Security
IT Security

RECENT POSTS

  • Stratis Announces Q4 Roadmap🚧

    Recently, Stratis, the creator of Stratis Platform and STRAT cryptocurrency, a C# and .NET based blockchain product for enterprises, has made an announcement regarding its product roadmap for the f...
  • How To Enable HTTPS On Your Website For Free

    How To Enable HTTPS On Your Website For Free
  • Millions Of Licenses Stolen From Uber Database

    Uber has disclosed that the information of over 57 million of Uber users and drivers accounts was stolen in October last year.
  • CCleaner Gets Infected – 2.3 Million Users Affected

    In a recent incident of software security inspection, the Avast-owned CCleaner Security App was found to be infected with a malware backdoor installed in it.
  • Introduction To OWASP

    OWASP is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. It is a single location to provide fail and real-world information about App Sec...
  • Kaspersky Announces Free Version Of Its Antivirus Software

    Kaspersky Lab has announced that it is launching a free version of its renowned antivirus software.
  • LAME Question of the Day: How To Store a Password in a Database?

    Here we will see three approaches for storing user credentials into the database. The plain-text approach should never be used. The salting and hashing technique seems secure and makes it difficult...
  • The World From A Hacker's Perspective

    Any innovation when used thoughtfully, can be good for humans, but similarly when it falls into the wrong hands then it can be misused badly. So is the technology, it has become an inseparable part...
  • Password Strength Indicator With NuGet Package

    In this article, you will learn about the password strength indicator using jQuery and XML + NuGet Package.
  • Key Considerations To Ensure Data Recovery

    In this technology driven age, data is quite possibly one of the biggest assets that your company has, but more than that, has to protect and build data recovery strategy.
  • Cross Site Scripting (XSS) - A Client Side Web Security Attack

    This article will be focusing on cross site scripting attack and prevention in general.
  • Securing Application Ideas - Is It Possible Without A Patent?

    In this article, you will learn how it is possible to secure application ideas without a patent.
  • Secure Your Customer Data With Bitlocker Or Truecrypt

    If you work on a Windows machine with customer data, you need to secure it - learn how!
  • Why Extend Your SIEM Solution With Network Configuration Monitoring Tools

    In this blog, you will learn why one should extend his SIEM Solution With Network Configuration Monitoring Tools.
  • Known Wrongs In Securing Software

    In this article, you will learn about "known wrongs" in securing software.
  • Encrypting App.config For Multiple Machines

    Here, I will teach you how you can encrypt usernames and passwords in your App.config files, using aspnet_regiis.exe, and deploy them to multiple machines easily.
  • What About Data Privacy

    What developers need to know about data privacy law...
  • Sensitive Data Exposure And Its Securing Techniques

    In this article you will learn about sensitive data exposure and its securing techniques.
  • Cross-Site Scripting (XSS) Attack And Its Prevention Mechanism

    In this article, you will learn about Cross-Site Scripting (XSS) attack and its prevention mechanism.
  • Missing Function Level Access Control And Its Prevention Mechanism

    In this article, you will learn about missing function level access control and its prevention mechanism.
  • Approaches To Security Misconfiguration

    In this article, you will learn about the approaches to security misconfiguration.
  • Secure Your Application's Config File

    In this article you will learn how to secure your Config Application’s Config File.
  • Check your Firewall Port Details

    In this blog you will learn how to Check your Firewall Port Details.
  • File Hash Comparison With MD5 And SHA1

    In this article you will learn about File Hash Comparison with MD5 and SHA1.
  • SSL Certificate Based Authentication In Web API Project

    In this article you will learn SSL Certificate based Authentication in Web API Project
  • View More