Click here to Skip to main content
15,890,438 members

Videos


Page 2 of 6
1 2 3 4 5 6


.

()
» »
Updated:
Rating: ()
21. Identity Provider Security Pattern
Identity provider security pattern
Security » »
CdnSecurityEngineer Updated: 8 Nov 2014
Rating: 5.00/5 ( (3 votes))
22. C# Internet security like KIS
As Sergey said, this is a bit of a complex question. The short answer is no you cannot do AV activities in .NET like you can do with AV. Having working for a major AV company a lot of this companies have deep partnerships with various OS vendors to get special functionality exposed and enabled....
Security » »
CdnSecurityEngineer Updated: 8 Nov 2014
Rating: 5.00/5 ( (1 vote))
23. Quantify Your Security Position
Quantify your security position
Security » »
CdnSecurityEngineer Updated: 28 Oct 2014
Rating: 5.00/5 ( (1 vote))
24. Scalable Security Engagement Problem
Scalable Security Engagement Problem
Security » »
CdnSecurityEngineer Updated: 25 Oct 2014
Rating: 5.00/5 ( (1 vote))
.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
25. Protecting .NET Configs
Protecting .NET Configs
.NET » »
CdnSecurityEngineer Updated: 20 Oct 2014
Rating: 4.95/5 ( (20 votes))
26. How Do I Change The Attribute Of Asp.Net_Sessionid?
You can't the session ID is a read only property in .NET. Why do you want to change it?Encrypting your data and transmitting with SSL and SecureCookies=true is a better way to protect form session high jacking attempts, as well as not referring to the session in the query string.
Security » »
CdnSecurityEngineer Updated: 19 Oct 2014
Rating: ( (No votes))
27. Store cryptography Key in key container
Why would you want to do that? It seems awkward like you're trying to force your own will on Microsoft's tools etc. Here's why you really shouldn't do what you're asking. If you look at the Microsoft key container it looks like. ...
Security » Cryptography »
CdnSecurityEngineer Updated: 19 Oct 2014
Rating: ( (No votes))
28. InfoSec is Not Enough
InfoSec is not enough
All Topics » »
CdnSecurityEngineer Updated: 18 Oct 2014
Rating: 5.00/5 ( (2 votes))
29. Application Security Economics
When you want to buy something that you can afford, what do you do? Well if you’re like most people you go to some financial institution and take out a loan in the amount of the item you wish to…Read more ›The post Application Security Economics appeared first on Security Synergy.
Security » »
CdnSecurityEngineer Updated: 16 Oct 2014
Rating: 5.00/5 ( (1 vote))
30. Application Security Charter
Application Security Charter
All Topics » »
CdnSecurityEngineer Updated: 27 Sep 2014
Rating: 5.00/5 ( (1 vote))
31. Pillars of Application Security
Pillars of application security
Security » »
CdnSecurityEngineer Updated: 27 Sep 2014
Rating: 5.00/5 ( (1 vote))
32. Application Security: Agreement
Application security - business agreement
All Topics » »
CdnSecurityEngineer Updated: 23 Sep 2014
Rating: 5.00/5 ( (3 votes))
33. Building a Technology Career
How to build a technology career
All Topics » »
CdnSecurityEngineer Updated: 22 Sep 2014
Rating: 4.40/5 ( (3 votes))

Page 2 of 6
1 2 3 4 5 6