Tag: Intermediate
-
Fededim.Extensions.Configuration.Protected: the ultimate integration between ASP.NET Configuration and Data Protection API
Fededim.Extensions.Configuration.Protected is an improved ConfigurationBuilder which allows partial or full encryption of configuration …
-
Hacking with Windbg – Part 1 (Notepad)
Introduction Debugging is a very important skill when it comes to software development and every software developer would have had times …
-
Encryption — accessory_java
Encryption features of accessory_java, a library providing a programmer-friendly way to facilitate and systematise multiple …
-
Security Concert when reporting Errors in Client base Web Applications
The move of the WEB from server based pages to Client based pages can create a security problem if we don’t modify our traditional form to …
-
IT now stands for Intermediate Targets: Tech providers pwned by snoops eyeing up customers – report
Miscreants are hacking into Saudi Arabian IT providers in an attempt to compromise their real targets: said providers’ customers, according …
-
The Kernel-Bridge Framework
Introduction Have you ever dream about Windows kernel hacking? Want to do something restricted by …
-
Poor Man Web Monitoring tools
This article shares the idea on how to utilize free tools to download log files from server, upload IIS log files into the database, …
-
RSA Encryption using C#.Net
Secure transport of data from one to another end various encryption technology have been introduced already. But Key Pair algorithm like …
-
Security in Angular – Part 2
In Part 1 of this article series, you created a set Angular classes for users and user authentication/authorization. You used these classes …
-
Security in Angular – Part 1
In most business applications, you are going to want to disable, or make invisible, different features such as menu items, buttons and …
-
Help Merchants Process Payments with Reliable Protection from Fraud and Hackers
As merchants grow their e-commerce businesses, the risk of being targeted by fraudsters and hackers grows, too. One of the most common …
-
SQL Server Brute Force Attack Detection: Part 4
For the last part of this series, we will go over an alternate implementation of the login monitor that utilizes Powershell and the Window Task Scheduler API. This method is both more secure and more effective at protecting the database server against malicious login attempts while continuing to use built-in functionality in Windows and T-SQL…
●●●