
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Mahesh Chand (8)
Sandeep Mishra (7)
Ajay Yadav (5)
Ziggy Rafiq (3)
Anupam Maiti (3)
Kanishk Kumar (2)
Sarthak Varshney (2)
Ajay Kumar (2)
Dhanapal Chandran (2)
Shehan Peruma (2)
Ayush Gupta (1)
Shanuka Maheshwaran (1)
Balaji Thilagar (1)
Jejji Arora (1)
Dhruvin Shah (1)
Harshit Pandey (1)
Mohomed Shihan (1)
Rinki (1)
Arun Ramaswamy (1)
Rion Williams (1)
Jigar Shah (1)
Monica Rathbun (1)
Tuhin Paul (1)
Vijayaragavan S (1)
Ramasagar Pulidindi (1)
Jefferson S. Motta (1)
Abhishek Singhal (1)
Liju Gopalan (1)
Lokesh Varman (1)
Ivan Porta (1)
Rajat Jaiswal (1)
Vijay Kumari (1)
Sagar Lad (1)
Anu Viswan (1)
Ashirwad Satapathi (1)
Veena Sarda (1)
Lalitha Venkatasubramanian (1)
Abhishek Yadav (1)
Ghanashyam Nayak (1)
Vipul Jain (1)
Prabhakar Maurya (1)
Abhishek Mishra (1)
Nirav Gandhi (1)
Bulent Ozkir (1)
Suraj Kumar (1)
S Ravindran (1)
Sam Hobbs (1)
Shivani (1)
Daniel Stefanescu (1)
Vimal Kandasamy (1)
Sateesh Arveti (1)
Mohammad Elsheimy (1)
Srinivas (1)
John Bailo (1)
tylerkline (1)
Matt Watson (1)
John O Donnell (1)
Jasper vd (1)
Related resources for Ln
No resource found
OWASP TOP 10 Security Vulnerability and Remediation
11/13/2024 8:15:54 AM.
This session introduces OWASP's Top 10 vulnerabilities, emphasizing proactive security in web development. Covering each category, it promotes secure coding practices to prevent financial loss and
What is Azure Offensive Security
11/3/2024 4:17:28 AM.
Azure Offensive Security focuses on proactively testing and strengthening the security of Azure environments. It uses tools like Microsoft Defender for Cloud, Azure Sentinel, and Threat Modeling to id
Cross-Site Request Forgery (CSRF) in ASP.NET Core
9/13/2024 9:00:31 AM.
CSRF is a security vulnerability where attackers trick authenticated users into making unintended requests. This ASP.NET Core example demonstrates using anti-forgery tokens to prevent CSRF attacks. It
Threat of public Wi-Fi networks
7/19/2024 6:29:17 AM.
Public Wi-Fi networks, while convenient, pose significant security risks. These networks are often unsecured, making them vulnerable to cyber threats such as data breaches and man-in-the-middle attack
Lambda Functions and High Order Functions in Android kotlin
7/11/2024 4:59:01 PM.
The provided Kotlin examples demonstrate basic and high-order functions. In lambda. kt, a lambda function adds two integers. In HighOrder.kt, a high-order function accepts another function as a parame
The Security Risks Of Using AI
7/3/2024 6:05:07 AM.
Investigate the pervasive security risks associated with deploying AI technologies. Explore vulnerabilities in machine learning algorithms, potential for data breaches, and ethical implications.
Create Repeating Section In PowerApps New Form - Step By Step - Part One
6/12/2024 9:40:57 AM.
This article guides you through creating a Repeating Section in PowerApps forms for New and Edit forms. Learn to store data in SharePoint lists, manage form navigation, and enhance user experience wit
What Are The Node.js Security Best Practices
6/6/2024 7:52:58 AM.
Discover essential Node.js security best practices to safeguard your applications. Learn about authentication, encryption, secure coding, input validation, and more. Protect against common vulnerabili
Migrate to Azure Defender from Qualys Vulnerability Assessment
6/3/2024 4:31:23 AM.
Microsoft Defender for Cloud now uses Defender Vulnerability Management for assessments. The previous Qualys-powered container vulnerability assessment is retired. Transition seamlessly by enabling sc
How to Integrate Solana Blockchain into C#?
5/30/2024 6:05:39 AM.
Learn how to integrate Solana blockchain with C# using Solnet library. Setup development environment, install dependencies, customize homepage, create services, controllers, and views for functionalit
NSX ALB Virtual Services and Vulnerable Web Applications
5/29/2024 5:54:10 AM.
Explore VMware NSX ALB's role in enhancing web application security and performance. This article delves into its key features like load balancing, WAF, and DDoS protection, and explains how virtu
Securing Your Web Applications with WAF and ASGs
5/14/2024 11:26:15 AM.
Learn to fortify web apps with comprehensive security strategies, leveraging WAF and ASGs. Safeguard against cyber threats, implement access control, and ensure network integrity through advanced fire
Protection Against Busting Frame Busting
5/1/2024 11:40:26 AM.
Learn effective techniques to protect against frame busting vulnerabilities on websites. Discover how to implement robust security measures, such as Content Security Policy (CSP), to prevent clickjack
Preventing XSS in AJAX Web Apps: Best Practices & Prevention
4/30/2024 9:30:39 AM.
Explore the risks of XSS (Cross-Site Scripting) in AJAX (Asynchronous JavaScript and XML) interactions. Understand how malicious scripts can exploit client-side vulnerabilities, necessitating robust i
Hands-Free Security Scanning Within .NET Applications
4/26/2024 9:59:18 AM.
I'm sure if you follow any news sources at all, you see countless hacks, breaches, and leaks from various big-name companies which you might assume would be better at protecting your information.
Binary Cracking and Byte Patching With IDA Pro
4/23/2024 8:31:51 AM.
This dissertation explores binary patching techniques using IDA Pro, emphasizing reverse engineering, byte-level manipulation, and assembly code analysis. It covers configuring IDA Pro for patching,
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
ESXi Vulnerability: Understanding the Impact on IXMetro Powerhouse
4/9/2024 5:20:18 AM.
This article explores the ESXiArgs ransomware attack that targeted IXMetro Powerhouse, detailing the vulnerable ESXi versions and the infection pathway exploited through a Service Location Protocol (S
ZeroThreat: The Ultimate Web App and API Security Scanning Tool
4/3/2024 5:10:04 AM.
Identify critical vulnerabilities at 5x speed without any configuration required with world's most intelligent web app & API security scanning platform, ZeroThreat. Avoid pitfalls of 90% manua
SQL Server Vulnerability Assessment
3/28/2024 6:33:00 AM.
SQL Server Vulnerability Assessment (VA) in SQL Server Management Studio 17.4 or later lets SQL Server scan your databases for potential security vulnerabilities and can be run against SQL Server 2012
Managing .NET Solution Files with dotnet sln
3/27/2024 4:52:41 AM.
The .NET Core SDK's dotnet sln tool simplifies managing large .NET projects. Learn its commands for adding, removing, listing projects, and advanced operations, streamlining solution file manageme
Ensuring Secure Coding in C#: Maintaining Security
3/22/2024 10:11:52 AM.
The article on secure coding in C# applications, written by Ziggy Rafiq, is a must-read for developers who want to fortify their applications against potential vulnerabilities and security threats. By
Securing PDF Uploads in MVC: Mitigating PDF Injection and Cross-site Scripting Vulnerabilities
1/15/2024 9:33:29 AM.
PDF Injection, also known as PDF XSS (Cross-site Scripting), can be a serious security vulnerability. To prevent such issues during PDF upload and viewing in an MVC (Model-View-Controller) applicatio
Ln Function from Power Fx Using Power Apps
1/5/2024 6:46:51 AM.
Reading this article, you can learn how to perform Ln function from Power Fx using in Microsoft Power Apps. Also, you will be able to learn Button control, Label control and TextInput control in the P
NuGet for .NET 8
12/27/2023 5:07:35 AM.
Unleash the power of NuGet for .NET 8! This update revolutionizes package management with enhanced security, centralized dependencies, performance boosters like frozen collections, and productivity to
VS 2022 Reveals System.Runtime.CompilerServices.Unsafe Vulnerability
11/15/2023 7:23:46 AM.
The recent version of Visual Studio 2022 revealed a vulnerability in ASP.NET WebForms.while updating Windows on Patch Tuesday and releasing the latest version of Visual Studio 17.8 and .NET 8 LTS, I u
List In Kotlin
9/4/2023 5:49:50 AM.
In this article, we delve into Kotlin's Lists, fundamental in managing collections of items. Learn about Immutable and Mutable Lists, key methods, and their practical use cases.
Easily Find Tags and Values in a Large Xml Document Using XmlTextReader in C#
9/1/2023 4:09:34 AM.
Parsing large XML documents efficiently can be a challenge due to memory constraints. This approach utilizes the XmlTextReader class in C# to extract specific tags and their corresponding values from
Activation Link Vulnerability
8/24/2023 9:15:31 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
How to Maintain Application Security and Prevent Vulnerabilities in C#?
7/12/2023 6:33:15 AM.
This article provides essential best practices for ensuring secure coding in C#. By implementing these practices, developers can maintain the security of their applications and mitigate vulnerabilitie
Vulnerability and Dependency Scanning with Docker Scout
6/19/2023 7:07:56 AM.
Docker Scout provides a unified view of the software supply chain, significantly enhancing visibility and control over security. With its unique ability to break down dependencies layer-by-layer, it n
Hello World in RUST
6/14/2023 10:59:00 AM.
Hello World in Rust: A Journey into Safe and Efficient Systems Programming.
Cross-Site Scripting (XSS) Vulnerabilities
5/25/2023 4:53:10 AM.
n this article, we will explore the concept of XSS vulnerabilities and delve into an example in C# to better understand how such attacks can occur. Understanding XSS is crucial for developers to build
How To Scan For OSS Vulnerabilities Using OWASP Dependency Check In .Net 6.0
4/11/2023 6:19:21 AM.
In this article, you will learn how to do OSS vulnerabilities using OWASP Dependency Check in .Net 6.0.
SQL Tips - A Simple Way To Check Vulnerability Status Of Your SQL Server Database
3/7/2023 4:18:29 AM.
In this article, you will learn about the simple way to check SQL Vulnerability to avoid any issue.
How to get the parent directory in C#?
2/21/2023 11:51:52 PM.
How to get the parent directory of a sub directory in C# and .NET.
Print() and Println() Methods in Java
1/24/2023 11:31:14 AM.
This article explains the print() and println() methods in Java. When using Java println( ), the output is displayed with the cursor in the next line. In case of Java print( ), the output is displayed
Data Engineering And Secure Coding With A Vulnerability Database
4/12/2022 3:16:03 PM.
In this article, you will learn about data engineering and secure coding with a vulnerability database.
Source Generator For INotifyPropertyChanged
9/20/2021 1:14:41 AM.
This article outlines steps for creating a Source Generator for the implementation of INotifyPropertyChanged using Rosyln Compiler API
Web Security Vulnerabilities On User Session And Username Iteration
7/29/2021 1:57:28 PM.
In this article, you will learn about Web Security Vulnerabilities on User Session and Username Iteration.
Web Security Vulnerabilities On Clickjacking And Security HTTP Headers And Information Leakage
7/22/2021 4:51:44 AM.
In this article, you will learn about the common web security vulnerabilities with Remediation Technique.
Web Security Vulnerabilities On SSL/TLS Protocols And Set-Cookie Attributes
7/22/2021 4:36:58 AM.
In this article, you will learn about Web Security Vulnerabilities On SSL/TLS Protocols And Set-Cookie Attributes.
Session Fixation Vulnerability Detection in ASP.Net
4/13/2021 5:54:09 AM.
This article explains session fixation attacks on an ASP.NET website in details by giving a realistic code scenario.
Performing Vulnerability Assessment In Azure DevOps
2/9/2021 1:46:26 PM.
DevOps is a collaboration between the development and the operations teams. This collaboration has led to some fantastic benefits for organizations. DevOps has allowed people and organizations to ship
Convolutions Explained in Python
12/29/2020 10:32:12 AM.
In this video, you will be able to understand convolution operation on an image. You will be seeing edge detection and blurring and how convolutions is used in deep learning.
Methods For Transforming Data To A XML File
11/25/2020 11:45:42 PM.
This articles mentions different ways to tranform data to XML file.
.Net Penetration Testing: Cheat Sheet
11/23/2020 9:30:52 AM.
This article provides a cheat sheet for .Net Penetration Testing.
Matrices In R
11/13/2020 6:13:10 PM.
In this article I am going to demonstrate how to create a matrix and perform various operation on a matrix.
Using Components With Known Vulnerabilities
11/6/2020 8:22:21 PM.
In this article, you will learn how to use components with known vulnerabilities.
Learn About Vulnerability Attributes
11/2/2020 9:57:33 PM.
In this article, you will learn about Vulnerability Attributes.
Common Vulnerability Scoring System - CVSS
11/2/2020 9:54:18 PM.
In this article, you will learn about Common Vulnerability Scoring System – CVSS.
Working with XmlDataDocument Events in ADO.NET
11/2/2020 9:44:23 AM.
In this article I will explain working with XmlDataDocument Events in ADO.NET.
Understanding the DOM Implementation
10/29/2020 5:46:37 AM.
In this article I will explain you about DOM implementation in C# and .NET.
Real World .NET Examples Of Deserialization Vulnerabilities
10/28/2020 7:00:53 PM.
In this article, you will learn about real-world .NET examples of deserialization vulnerabilities.
Vulnerabilities From Botnets To Cybercrime
9/4/2020 7:36:14 AM.
In this article, you will learn about the vulnerabilities of botnets and cybercrime.
XML Read & Update Operations
5/21/2020 1:07:01 AM.
Using this article you can learn how to read each XML node value & how to update that value in the original XML file...
Scan SPFx Code For Vulnerabilities Using SonarCloud In Azure DevOps
5/12/2020 8:23:10 AM.
In this article you will learn how to scan SPFx code for vulnerabilities using SonarCloud in Azure DevOps.
How to Enable Telnet in Windows 8
12/20/2019 2:34:14 AM.
In this article we are going to explain how to enable the Telnet program in Windows 8.
Common Code Smells Mistake In C# - Part Two
8/20/2019 10:19:31 AM.
Code smell is a word given to indicate a deeper problem in our programming code. Here, we will discuss about some of the code smell vulnerabilities that developers commonly face but don't recogniz
SQL Assessment API (Public Preview)
8/6/2019 10:55:07 AM.
Is your SQL Server configuration in line with Microsoft recommended best practices? If you want to know, check this latest video on SQL Assessment API.
Reading XML File using XmlDocument
5/30/2019 5:53:21 AM.
In this article Reading XML File using XmlDocument.
Simple XML Parser in C#
5/7/2019 6:47:55 AM.
This article shows how to create a very simple XML parser.
How to get full path of a file in C#
12/20/2018 3:05:13 AM.
How to get full path of a file using C# and .NET. The FullName property returns just the full path of a file including the file name.
Matrix In R - Naming Column Using colnames() Function And Accessing Matrix Element By Column Name In R
7/30/2018 12:48:33 PM.
In a previous article we have learned how to give the name of row and access element of matrix by name in R. Now we shall discuss and learn how to give a name of matrix column; i.e., naming of matrix
Exploiting Windows Server Reverse Shell
12/4/2014 10:59:07 PM.
This article demystifies the remote shell accesses by exploitation of unpatched Windows 2003 Server vulnerabilities and taking complete control over the target remote computers, which is in fact, a complex and difficult undertaking.
Vulnerable Encoded URLs
11/24/2014 2:15:01 AM.
In this article, we have pinpointed the vulnerability in query string parameters while encoding them by practicing weak cryptography methods where the data is sent across the network in clear text and is susceptible to MITM attack.
OWASP Top 10 Vulnerabilities
6/26/2013 12:11:36 AM.
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.
Simple XML Parser in VB.NET
12/1/2012 2:02:12 AM.
This article shows how to create a very simple XML parser.
Visual Studio 2010 Project Targets
11/21/2012 3:49:25 AM.
This article provides a very simple sample of targets in a Visual Studio 2010 project file.
.NET Beta 2 and Navigation in XML Documents
9/29/2012 6:27:36 AM.
.NET Beta 2 was released yesterday at tech-ed, 2001, Atlanta. Many things have been changed in Beta 2 since Beta 1. In this article, I'll cover changes in XmlNavigator class replaced with XPathNavigator.
Mobile Fun with XML
9/29/2012 4:53:11 AM.
Here is something really wonderful in Mobile field .This example is for authenticating the Mobile Users against his settings stored in XML file. This is really good where all the ease of XML is applied. Function open the XML file and particular node data validate it against user inputs and do the specified.
Performance Comparison of XslTransform Inputs
5/20/2012 7:30:35 AM.
To transform XML into HTML for use on a Web site or to transform it into a document that contains only the fields required you could use the XSLTransform class (found in the System.Xml.Xsl namespace).
Reading and Wtiting XML Documents
5/20/2012 7:12:44 AM.
In this article you will see how to read and write XML documents using XML API available in .NET Framework class library.
Xml - A Simple Database
5/20/2012 6:34:11 AM.
Xml can be used for different purposes. But in my programming life, I used it as database alone. I feel very comfortable while using xml as data store for my application, due to its simple structure.
XML Navigation using C#
5/20/2012 2:37:34 AM.
This article demonstrates how to navigate through XML documents using C#.
Reading XML Documents using C#
5/20/2012 2:03:09 AM.
In this article I will explain you how to read an XML document in C#.
Focus on New ASP.NET Vulnerability
9/21/2010 12:59:52 AM.
A new ASP.NET Vulnerability is released by Microsoft. The security hole will allow the attacker to decrypt the ViewState data or retrieve the contents of web.config. We will see the workaround for this issue.
LINQ Deferred Execution
10/4/2009 2:30:14 PM.
In this article we will see how LINQ defers the execution of the query till you request the results. Plus, learn how to execute the query immediately.
Calender Control in an ASP.NET 2.0 GridView Control
5/10/2009 11:35:20 AM.
The code attached in this article shows how to integrate a Calender control in the GridView control using ASP.NET 2.0.
Multithreaded XML Document for Read/Write Access
1/27/2006 5:58:00 AM.
This article describes a process for using a ThreadPool within a windows service that monitors other services. It also shows how to allow multithreaded read/write access to an XmlDocument, that acts as persistent storage, using a Mutex.
Telnet Scripting in C#
12/26/2005 6:45:22 AM.
This library, written in C#, expands on some telnet code from various other sources, presenting the caller with a number of functions handy for scripting telnet sessions (i.e. SendMessage, SendAndWait, WaitAndSend, WaitFor).
Mail Checker 1.0
12/26/2005 6:43:28 AM.
In this article, author shows how to create a program to check your IMAP mail.
Creating Graphics with XML
12/26/2005 5:46:26 AM.
This article shows how to create images on the fly and uses XML to specify the properties of the images.
Sokoban Pro Game in C#
12/24/2005 6:20:33 AM.
Sokoban Pro is a modern version of the classic Sokoban puzzle game. The game rules are extremely simple, yet the game is very challenging and addictive. The rule of the game is to move all the boxes in the right places. You can only push a box, not pull.