Here why data encryption is so important to secure and encode data and uses encryption or security keys to make the data accessible
Search Results for: encryption
SSL Encryption
In this blog post, you will learn what SSL Encryption entails, what it is, how it helps secure communication over networks you use. Security issues bothering on confidentiality and privacy are some of the most significant problems we face today in our world of information and communications. Hackers who get hold of the login information of individuals can use the details to access sensitive data from their victims. Increasing cybersecurity threats, combined with the constantly evolving technology behind such threats, give rise to security-related concerns. So, online communications, including transactions,…
Web.config: encryption and decryption
Introduction In this article I will explain how to encrypt or decrypt connection Strings in web.config file using asp.net. Description In Previous posts I explained lot of articles regarding Asp.net, Gridview, SQL Server, Ajax, JavaScript etc. In many of articles I used connection Strings section in web.config file to store database connection. The connection Strings section contains sensitive information of database connections including username and password of database. Is it secured to store the sensitive information of database connections in plain text files called web.config and machine.config files? If we…
Amazon Echo shares your Wi-Fi
Your Amazon Echo shares your Wi-Fi network with neighbors, unless you opt-out. It’s called Amazon Sidewalk to help Amazon devices work better
Improving on the application’s behaviour
In this post will be on improving on the application’s behaviour following clean architecture handling errors, adding logging, authenticating users
ASP.NET Core on Windows with IIS
How to run a website built with ASP.NET Core on a Windows machine with IIS and create a self-certificate to test your application properly
Building Multi-Tenant Applications
This article talks about multi-tenant applications and discusses how multi-tenant applications can be architected and implemented in ASP.NET 5
Don’t delete Windows10 root certificate expiring this month
Microsoft warns to don’t delete Windows10 root certificate expiring this month because it could cause problems with the operating system. Earlier this month, BornCity reported that the ‘Microsoft Root Authority‘ certificate in Microsoft’s Trusted Root Certification Authorities was expiring at the end of the month, on 12/31/20. While other newer Microsoft root certificates are not expiring this year, some users are concerned that the expiring certificate could prevent software, hardware, or the operating system from performing correctly. When we contacted Microsoft regarding the expiring root certificate, we were referred to a support…
How to install OpenSSL on Windows 10
I explain how to download and install OpenSSL on Windows 10. OpenSSL is a full-featured toolkit for the TLS and SSL protocols
Meet the Microsoft Pluton processor
The role of the Windows PC and trust in technology are more important than ever as our devices keep us connected and productive across work and life. Windows 10 is the most secure version of Windows ever, built with end-to-end security for protection from the edge to the cloud all the way down to the hardware. Advancements like Windows Hello biometric facial recognition, built-in Microsoft Defender Antivirus, and firmware protections and advanced system capabilities like System Guard, Application Control for Windows and more have helped Microsoft keep pace with the evolving threat landscape. Today, Microsoft alongside our…
Adapting to Enterprise and B2E Xamarin Forms App Development
Enterprise or Business to Employee (B2E) mobile apps can be quite different from their B2C counterparts. B2C apps, tend to focus on a small number of screens or feed for their main usage, and additional screens are not as frequently used, but there to serve ancillary functionality as needed. B2E apps, are focused on function, normally recording or accessing data for their day to day job. Many of them are replacing hand written recordings, for digital records, that are automatically synchronized to the main database. The fact that these users…
Microsoft, others join forces to work on encrypted email protocols
In the world of the Internet, technology is constantly changing. The SMTP technology behind email, however, has not changed much since it was first released a very long time ago. Despite the invention of SMTP SMARTTM to solve this problem, most emails are still unencrypted, and thus open to a man in the middle hack. Luckily though, a team of engineers from Microsoft, Google, Yahoo, Comcast, and other leading companies have been working on a proposal which would cut out the middle man hacker The proposal which has been submitted…
Announcing SQL Server on Linux
It’s been an incredible year for the data business at Microsoft and an incredible year for data across the industry. This Thursday at our Data Driven event in New York, we will kick off a wave of launch activities for SQL Server 2016 with general availability later this year. This is the most significant release of SQL Server that we have ever done, and brings with it some fantastic new capabilities. SQL Server 2016 delivers: Groundbreaking security encryption capabilities that enable data to always be encrypted at rest, in motion…
Encrypting QueryStrings with .NET
Once upon a time in the tech world, obscurity was security – this being most true in the early years of the industry, when there were gaping holes in privacy policies and confidential client information was bandied about from site to site without a care as to who actually could read the information. With the new Cryptography classes in .NET, there’s absolutely no excuse for not hiding even the most innocuous user data. If you ever need to ‘piggy-back’ information from one web page to another, whether it is within…
What is HTTP/2 and is it going to speed up the web?
The web is about to get faster thanks to a new version of HTTP – the biggest change since 1999 to the protocol that underpins the world wide web as we know it today. Hypertext Transfer Protocol is familiar to most as the https:// at the beginning of a web address. It governs the connections between a user’s browser and the server hosting a website, invented by the father of the web Sir Tim Berners-Lee. What is HTTP/2? HTTP/2 is the next version of HTTP and is based on Google’s…