Click here to Skip to main content
65,938 articles
CodeProject is changing. Read more.
Everything / security

Security

security

Great Reads

by Daron Cox
If you're trying to integrate with UAG from a mobile device, this tip is for you!
by Prashant Rewatkar
This article demonstrates how to add Identity-Based Authentication in .NET Core 3.0 using In-Memory Database.
by Saineshwar Bageri
In this article, we will run through 10 points which will help us to make our MVC code secure.
by Retired Author
Cross-Site Scripting (XSS) is one of the most prevalent security vulnerabilities in web applications. It occurs when an attacker injects malicious scripts into content that users can view on a web page. These scripts can steal data, hijack user sessions, or perform other harmful actions.

Latest Articles

by Daron Cox
If you're trying to integrate with UAG from a mobile device, this tip is for you!
by Prashant Rewatkar
This article demonstrates how to add Identity-Based Authentication in .NET Core 3.0 using In-Memory Database.
by Saineshwar Bageri
In this article, we will run through 10 points which will help us to make our MVC code secure.
by Retired Author
Cross-Site Scripting (XSS) is one of the most prevalent security vulnerabilities in web applications. It occurs when an attacker injects malicious scripts into content that users can view on a web page. These scripts can steal data, hijack user sessions, or perform other harmful actions.

All Articles

Sort by Score

security 

by Retired Author
Cross-Site Scripting (XSS) is one of the most prevalent security vulnerabilities in web applications. It occurs when an attacker injects malicious scripts into content that users can view on a web page. These scripts can steal data, hijack user sessions, or perform other harmful actions.
by Bob McGowan
Using strong cryptography with entropy to secure user passwords.
by Sibeesh Passion
In this article we will learn how we can create Angular JS autoComplete text box with the data from SQL Server database. We use MVC architecture with Web API and Angular JS to fetch the data and do all the manipulations. I am creating this application in Visual Studio 2015.
by Sacha Barber
App.Config Transforms outside of Web Project
by CdnSecurityEngineer
When you want to buy something that you can afford, what do you do? Well if you’re like most people you go to some financial institution and take out a loan in the amount of the item you wish to…Read more ›The post Application Security Economics appeared first on Security Synergy.
by Sebastian Solnica
Anti-Forgery Tokens were introduced in ASP.NET in order to prevent Cross-Site Request Forgeries. There are many sites which describe how to use and configure those tokens in your application. But in this post I’m going to show you what exactly…Read more ›
by Karl Stoney
In this post, I will show you how to handle automatic encryption and decryption of hidden form fields using Rijndael.
by Wessel Beulink
Azure spearheads cloud evolution, Azure Automation Runbooks manage hybrid/SOC environments effectively
by Wessel Beulink
What is Azure Virtual Network Encryption? Azure Virtual Network encryption provides a layer of security that encrypts virtual network traffic, specifically between Azure Virtual Machines that communicate securely within a subnet or across different subnets.
by Wessel Beulink
Microsoft Azure enhances security with private subnets, fostering efficient network management.
by Alejandro Gaio
Building a self-hosted, RESTful web service with WCF.
by Imran Abdul Ghani
Part-2 in the series of developing a basic Web Application using MEAN Stack
by Vidyasagar Machupalli
C#, Web API: HTTP GET with a Request Body
by CdnSecurityEngineer
Case for Security Intelligence
by Sebastian Solnica
Common Authentication/Authorization between .NET4.0 and .NET4.5 Web Applications
by Graham D Smith
In this blog post (which is part of my series on on implementing continuous delivery with TFS) we look at creating automated web tests with Selenium.
by Graham D Smith
In this instalment of my series on implementing continuous delivery with TFS we pick up where we left off in the previous post and add the automated web tests we created to Microsoft Test Manager. We then look at how to schedule these tests for automatic execution through the deployment pipeline.
by Trần_Tuấn_Anh
Cross-Origin Resource Sharing (CORS) is a crucial aspect of web security that controls how resources on a web server can be accessed from another domain. In Spring Security 6, configuring CORS ensures that your application interacts securely with resources across different domains.
by Jason Sultana
This article discusses Cross Site Scripting (XSS), and focuses on stored and unstored XSS attacks.
by EngineerSpock
A brief introduction into Cryptography in .NET
by CdnSecurityEngineer
I prove everyone who’s ever said XSS isn’t a serious vulnerability wrong.
by CdnSecurityEngineer
How to design for security - security patterns
by Divya Ulasala
Examining the differences between java.util.Random, java.security.SecureRandom, and java.util.concurrent.ThreadLocalRandom to generate random numbers
by Gaurav Aroraa
Discussing Web API2 Route constraints
by madan535
In this post we will learn how to encrypt connection string in web.config
by Sibeesh Passion
In this article we are going to see how we can encrypt and secure our connection string in our web config file. As you all know the connection string is the pillar of our data.
by rtybase
A short article showing how not to RSA
by Andy Point
Firebase Android Tutorial : Adding Registration and Login Hello Developers, this is our android firebase tutorial. In this tutorial we will create an android firebase app that will use firebase android login functionality. This post will help you get you up and running with integrating Firebase to a
by Sander Knape
Setting up SSL for your server may seem like a daunting task. In addition, why would you do it? What are the benefits? There are multiple, actually, with some of the most important ones being:
by Stephen C Young
Google I/O 2014 Recap for web developers
by Gaurav5582
How to Build an Enterprise Framework for .NET Based Web Application
by Illya Reznykov
Creating Regional Web ACL with CloudFormation
by Lee P Richardson
Deploy EF database migrations while avoiding security flags
by Utkarsh Shigihalli
How to open a web page in internal browser of Visual Studio
by Trần_Tuấn_Anh
In today's digital landscape, securing APIs is crucial for safeguarding sensitive data and ensuring the integrity of your Microservices architecture. Spring Boot, a popular framework for building Java applications, offers robust tools for implementing API security.
by CdnSecurityEngineer
Identity provider security pattern
by Taiseer Joudeh
This is the third part of the tutorial which will cover Using Azure AD B2C tenant with ASP.NET Web API 2 and various front-end clients. Azure Active Directory B2C Overview and Policies Management – (Part 1) Secure ASP.NET Web API 2 using Azure AD B2C – (Part 2) Integrate Azure Active Dir
by Member 11794279
"Data! Data! Data!" he cried impatiently.
by Karl Stoney
How to configure Jenkins to automatically check your Node.JS projects dependencies against the Node Security Project
by Jake Drew
This case study tells the detailed story of tracking down real world hackers selling counterfeit goods.
by Trần_Tuấn_Anh
SQL Injection (SQLi) is a serious security vulnerability that allows attackers to execute arbitrary SQL code on a database. This can lead to unauthorized access, data breaches, and even complete system compromise.
by James Carr (Crashcarr)
How to modify SharePoint 2007 web part pages with JavaScript
by AshwinRayaprolu
This is in sequence of my previous post but now with Yahoo...
by AshwinRayaprolu
OAuth with Facebook
by CdnSecurityEngineer
Pillars of application security
by Jason Sultana
Protecting an ASP.NET Web API from XSS
by CdnSecurityEngineer
Quantify your security position
by Rajat-Indiandotnet
Row Level security SQL Server 2016
by Craig Pickles
Row-Level Security in Azure SQL with entity framework
by Tamir Khason
How to import OpenSSL private key into .NET application and use it with X509 public certificate to establish TLS connection with asymmetric encryption and two phase certificates handshake
by CdnSecurityEngineer
Scalable Security Engagement Problem
by Martin Jarvis
Sure your website by putting bouncers at the door
by Vivek Johari
This article explained about measures for securing data in SQL Server at various levels to protect data from unauthorized access and breaches.. The post Securing data in SQL Server appeared first on Technology with Vivek Johari..
by Vasil Trifonov
Securing a WCF Service with self signed certificates programmatically
by CdnSecurityEngineer
Security code review
by CdnSecurityEngineer
Intro – Secure Process Creation I chose the Secure Process Creation pattern as the first pattern to kick of the series on security design patterns because process creation is everywhere in the software world today. Ensuring that the way processes…Read more ›
by Member 11794279
In this post, we’ll focus on security.
by Hamid Mosalla
Security through obscurity - Hiding ASP.NET MVC Response Headers
by Martin Jarvis
Protect against POET Attacks with Custom Errors!
by John Atten
I recently had to throw together an application for work allow users to send email to recipients selected from a list.
by Illya Reznykov
How to update EmailMessage properties that don't have public setters
by matthewproctor
In a previous tutorial, we looked at how to interactively log in and send an instant message. It occurred to me that it would be remarkably simple to automate the process, so that a single JavaScript file could be used to simply send a message.
by matthewproctor
Sometimes connecting to or using the Skype Web SDK isn't as straight forward as you'd like. I'm collecting a list of common issues and scenarios below that can be used to help troubleshoot and identify deployment issues.
by matthewproctor
Whilst building my next Pluralsight course, I've come across a few more scenarios and solutions to keep in mind, many specific to the Chrome web browser.
by Afzaal Ahmad Zeeshan
Introduction and Background As the title suggests, this post is a personal recommendation for the users of Microsoft Cognitive Services, the services that provide a cloud-based subscription-based solution for artificially intelligent software applications, with an any team, any purpose and any scale
by Imran Abdul Ghani
Top 5 articles of the year 2013 on web development
by Trần_Tuấn_Anh
Cross-Site Request Forgery (CSRF) is a serious security vulnerability that can compromise your web applications. It tricks users into performing actions they didn't intend, often leading to unauthorized actions on a website.
by Minh Danh Nguyen (ToughDev)
In order to facilitate transferring files from my main PC to my VirtualBox machine running MS-DOS 6.22, I installed Microsoft
by Saleh Hamadeh
Web security: unvalidated redirects
by Steve Wellens
There was a question from a student over on the Asp.Net forums about improving site performance. The concern was that every time an app setting was read from the Web.Config file, the disk would be accessed. With many app settings and many users, it was believed performance would suffer.
by Akash Ashok Jain
What are the Changes in .NET 4.0 Security Model & What is Sandboxing?
by CdnSecurityEngineer
Intro This is an interesting topic, my reasoning for writing this will become clear in the not too distant future, however not many organizations that are actively writing code have many folks focused or dedicated exclusively to security, if you…Read more ›
by Trần_Tuấn_Anh
Service mesh is a term that's been gaining traction in the world of microservices architecture. But what exactly is a service mesh, and how does it contribute to the management and security of microservices?