TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About rotected
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Federico Dimarco (1)
Saravanan Ponnusamy (1)
Vijay Yadav (1)
Shilpa Tanwar (1)
Douglas Wagner (1)
Aman Gupta (1)
Vithal Wadje (1)
Janarthanan Selvaraj (1)
Baibhav Kumar (1)
C# Curator (1)
Aravind Govindaraj (1)
Raj Bhatt (1)
Sachin Kalia (1)
Munib Butt (1)
Harshad Pansuriya (1)
Varun Bhandarkar (1)
Kapil Gaur (1)
Andrea Angella (1)
Pramod Thakur (1)
Sharad Gupta (1)
Gaurav Chauhan (1)
Bechir Bejaoui (1)
Moses Soliman (1)
Saradha Gnanavel (1)
Related resources for rotected
No resource found
Fededim.Extensions: ASP.NET Data Protection Integration
11/5/2024 9:59:16 AM.
Fededim.Extensions.Configuration.Protected.DataProtectionAPI enables seamless integration between ASP.NET Configuration and the Data Protection API, providing enhanced security for sensitive data in a
Protected Routes in React.js
10/27/2024 5:37:13 AM.
This approach is essential for apps with private content, ensuring unauthorized users can't view certain pages. By using React Router with authentication checks, developers can manage access dynam
Understanding Access Modifiers in .NET Core
8/13/2024 5:25:10 AM.
Access modifiers in .NET Core control the visibility and accessibility of classes, methods, and variables. They include Public, Private, Protected, Internal, Protected Internal, and Private Protected.
Handling Authentication and Authorization in Next.js
8/7/2024 6:17:20 AM.
Authentication and authorization are crucial for securing web applications. Next.js offers several strategies and libraries to manage user authentication and authorization effectively. This guide cove
The Evolution of Cyber Threats and How to Stay Protected
7/26/2024 6:03:19 AM.
As cyber threats evolve, from simple viruses to sophisticated ransomware and advanced persistent threats (APTs), staying protected is crucial. Key measures include using strong, unique passwords, enab
Singleton Design Pattern: Detailed Explanation and Practical Examples
7/24/2024 6:52:58 AM.
The Singleton Design Pattern ensures a class has only one instance and provides global access to it. Implementations include Basic Singleton, Thread-Safe Singleton with synchronization, Double-Checked
Password-Protected PDF File Using ASP.Net C#
5/31/2024 9:56:31 AM.
Learn how to enhance document security by creating password-protected PDF files using ASP.NET C#. Explore encryption techniques with libraries like iTextSharp to ensure data confidentiality. Safeguard
ShieldAI - Azure Powered Content Safety for Protected Material Detection
5/16/2024 9:20:55 AM.
ShieldAI leverages Microsoft Azure's robust AI capabilities to ensure comprehensive content safety and protected material detection. This advanced system provides real-time monitoring and automate
What is Friend Function in C++
4/30/2024 5:50:49 AM.
Data hiding is a core principle in object-oriented programming, but C++ introduces friend functions that defy this rule, enabling access to private and protected class members from outside.
What Are Access Modifiers In C#
3/29/2024 6:45:30 AM.
Access modifiers in C# regulate the accessibility of class members, impacting encapsulation and object-oriented principles. They control the visibility and accessibility of members within classes and
OpenID Connect and OAuth 2.0 Cognizance
11/1/2023 7:37:02 AM.
An overview of OpenConnect and OAuth and its usage in the digital world. It introduces a standardized method for verifying user identities, allowing users to authenticate across different sites or app
Access Modifiers in C#
7/5/2023 11:03:28 AM.
Access Modifiers in C#
Few Ways to Prevent Instantiation of Class
11/17/2022 9:05:34 AM.
Let’s go with very interesting facts about oops. There are few ways Stop Instantiation of class.
Creating A .NET 5 Client To Call An API Protected By Certificates
7/15/2021 1:00:13 PM.
In this article, you will learn how to create a .NET 5 client to call an API protected by certificates.
Access Modifiers In Java
9/27/2019 5:59:28 AM.
Java Access Modifiers. In this article, you will learn about Access Modifiers keywords in Java.
Private Protected Access Modifier In C#
2/21/2019 10:16:06 PM.
Access Modifiers are special keywords used in a C# program to specify the scope of the members of the class. We will learn about the newly introduced Private Protected Access Modifiers in this article
Understanding Access Modifiers In C# (Video)
1/2/2019 6:46:44 AM.
In this important C# video, I have discussed, in details, what access modifiers are in C#. Also, I have explained the respective properties of all access modifiers - public, private, protected, intern
Private Protected Access Modifier In C# 7.2
3/9/2018 4:03:34 AM.
Learn about the new private protected access modifier in C# 7.2 and how it relates to all the other access modifiers.
Make a Controller Protected in MVC
12/13/2014 6:32:46 PM.
In this article we learn that it is possible to make a controller protected.
Access Control Modifier in PHP
2/18/2013 2:09:53 PM.
In this article I will go to explain access control modifier in PHP
Displaying Search in XML and Accessing Protected Data in JIRA Tool in Testing
12/15/2012 9:35:10 AM.
In this article we discuss how to display search in XML and accessing protected data in JIRA Tool
Encrypt and Decrypt Sensitive Metadata Within Your Config file
10/4/2012 9:54:52 AM.
In a certain cases, metadata embedded within your configuration file is sensitive. In fact, imagine that you develop an application that uses a data base as data source; all information about this data base is located in the configuration file. What if a hacker success to log into your configuration files and obtains the connection string and other metadata about your data base??
Using the DPAPI through ProtectedData Class in .Net Framework 2.0
5/13/2012 3:21:02 AM.
The objective of this tutorial is to show how the DPAPI can be used to encrypt and decrypt data. Encrypt some data using ProtectedData Class in System.Security.Cryptography namespace and save it to a file. Show that the data can be decrypted using the same class but deferent method. Login as a different user,and show that the data cannot be decrypted.
Digging Deeper - Structures in C#
12/19/2005 1:21:29 AM.
Structures in C# are similar to structures in C and C++ but with several prominent differences. In C#, structures are value types.