Click here to Skip to main content
12,066,626 members (56,303 online)

Web Security

Great Reads

by Mahsa Hassankashi
Best approach for have more secure channel to transfer user information throughout the web
by Brij
This article discusses some problems with the earlier approach and discusses Identity federation
by Bert O Neill
AngularJS and Web API Active Directory Security (Authorisation)
by Steve Wellens
There was a question from a student over on the Asp.Net forums about improving site performance. The concern was that every time an app setting was read from the Web.Config file, the disk would be accessed. With many app settings and many users, it was believed performance would suffer. Their intent

Latest Articles

by CdnSecurityEngineer
Clickjacking, is a fairly simple security vulnerability, that has been around almost since people started putting information on the internet. The Royal Bank of Canada(RBC) customer login has a clickjacking vulnerability in it. I have also discovered this vulnerability in…Read more ›The
by Gaurav Kumar Arora
Discussing Web API2 Route constraints
by hans.hinnekint
Create Secure Login with SQL, VS2015, Web Services in C#
by Gerd Wagner
SummaryDon't confuse a DOM collection with a JS array: Array functions, such as the forEach looping method, cannot be applied to a DOM collection!For instance, when you retrieve all rows of an HTML table element, you get an HTMLCollection, which is an array-like object, but not an instance of Array,

Research Library

Up to 80% of the source code in many new commercial and enterprise...
While there’s no doubt that open source software is here to stay, that...
Every developer wants to write good code – code they can be proud of....
Errors that are introduced into software code can cause major problems...


by Member 11138223 on tip/trick "2-Legged OAuth Authentication in...
by Member 12290051 on Role-based Security with Forms Authentication
by Umar Sharif on Article "[C#] Dynamic Web Service Invoker"
by Santhakumar M on article "A Beginner's Tutorial for...
by Schatak on article "Hack proof your applications...

All Articles