dcsimg
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement
Search the Tips
Tip Bank > Security

Security

Authentication
Encryption
Java
Password Management
SQL Server
Systems Administration
Visual Basic
1-20 of 33     Previous     Next
Determine Files Present in a Zip File
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn more about a code snippet lets you scan the contents of a given zip file.
Understand the AES Encryption Method
by M S Sridhar
Learn how to understand the AES ENCRYPTION method that is supported by MySQL.
Using Symbolic Links in Java
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn about how to keep your real source code safe and the original location hidden with Symbolic links.
User Creation and Scenarios
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn more about the importance of providing a password during the user creation process itself.
Using fn_builtin_permissions
by Hannes Du Preez
Language: SQL, Expertise: Intermediate - Learn more about an SQL function that allows you to get a list of available permissions.
Employing DROP USER in MySQL
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn to how to properly use the drop user command in MySQL.
Creating a Secure Socket
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to secure your socket with encryption so that it is not an easy target for an attacker.
Knowing the Privileges of the Current User in MySQL
by Sridhar M S
Language: SQL, Expertise: Intermediate - See how to figure out what privileges users have in MySQL.
Find the TLS Version a Vendor Supports
by Srinath M S
Language: Enterprise, Expertise: Intermediate - Learn how to figure out which version of TLS is supported by a vendor.
Handy Function to Test for Email Validity
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Use this nifty function to check the validity of an email address.
Ascertain Whether or Not TLS 1.2 Is Enabled on a Server
by Srinath M S
Language: Security, Expertise: Intermediate - Learn a quick way to figure out if TLS 1.2 is enabled or not.
Secure Your Data in SQL 2016 with Row Level Security (RLS)
by Srinath M S
Language: SQL, Expertise: Advanced - Learn to implement restrictions on data row access in SQL 2016.
How to Turn on TLS Versions Without Affecting Earlier Versions
by Srinath M S
Language: .NET, Level: Advanced: - Learn how to configure the ServicePointManager to turn on the TLS version you want without affecting other versions.
Catching to Log in Java
by Octavia Anghel
Language: Java, Level: Beginner: - See why it is important to pass all required information along in the exception.
Decrypt HTTPS Traffic in Fiddler
by Srinath M S
Language: Enterprise, Expertise: Intermediate - See how to decrypt HTTPS traffic with Fiddler.
Do not Allow Critical Data to be Serialized
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to use the transient keyword for the variable that you do not want to be serialized.
Testing for String Equality
by Octavia Anghel
Language: Java, Expertise: Beginner See an example of the best way to check for string equality.
Change the Default TLS Version in .NET
by Srinath M S
Language: .NET, Expertise: Advanced - Learn a simple way to override the default security protocol used in .NET.
Enable TLS 1.2 Through PowerShell
by Srinath M S
Language: Security, Expertise: Advanced - Use the following script to enable TLS 1.2 on a server using PowerShell.
Block and Unblock Internet Access on a User's Computer Using C#
by Hannes du Preez
Language: .NET, Expertise: Intermediate - Control Internet connectivity on a user's PC via C#.
1-20 of 33     Previous     Next
Thanks for your registration, follow us on our social networks to keep up-to-date