TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Protect
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sandeep Mishra (5)
Arun Choudhary (5)
Sarthak Varshney (4)
Kaveendra Dhilhan (3)
Shanuka Maheshwaran (3)
Tuhin Paul (3)
Shilpa Tanwar (2)
Vinay Ayinapurapu (2)
Ajay Kumar (2)
Arun Ramaswamy (2)
C# Curator (2)
Onkar Sharma (2)
Mohamed Shifan (2)
Shubham Srivastava (2)
Raveena Attri (1)
Mayooran Navamany (1)
Subarta Ray (1)
Pranshu Singhal (1)
Allen Oneill (1)
Federico Dimarco (1)
Amit Mohanty (1)
Saravanan Ponnusamy (1)
Jochen Bartlau (1)
Subham Ray (1)
Balaji Thilagar (1)
Abhishek Dhoriya (1)
Vijay Yadav (1)
Jefferson S. Motta (1)
Abhishek Jaiswal (1)
Tahir Ansari (1)
Nikunj Satasiya (1)
Douglas Wagner (1)
Aman Gupta (1)
Chetan Sanghani (1)
Kanishk Kumar (1)
Gajendra Jangid (1)
Ramakrishna Basagalla (1)
Jitendra Mesavaniya (1)
Ayush Gupta (1)
Vithal Wadje (1)
Babita (1)
Janarthanan Selvaraj (1)
Munesh Sharma (1)
Kaviya Balasubramanian (1)
Baibhav Kumar (1)
Abdul Basith (1)
Ajay Yadav (1)
Nilesh Jadav (1)
Monica Rathbun (1)
Ziggy Rafiq (1)
Gourav Jain (1)
Nitesh Jha (1)
Aman Singhal (1)
Alagunila Meganathan (1)
Shubhankar Banerjee (1)
Gowtham K (1)
Kirtesh Shah (1)
Aravind Govindaraj (1)
Keyur (1)
Shaishav Desai (1)
Raj Bhatt (1)
Abhishek Tiwari (1)
Sachin Kalia (1)
Jay Krishnareddy (1)
Munib Butt (1)
Mahesh Chand (1)
Anupam Maiti (1)
Divyang Desai (1)
Jaymin Dangi (1)
Prabhakar Maurya (1)
Satya Prakash (1)
Viknaraj Manogararajah (1)
John Morehouse (1)
Radhakrishnan Govindan (1)
Faisal Pathan (1)
Related resources for Protect
No resource found
Protect Your Data in S3: Enable Versioning for Extra Security
12/20/2024 8:27:48 AM.
Learn how to enable versioning in Amazon S3 to enhance data protection. This guide walks you through the steps to activate versioning, recover deleted or overwritten files, and safeguard against accid
Sensitivity Labels in Teams 365 Groups and SharePoint Sites
12/18/2024 5:24:37 AM.
Extending sensitivity labels to Microsoft Teams, Microsoft 365 groups and SharePoint sites enhances data protection and compliance across collaboration platforms. It ensures that sensitive information
Understanding Access Modifiers in C#
12/17/2024 5:16:32 AM.
Access modifiers in C# control the visibility and access of class members such as fields, properties, methods, and classes. They enforce encapsulation by defining who can access what within a class, d
AES Encryption in C# Protecting Sensitive Information
12/12/2024 11:37:37 AM.
Discover how to effectively implement AES encryption in C# to secure sensitive data in real-world applications, enhancing data privacy and security.
How to Hide Files on Windows?
11/29/2024 5:30:33 AM.
Learn how to hide files on Windows to protect your data and maintain privacy. This guide covers simple steps to conceal files or folders using built-in Windows features like File Explorer and hidden a
Data Quality, Security, and Building Trust in AI
11/15/2024 5:14:14 AM.
As AI adoption grows, data quality, security, privacy, and trust are becoming critical. Organizations must prioritize data cleansing, validation, encryption, and access controls to ensure reliable AI
Understanding Alibaba Cloud's Anti-DDoS Solutions for Security
11/13/2024 5:19:56 AM.
Learn how Alibaba Cloud's Anti-DDoS solutions protect businesses from DDoS attacks, ensuring continuous online service availability and security.
Fededim.Extensions: ASP.NET Data Protection Integration
11/5/2024 9:59:16 AM.
Fededim.Extensions.Configuration.Protected.DataProtectionAPI enables seamless integration between ASP.NET Configuration and the Data Protection API, providing enhanced security for sensitive data in a
Securing Remote Access to SQL Server
10/30/2024 5:39:48 AM.
Securing remote access to SQL Server is paramount for data protection and compliance. Explore methods like VPNs, firewalls, encryption, and multi-factor authentication for enhanced security and protec
Protected Routes in React.js
10/27/2024 5:37:13 AM.
This approach is essential for apps with private content, ensuring unauthorized users can't view certain pages. By using React Router with authentication checks, developers can manage access dynam
Gitea - an Open Source, Self Hosted GitHub Alternative
10/16/2024 4:51:49 AM.
Gitea is a lightweight, self-hosted Git server that offers features similar to GitHub, including issue tracking, pull requests, and a web-based interface. It's ideal for organizations needing data
Why Choose Azure Firewall for Network Security
10/7/2024 11:35:51 AM.
Discover the benefits of Azure Firewall for enhancing network security in your organization. This robust cloud-based solution offers advanced threat protection, application filtering, and traffic cont
What is SaaS Security? Why SaaS Security is important in 2025
10/7/2024 5:56:34 AM.
SaaS Security refers to the measures and protocols designed to protect data, applications, and infrastructures in Software as a Service environments. As businesses increasingly rely on cloud solutions
Cross-Site Request Forgery (CSRF) in ASP.NET Core
9/13/2024 9:00:31 AM.
CSRF is a security vulnerability where attackers trick authenticated users into making unintended requests. This ASP.NET Core example demonstrates using anti-forgery tokens to prevent CSRF attacks. It
Transparency and Control in Consumer Data Use
8/22/2024 7:04:54 AM.
Learn how your data is collected, used, and protected while gaining insights into your rights and the steps you can take to safeguard your privacy. Empower yourself with knowledge for better data secu
Understanding Access Modifiers in .NET Core
8/13/2024 5:25:10 AM.
Access modifiers in .NET Core control the visibility and accessibility of classes, methods, and variables. They include Public, Private, Protected, Internal, Protected Internal, and Private Protected.
Handling Authentication and Authorization in Next.js
8/7/2024 6:17:20 AM.
Authentication and authorization are crucial for securing web applications. Next.js offers several strategies and libraries to manage user authentication and authorization effectively. This guide cove
Learn to protect your PC connected with IPv6
8/2/2024 7:54:09 AM.
Discover essential strategies for safeguarding your PC in an IPv6-connected environment. Learn about common IPv6 threats, best practices for securing your network, and tools to enhance your computer’s
Cloud Security For Windows Azure
8/2/2024 5:04:22 AM.
In this article, we will learn about key aspects like data encryption, threat detection, identity management, and compliance to protect your resources and maintain robust cloud security.
Guide to Angular Guards
7/29/2024 8:34:55 AM.
Learn everything about Angular Guards in this comprehensive guide. Understand how to implement CanActivate, CanActivateChild, CanDeactivate, Resolve, and CanLoad guards to secure your Angular applicat
How To Implement Azure DDoS Protection Plan For Virtual Networks
7/29/2024 5:45:19 AM.
Azure Virtual Network's DDoS Protection Standard safeguards against network-layer attacks like SYN and UDP floods. It includes real-time monitoring and alerting. To implement, sign into Azure Port
Encrypting and Decrypting Files using .NET Core
7/28/2024 1:06:15 PM.
Learn how to implement AES encryption and decryption in .NET Core with a detailed guide. Secure your sensitive data using systematic file encryption techniques. This comprehensive tutorial will equip
The Evolution of Cyber Threats and How to Stay Protected
7/26/2024 6:03:19 AM.
As cyber threats evolve, from simple viruses to sophisticated ransomware and advanced persistent threats (APTs), staying protected is crucial. Key measures include using strong, unique passwords, enab
How to Implement Role-Based Access Control in Next.js?
7/24/2024 9:39:14 AM.
Implement Role-Based Access Control (RBAC) in a Next.js app to manage user permissions and restrict access based on roles. Define roles in your database, assign them during registration, and use Highe
Singleton Design Pattern: Detailed Explanation and Practical Examples
7/24/2024 6:52:58 AM.
The Singleton Design Pattern ensures a class has only one instance and provides global access to it. Implementations include Basic Singleton, Thread-Safe Singleton with synchronization, Double-Checked
Security Best Practices in ADO.NET
7/23/2024 3:51:46 AM.
ADO.NET is a powerful data access technology in the .NET framework, enabling developers to interact with databases. This article explores best practices for protecting sensitive data, preventing SQL i
Applying SharePoint Online Site Classification using PowerShell
7/22/2024 2:21:57 AM.
Applying SharePoint Online Site Classification using PowerShell" guides administrators in leveraging PowerShell to efficiently manage site classifications within SharePoint Online.
How to Get Sensitivity Labels from M365 Compliance Center
7/15/2024 4:05:36 PM.
Learn how to efficiently retrieve sensitivity labels from the M365 Compliance Center. Explore the step-by-step process of accessing and managing sensitivity labels within Microsoft 365, ensuring robus
How Virtualization Simplifies and Speeds Up Disaster Recovery
7/15/2024 8:35:09 AM.
Virtualization transforms disaster recovery by simplifying processes and accelerating recovery times. It enables seamless backups, efficient data protection, and swift system restoration, minimizing d
Learn Importance of Cloud Security
7/5/2024 5:38:03 AM.
Cloud security is crucial in today's digital age as it protects data, applications, and services in cloud environments. It involves measures like encryption, multi-factor authentication, and threa
Transparent Data Encryption (TDE) in SQL Server
7/1/2024 7:04:40 AM.
Transparent Data Encryption (TDE) in SQL Server encrypts data at rest, ensuring database and log file protection against unauthorized access. TDE uses a database encryption key (DEK), secured by a cer
Accessing Azure Key Vaults Using Certification
6/20/2024 10:11:26 AM.
Learn to secure Azure Key Vaults using self-signed certificates and Azure AD Apps. This approach avoids storing sensitive information in config files, enhancing security. Follow steps to create, regis
Cyber Security vs. Cloud Security
6/11/2024 12:17:44 PM.
Explore the distinctions between Cyber Security and Cloud Security through real-world examples. Cyber Security focuses on safeguarding networks, systems, and data from digital threats, while Cloud Sec
Get to know about Microsoft Defender for Office 365
6/5/2024 4:21:29 AM.
Microsoft Defender XDR, advanced threat protection suite within Microsoft 365 Defender. Focus on Microsoft Defender for Office 365, offering robust email security through features like Exchange Online
Introducing HybridCache The Future of .NET Caching
6/4/2024 6:00:05 AM.
HybridCache bridges gaps in .NET's IDistributedCache and IMemoryCache, introducing advanced capabilities like stampede protection and configurable serialization. It simplifies caching with a unifi
Content Delivery Network (CDN): A Comprehensive Overview
6/2/2024 10:40:27 AM.
A Content Delivery Network (CDN) is a system of distributed servers that deliver web content to users based on their geographic location. CDNs improve website performance by caching content, reducing
Password-Protected PDF File Using ASP.Net C#
5/31/2024 9:56:31 AM.
Learn how to enhance document security by creating password-protected PDF files using ASP.NET C#. Explore encryption techniques with libraries like iTextSharp to ensure data confidentiality. Safeguard
NSX ALB Virtual Services and Vulnerable Web Applications
5/29/2024 5:54:10 AM.
Explore VMware NSX ALB's role in enhancing web application security and performance. This article delves into its key features like load balancing, WAF, and DDoS protection, and explains how virtu
Tackling Security with the Sticky Bit
5/22/2024 10:59:23 AM.
Tackling Security with the Sticky Bit" delves into the pivotal role of the sticky bit in Linux file permissions. Explore how it enhances directory security by restricting deletion to file owners,
ShieldAI - Azure Powered Content Safety for Protected Material Detection
5/16/2024 9:20:55 AM.
ShieldAI leverages Microsoft Azure's robust AI capabilities to ensure comprehensive content safety and protected material detection. This advanced system provides real-time monitoring and automate
Securing Your Web Applications with WAF and ASGs
5/14/2024 11:26:15 AM.
Learn to fortify web apps with comprehensive security strategies, leveraging WAF and ASGs. Safeguard against cyber threats, implement access control, and ensure network integrity through advanced fire
How Secure Sockets Layer (SSL) Protects Data Online?
5/7/2024 5:53:30 AM.
Learn how SSL works in a step-by-step guide for beginners and professionals, ensuring secure internet communication and data protection.
Password Protection Using Code in Windows Forms
5/3/2024 9:01:09 AM.
Learn how to implement robust password protection in Windows Forms using C# code. This tutorial covers creating a secure login form in Visual Studio, handling user authentication, and validating passw
Create Secure Store Application In SharePoint O365
5/2/2024 9:51:15 AM.
Learn how to enhance security in SharePoint Online (O365) by creating a secure store application. Explore secure credential management, authentication, and integration with Azure Active Directory for
Protection Against Clickjacking
5/1/2024 11:40:40 AM.
Protection against clickjacking involves implementing measures like frame-busting scripts, X-Frame-Options HTTP header, and Content Security Policy to prevent malicious actors from hijacking clicks on
Protection Against Busting Frame Busting
5/1/2024 11:40:26 AM.
Learn effective techniques to protect against frame busting vulnerabilities on websites. Discover how to implement robust security measures, such as Content Security Policy (CSP), to prevent clickjack
What is Friend Function in C++
4/30/2024 5:50:49 AM.
Data hiding is a core principle in object-oriented programming, but C++ introduces friend functions that defy this rule, enabling access to private and protected class members from outside.
Microsoft Defender for Endpoint (MDE), Common Actions
4/23/2024 11:18:53 AM.
This article provides concise instructions for managing antivirus software on Windows and Linux Azure Virtual Machines using Microsoft Defender for Cloud. It covers tasks such as checking protection s
Applied Reverse Engineering With OllyDbg
4/23/2024 8:25:53 AM.
This paper explores executable cracking using OllyDbg, focusing on reverse engineering without source code. It emphasizes Assembly Programming and tools like OllyDbg and CFF Explorer. Methods include
Azure File Share Snapshot And Implementation
4/15/2024 9:34:25 AM.
Azure File Share Snapshot provides point-in-time backups for file shares in Azure Storage, enabling data protection and recovery. Snapshots capture the state of files at specific moments, offering pea
Save Encrypted Password In Database In ASP.NET
4/3/2024 9:36:57 AM.
In this article, Discover how to enhance security in your ASP.NET application by saving encrypted passwords in the database. Learn the process of encrypting passwords before storing them, ensuring dat
What Are Access Modifiers In C#
3/29/2024 6:45:30 AM.
Access modifiers in C# regulate the accessibility of class members, impacting encapsulation and object-oriented principles. They control the visibility and accessibility of members within classes and
Backup Encryption In SQL Server
3/28/2024 6:36:20 AM.
SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
Secure Coding in C# - Protecting Applications and User Data
3/20/2024 4:27:46 PM.
Protecting applications and user data is crucial in today's digital age. Secure coding practices play a vital role in ensuring the security of the code written in C# on the Microsoft.net Framework
Securing Your Cloud Infrastructure with Azure DDoS Protection: Strategies and Examples
3/8/2024 1:28:49 PM.
This article would talk about securing your cloud infrastructure with Azure DDOS protection with strategies, steps, and examples
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
Windows Defender in Windows 8 Includes MSE
2/27/2024 10:38:20 AM.
This article explains how Windows Defender in Windows 8 integrates Microsoft Security Essentials (MSE) to provide comprehensive virus protection.
How To Enable Delete Confirmation Dialog In Windows 10
2/22/2024 11:33:54 AM.
To enable the delete confirmation dialog in Windows 10, access "Recycle Bin Properties" by right-clicking the Recycle Bin icon. Check "Display delete confirmation dialog" to ensure
Device Endpoint Protection settings configuration in Microsoft Intune
1/17/2024 6:20:33 AM.
Steps to create configuration profile of Endpoint protection in Microsoft Intune.
Protecting Your Web Application From Session Replay Attacks In Azure Cloud
1/15/2024 4:41:58 AM.
In today's world of increasing digital interconnectedness, online security threats are continuously increasing, and cybercriminals are finding new and innovative ways to exploit system vulnerabili
How to Create a Logic App to Protect the PDF with Password
1/3/2024 10:53:35 AM.
In this article, we are going to learn about How to create a Logic App to Protect the PDF with a Password and how to create an Azure Logic App that automatically protects PDF files with passwords and
What are Solidity Modifiers and How do they boost the security of Smart Contracts?
12/28/2023 5:42:54 AM.
Explore the power of Solidity modifiers! From basic syntax to advanced implementations, learn how these tools enhance security, reusability, and efficiency in smart contract development.
NCache Security: A Comprehensive Approach to Protecting Your Cached Data
12/13/2023 5:09:35 AM.
From this article, you will learn a comprehensive approach to protecting your cached data. In the realm of distributed caching, safeguarding cache nodes is crucial for protecting data and infrastructu
ASP.NET Core Data Protection API
12/11/2023 6:40:33 AM.
ASP.NET Core Data Protection API. In web applications, ensuring authenticity is pivotal during round trips. This article delves into the Asp.Net Core Data Protection API, discussing its implementation
OpenID Connect and OAuth 2.0 Cognizance
11/1/2023 7:37:02 AM.
An overview of OpenConnect and OAuth and its usage in the digital world. It introduces a standardized method for verifying user identities, allowing users to authenticate across different sites or app
Networking Components in Microsoft Azure
10/22/2023 7:29:22 AM.
In this article, we delve into the world of networking within Microsoft Azure. Networking is a vital component of any cloud solution, facilitating communication between resources and users. Azure boas
Encapsulation in C#: Understanding and Implementing Data Protection
10/3/2023 8:44:36 AM.
In this article, we'll explore the significance of encapsulation in C# and demonstrate its implementation with practical examples.
Protecting Data Integrity and Privacy in Testing
9/1/2023 9:30:31 AM.
Data Integrity and Privacy in Testing: Essential for Reliability and Compliance. Explore the significance, best practices, and a real-time example of safeguarding sensitive data during testing.
Access Modifiers in C#
7/5/2023 11:03:28 AM.
Access Modifiers in C#
iOS App Security: Best Practices for Protecting User Data
5/12/2023 6:39:13 AM.
This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jail
8 Ways to Protect Excel Files in Java
4/21/2023 9:10:39 AM.
Microsoft Excel also offers users many other ways to protect Excel files. This article will introduce 8 ways to protect Excel files using Java.
Anonymization Techniques for Data Protection and Privacy
3/20/2023 10:30:57 AM.
An anonymizer is a tool or service that is used to anonymize data by removing or obfuscating identifying information from a dataset, while still allowing the data to be analyzed or used for research p
Deploy And Manage BitLocker On Windows Server
2/27/2023 10:15:35 AM.
In this article, you will learn how to deploy and manage the BitLocker Drive Encryption on windows server,
Exploring The Benefits And Limitations Of Data Anonymization - Use Cases And Considerations For Protecting Privacy
2/17/2023 10:37:15 AM.
In this article, you will learn about exploring the benefits and limitations of Data Anonymization - Use Cases and Considerations for Protecting Privacy.
How To Deploy And Configure Exploit Protection In Windows Server 2022
2/6/2023 11:31:59 AM.
How to deploy exploit protection to your environment, exploit protection helps protect devices from malware that use exploits to spread and infect. You can enable exploit protection on an individual
Few Ways to Prevent Instantiation of Class
11/17/2022 9:05:34 AM.
Let’s go with very interesting facts about oops. There are few ways Stop Instantiation of class.
How To Backup Virtual Machines By Using Azure Portal
11/1/2022 5:25:56 AM.
In this article, you will learn how to backup virtual machines by using azure portal.
Use Dynamic Data Masking To Protect Sensitive Data In Azure SQL Database
9/1/2021 11:07:42 AM.
In this article, you will learn how to use dynamic data masking to protect sensitive data in Azure SQL database.
Creating A .NET 5 Client To Call An API Protected By Certificates
7/15/2021 1:00:13 PM.
In this article, you will learn how to create a .NET 5 client to call an API protected by certificates.
Top 10 Tips To Protect From Online Hacking
1/10/2021 7:55:59 PM.
Cybercrimes are on the rise. There are over 1 million cyber attacks are initiated each day. To protect yourself, your family, and your business, there are certain precautions you can take that will mo
Protecting JavaScript Code
11/28/2020 11:57:54 AM.
In this article, you will learn about protecting JavaScript code.
Web Protection Library (WPL)
9/12/2020 11:28:05 AM.
In this article, you will learn about Web Protection Library (WPL).
Protect APIs With Security Headers Using Azure API Management Policies
8/24/2020 8:41:55 AM.
In this article, you will learn about how to protect APIs with Security Headers using Azure API Management Policies.
SQL Injection Protection Methods
8/18/2020 7:39:54 AM.
In this article, you will learn about SQL Injection Protection Methods.
Cryptojacking - How To Protect Yourself
6/5/2020 1:45:47 AM.
Cryptojacking is a technique that employs unauthorized use of devices for cryptocurrency mining by site owners or cybercriminals. In this article, we'll go through what cryptojacking is and how yo
Overview Of IoT Security Risks Associated With The Healthcare Industry
4/8/2020 2:51:27 AM.
In this article, you will learn about Healthcare IoT Security Risks and Protection Mechanisms.
How To Protect Files And Folders In Windows 10
3/11/2020 11:26:46 AM.
In this tutorial, I have discussed how to create a protection on file and folder in Windows 10.
How to Create Protection on Folder in Windows 8
12/16/2019 3:38:29 AM.
In this article we are going to explain how to create protection of file and folder in Windows 8.
Protect Portable Storage With BitLocker in Windows 8
12/13/2019 12:22:11 AM.
This article describes protection of Portable Storage with BitLocker To Go in Windows 8.
Disable Password Protect the Screen Saver in Windows 8
12/12/2019 11:38:55 PM.
This article describes how to disable password protection by the screen saver in Windows 8.
Turn Off System Restore in Windows 8
12/8/2019 11:16:04 PM.
This article describe about How to Turn Off System Restore in Windows 8.
Update Virus Protection and Windows Defender in Windows 8
12/5/2019 10:31:02 PM.
This article explains how to update Virus Protection and Windows Defender in Windows 8.
Use of Windows Defender to Protect Windows 8 PC From Viruses
12/5/2019 12:00:41 AM.
This article explains how to protect Windows 8 PCs against viruses.
Enable Password Protect the Screen Saver in Windows 8
12/4/2019 4:16:28 AM.
In this article I will describe how to enable password protection by the Screen Saver.
Disable Drive Accessibility in Windows 8
12/4/2019 12:50:49 AM.
In this article we will describe how to protect your local computer drive in Windows 8 from unauthorized access.
How to Turn on System Protection in Windows 8
12/1/2019 11:44:54 PM.
System Protection can really be a necessary and important feature that constantly saves information regarding your computer’s system settings and files.
How to Protect an Azure Storage Account using Shared Access Signatures
11/14/2019 6:39:26 PM.
How to protect an Azure storage account using a Shared Access Signature.
Protecting Your Data At Conferences
10/29/2019 7:17:03 AM.
In this article, learn how to protect your data at conferences.
How Exchange Hybrid Mail Flow Works | Exchange Online Protection (EOP) | Exchange Hybrid
9/24/2019 1:16:41 AM.
In this video, we are going to see how the mail flow works when you have Exchange Hybrid Environment.
Protecting Routes With Auth Guard In Angular 7
7/19/2019 10:05:43 AM.
We will learn about protecting our routes with Auth Guard in Angular 7.