TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About protection
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sandeep Mishra (4)
Allen Oneill (3)
Sarthak Varshney (3)
Shanuka Maheshwaran (3)
Vinay Ayinapurapu (2)
Ajay Kumar (2)
Kaveendra Dhilhan (2)
Arun Ramaswamy (2)
Ajay Yadav (2)
Onkar Sharma (2)
Mohamed Shifan (2)
Arun Choudhary (2)
Sateesh Arveti (2)
Federico Dimarco (1)
Amit Mohanty (1)
Jochen Bartlau (1)
Subham Ray (1)
Balaji Thilagar (1)
Abhishek Dhoriya (1)
Jefferson S. Motta (1)
Abhishek Jaiswal (1)
Tahir Ansari (1)
Nikunj Satasiya (1)
Shilpa Tanwar (1)
Chetan Sanghani (1)
Kanishk Kumar (1)
Gajendra Jangid (1)
Ramakrishna Basagalla (1)
Jitendra Mesavaniya (1)
Ayush Gupta (1)
Babita (1)
Munesh Sharma (1)
Kaviya Balasubramanian (1)
Abdul Basith (1)
Nilesh Jadav (1)
Monica Rathbun (1)
Gourav Jain (1)
Nitesh Jha (1)
Aman Singhal (1)
Shubhankar Banerjee (1)
Kirtesh Shah (1)
Keyur (1)
Tuhin Paul (1)
Jaymin Dangi (1)
Prabhakar Maurya (1)
Shubham Srivastava (1)
John Morehouse (1)
Radhakrishnan Govindan (1)
Elavarasan R (1)
Nithya Mathan (1)
Suketu Nayak (1)
Ramesh Kartik (1)
manish Mehta (1)
Vulpes (1)
Dmitiriy Salko (1)
Related resources for protection
No resource found
Data Quality, Security, and Building Trust in AI
11/15/2024 5:14:14 AM.
As AI adoption grows, data quality, security, privacy, and trust are becoming critical. Organizations must prioritize data cleansing, validation, encryption, and access controls to ensure reliable AI
Understanding Alibaba Cloud's Anti-DDoS Solutions for Security
11/13/2024 5:19:56 AM.
Learn how Alibaba Cloud's Anti-DDoS solutions protect businesses from DDoS attacks, ensuring continuous online service availability and security.
Fededim.Extensions: ASP.NET Data Protection Integration
11/5/2024 9:59:16 AM.
Fededim.Extensions.Configuration.Protected.DataProtectionAPI enables seamless integration between ASP.NET Configuration and the Data Protection API, providing enhanced security for sensitive data in a
Securing Remote Access to SQL Server
10/30/2024 5:39:48 AM.
Securing remote access to SQL Server is paramount for data protection and compliance. Explore methods like VPNs, firewalls, encryption, and multi-factor authentication for enhanced security and protec
Gitea - an Open Source, Self Hosted GitHub Alternative
10/16/2024 4:51:49 AM.
Gitea is a lightweight, self-hosted Git server that offers features similar to GitHub, including issue tracking, pull requests, and a web-based interface. It's ideal for organizations needing data
Why Choose Azure Firewall for Network Security
10/7/2024 11:35:51 AM.
Discover the benefits of Azure Firewall for enhancing network security in your organization. This robust cloud-based solution offers advanced threat protection, application filtering, and traffic cont
What is SaaS Security? Why SaaS Security is important in 2025
10/7/2024 5:56:34 AM.
SaaS Security refers to the measures and protocols designed to protect data, applications, and infrastructures in Software as a Service environments. As businesses increasingly rely on cloud solutions
Cross-Site Request Forgery (CSRF) in ASP.NET Core
9/13/2024 9:00:31 AM.
CSRF is a security vulnerability where attackers trick authenticated users into making unintended requests. This ASP.NET Core example demonstrates using anti-forgery tokens to prevent CSRF attacks. It
Transparency and Control in Consumer Data Use
8/22/2024 7:04:54 AM.
Learn how your data is collected, used, and protected while gaining insights into your rights and the steps you can take to safeguard your privacy. Empower yourself with knowledge for better data secu
Learn to protect your PC connected with IPv6
8/2/2024 7:54:09 AM.
Discover essential strategies for safeguarding your PC in an IPv6-connected environment. Learn about common IPv6 threats, best practices for securing your network, and tools to enhance your computer’s
Cloud Security For Windows Azure
8/2/2024 5:04:22 AM.
In this article, we will learn about key aspects like data encryption, threat detection, identity management, and compliance to protect your resources and maintain robust cloud security.
Guide to Angular Guards
7/29/2024 8:34:55 AM.
Learn everything about Angular Guards in this comprehensive guide. Understand how to implement CanActivate, CanActivateChild, CanDeactivate, Resolve, and CanLoad guards to secure your Angular applicat
How To Implement Azure DDoS Protection Plan For Virtual Networks
7/29/2024 5:45:19 AM.
Azure Virtual Network's DDoS Protection Standard safeguards against network-layer attacks like SYN and UDP floods. It includes real-time monitoring and alerting. To implement, sign into Azure Port
Encrypting and Decrypting Files using .NET Core
7/28/2024 1:06:15 PM.
Learn how to implement AES encryption and decryption in .NET Core with a detailed guide. Secure your sensitive data using systematic file encryption techniques. This comprehensive tutorial will equip
How to Implement Role-Based Access Control in Next.js?
7/24/2024 9:39:14 AM.
Implement Role-Based Access Control (RBAC) in a Next.js app to manage user permissions and restrict access based on roles. Define roles in your database, assign them during registration, and use Highe
Security Best Practices in ADO.NET
7/23/2024 3:51:46 AM.
ADO.NET is a powerful data access technology in the .NET framework, enabling developers to interact with databases. This article explores best practices for protecting sensitive data, preventing SQL i
Applying SharePoint Online Site Classification using PowerShell
7/22/2024 2:21:57 AM.
Applying SharePoint Online Site Classification using PowerShell" guides administrators in leveraging PowerShell to efficiently manage site classifications within SharePoint Online.
How to Get Sensitivity Labels from M365 Compliance Center
7/15/2024 4:05:36 PM.
Learn how to efficiently retrieve sensitivity labels from the M365 Compliance Center. Explore the step-by-step process of accessing and managing sensitivity labels within Microsoft 365, ensuring robus
How Virtualization Simplifies and Speeds Up Disaster Recovery
7/15/2024 8:35:09 AM.
Virtualization transforms disaster recovery by simplifying processes and accelerating recovery times. It enables seamless backups, efficient data protection, and swift system restoration, minimizing d
Learn Importance of Cloud Security
7/5/2024 5:38:03 AM.
Cloud security is crucial in today's digital age as it protects data, applications, and services in cloud environments. It involves measures like encryption, multi-factor authentication, and threa
Transparent Data Encryption (TDE) in SQL Server
7/1/2024 7:04:40 AM.
Transparent Data Encryption (TDE) in SQL Server encrypts data at rest, ensuring database and log file protection against unauthorized access. TDE uses a database encryption key (DEK), secured by a cer
Accessing Azure Key Vaults Using Certification
6/20/2024 10:11:26 AM.
Learn to secure Azure Key Vaults using self-signed certificates and Azure AD Apps. This approach avoids storing sensitive information in config files, enhancing security. Follow steps to create, regis
Cyber Security vs. Cloud Security
6/11/2024 12:17:44 PM.
Explore the distinctions between Cyber Security and Cloud Security through real-world examples. Cyber Security focuses on safeguarding networks, systems, and data from digital threats, while Cloud Sec
Get to know about Microsoft Defender for Office 365
6/5/2024 4:21:29 AM.
Microsoft Defender XDR, advanced threat protection suite within Microsoft 365 Defender. Focus on Microsoft Defender for Office 365, offering robust email security through features like Exchange Online
Introducing HybridCache The Future of .NET Caching
6/4/2024 6:00:05 AM.
HybridCache bridges gaps in .NET's IDistributedCache and IMemoryCache, introducing advanced capabilities like stampede protection and configurable serialization. It simplifies caching with a unifi
Content Delivery Network (CDN): A Comprehensive Overview
6/2/2024 10:40:27 AM.
A Content Delivery Network (CDN) is a system of distributed servers that deliver web content to users based on their geographic location. CDNs improve website performance by caching content, reducing
NSX ALB Virtual Services and Vulnerable Web Applications
5/29/2024 5:54:10 AM.
Explore VMware NSX ALB's role in enhancing web application security and performance. This article delves into its key features like load balancing, WAF, and DDoS protection, and explains how virtu
Tackling Security with the Sticky Bit
5/22/2024 10:59:23 AM.
Tackling Security with the Sticky Bit" delves into the pivotal role of the sticky bit in Linux file permissions. Explore how it enhances directory security by restricting deletion to file owners,
Securing Your Web Applications with WAF and ASGs
5/14/2024 11:26:15 AM.
Learn to fortify web apps with comprehensive security strategies, leveraging WAF and ASGs. Safeguard against cyber threats, implement access control, and ensure network integrity through advanced fire
Password Protection Using Code in Windows Forms
5/3/2024 9:01:09 AM.
Learn how to implement robust password protection in Windows Forms using C# code. This tutorial covers creating a secure login form in Visual Studio, handling user authentication, and validating passw
Create Secure Store Application In SharePoint O365
5/2/2024 9:51:15 AM.
Learn how to enhance security in SharePoint Online (O365) by creating a secure store application. Explore secure credential management, authentication, and integration with Azure Active Directory for
Protection Against Clickjacking
5/1/2024 11:40:40 AM.
Protection against clickjacking involves implementing measures like frame-busting scripts, X-Frame-Options HTTP header, and Content Security Policy to prevent malicious actors from hijacking clicks on
Protection Against Busting Frame Busting
5/1/2024 11:40:26 AM.
Learn effective techniques to protect against frame busting vulnerabilities on websites. Discover how to implement robust security measures, such as Content Security Policy (CSP), to prevent clickjack
Microsoft Defender for Endpoint (MDE), Common Actions
4/23/2024 11:18:53 AM.
This article provides concise instructions for managing antivirus software on Windows and Linux Azure Virtual Machines using Microsoft Defender for Cloud. It covers tasks such as checking protection s
Applied Reverse Engineering With OllyDbg
4/23/2024 8:25:53 AM.
This paper explores executable cracking using OllyDbg, focusing on reverse engineering without source code. It emphasizes Assembly Programming and tools like OllyDbg and CFF Explorer. Methods include
Azure File Share Snapshot And Implementation
4/15/2024 9:34:25 AM.
Azure File Share Snapshot provides point-in-time backups for file shares in Azure Storage, enabling data protection and recovery. Snapshots capture the state of files at specific moments, offering pea
Save Encrypted Password In Database In ASP.NET
4/3/2024 9:36:57 AM.
In this article, Discover how to enhance security in your ASP.NET application by saving encrypted passwords in the database. Learn the process of encrypting passwords before storing them, ensuring dat
Backup Encryption In SQL Server
3/28/2024 6:36:20 AM.
SQL Server offers backup encryption to enhance data security. Utilize encryption algorithms and key management to protect database backups, ensuring compliance with privacy regulations and safeguardin
Securing Your Cloud Infrastructure with Azure DDoS Protection: Strategies and Examples
3/8/2024 1:28:49 PM.
This article would talk about securing your cloud infrastructure with Azure DDOS protection with strategies, steps, and examples
How To Secure PII Data In SQL Server Using .NET Assembly
3/6/2024 10:46:18 AM.
In this article, we will learn PII (Personally Identifiable Information) is used to identify individual identity markers such as SSN, DOB, Bank Account Number, etc. When you are working with financial
Windows Defender in Windows 8 Includes MSE
2/27/2024 10:38:20 AM.
This article explains how Windows Defender in Windows 8 integrates Microsoft Security Essentials (MSE) to provide comprehensive virus protection.
How To Enable Delete Confirmation Dialog In Windows 10
2/22/2024 11:33:54 AM.
To enable the delete confirmation dialog in Windows 10, access "Recycle Bin Properties" by right-clicking the Recycle Bin icon. Check "Display delete confirmation dialog" to ensure
Device Endpoint Protection settings configuration in Microsoft Intune
1/17/2024 6:20:33 AM.
Steps to create configuration profile of Endpoint protection in Microsoft Intune.
What are Solidity Modifiers and How do they boost the security of Smart Contracts?
12/28/2023 5:42:54 AM.
Explore the power of Solidity modifiers! From basic syntax to advanced implementations, learn how these tools enhance security, reusability, and efficiency in smart contract development.
ASP.NET Core Data Protection API
12/11/2023 6:40:33 AM.
ASP.NET Core Data Protection API. In web applications, ensuring authenticity is pivotal during round trips. This article delves into the Asp.Net Core Data Protection API, discussing its implementation
Networking Components in Microsoft Azure
10/22/2023 7:29:22 AM.
In this article, we delve into the world of networking within Microsoft Azure. Networking is a vital component of any cloud solution, facilitating communication between resources and users. Azure boas
Encapsulation in C#: Understanding and Implementing Data Protection
10/3/2023 8:44:36 AM.
In this article, we'll explore the significance of encapsulation in C# and demonstrate its implementation with practical examples.
Anonymization Techniques for Data Protection and Privacy
3/20/2023 10:30:57 AM.
An anonymizer is a tool or service that is used to anonymize data by removing or obfuscating identifying information from a dataset, while still allowing the data to be analyzed or used for research p
Deploy And Manage BitLocker On Windows Server
2/27/2023 10:15:35 AM.
In this article, you will learn how to deploy and manage the BitLocker Drive Encryption on windows server,
How To Deploy And Configure Exploit Protection In Windows Server 2022
2/6/2023 11:31:59 AM.
How to deploy exploit protection to your environment, exploit protection helps protect devices from malware that use exploits to spread and infect. You can enable exploit protection on an individual
How To Backup Virtual Machines By Using Azure Portal
11/1/2022 5:25:56 AM.
In this article, you will learn how to backup virtual machines by using azure portal.
Web Protection Library (WPL)
9/12/2020 11:28:05 AM.
In this article, you will learn about Web Protection Library (WPL).
SQL Injection Protection Methods
8/18/2020 7:39:54 AM.
In this article, you will learn about SQL Injection Protection Methods.
Overview Of IoT Security Risks Associated With The Healthcare Industry
4/8/2020 2:51:27 AM.
In this article, you will learn about Healthcare IoT Security Risks and Protection Mechanisms.
How To Protect Files And Folders In Windows 10
3/11/2020 11:26:46 AM.
In this tutorial, I have discussed how to create a protection on file and folder in Windows 10.
How to Create Protection on Folder in Windows 8
12/16/2019 3:38:29 AM.
In this article we are going to explain how to create protection of file and folder in Windows 8.
Turn Off System Restore in Windows 8
12/8/2019 11:16:04 PM.
This article describe about How to Turn Off System Restore in Windows 8.
Update Virus Protection and Windows Defender in Windows 8
12/5/2019 10:31:02 PM.
This article explains how to update Virus Protection and Windows Defender in Windows 8.
How to Turn on System Protection in Windows 8
12/1/2019 11:44:54 PM.
System Protection can really be a necessary and important feature that constantly saves information regarding your computer’s system settings and files.
Protecting Your Data At Conferences
10/29/2019 7:17:03 AM.
In this article, learn how to protect your data at conferences.
How Exchange Hybrid Mail Flow Works | Exchange Online Protection (EOP) | Exchange Hybrid
9/24/2019 1:16:41 AM.
In this video, we are going to see how the mail flow works when you have Exchange Hybrid Environment.
Overview Of The Azure DDoS Protection Standard
8/10/2018 9:00:17 AM.
Distributed denial of service (DDoS) is a form of attacks, and it has top availability and security concerns from the customers during their network utility. These concerns confirm from the number of
Creating A SQL Database And SQL Server On The Azure Portal
11/20/2017 10:10:01 AM.
This article shows how to create a SQL Database and Server on the Azure Portal and also the process of configuring the threat protection to our Database.
Microsoft Azure Security And Protection Against DDoS
6/14/2017 12:56:11 PM.
Microsoft Azure Security And Protection Against DDoS.
Secure Your Customer Data With Bitlocker Or Truecrypt
11/22/2016 2:17:57 PM.
If you work on a Windows machine with customer data, you need to secure it - learn how!
What About Data Privacy
8/23/2016 6:58:55 AM.
What developers need to know about data privacy law...
Protection Level In WCF
5/16/2016 11:23:29 AM.
In this article you will learn about Protection Level in WCF.
Protection Against Buffer Overflow Attack in .NET
10/22/2014 9:47:44 AM.
This article explained how buffer overflows occur and how to prevent it.
Introduction to SLP Services Internals
10/13/2012 5:39:08 AM.
This article explains about SLP Services Architecture and internals of Code Protection.
Introduction to SLP Services Environment Setup
10/13/2012 5:36:27 AM.
This article explains about SLP Environment setup followed by Code Protection sample.
Protecting IL Code from unauthorised Disassembling
5/19/2012 7:41:28 AM.
Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This is an excellent mechanism to abstract the high level code from the underlying hardware.
Using Windows Data Protection
3/31/2011 4:05:01 AM.
Windows Data Protection (or WDP) is an encryption system provided by the operating system based on a key which is automatically generated from the logged-in user’s password.
Building ASP.NET bot protection (CAPTCHA-like)
2/29/2008 10:20:07 AM.
This article shows how to build captcha-like protection from spam and other bots in ASP.NET.