Home / DeveloperSection / Tag
You haven’t finished your post yet. Are you sure you want to leave and discard your draft?
Is it accurate to say that you are looking for vault party pills? There are numerous nations that-have announced them unlawful and perhaps your nati
Norton Mobile Security is a powerful app to protect your Smartphone from being stolen and possible cyber attacks. Moreover, it remotely locates your
If you generate dynamic SQL queries based on user input, an attacker could inject malicious SQL commands that can be executed by the database.In this
SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and executi
Hi..... In this blog I will tell you that what is cross site scripting and how to implemet some validation rule so that we prevent cross site scripting.
Cookie poisoning is a known technique mainly for achieving impersonation and breach of privacy through manipulation of session cookies, which maintain
In last blog I had explained that how to implement cryptography by using SHA1 algorithm. In this article I will describe another method to implement c
We can use cryptography to secure our data from users over the network. We can implement cryptography in C# by using System.Security.Cryptography name