dcsimg
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement
Search the Tips
Tip Bank > Security

Security

Authentication
Encryption
Java
Password Management
SQL Server
Systems Administration
Visual Basic
1-20 of 30     Previous     Next
User Creation and Scenarios
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn more about the importance of providing a password during the user creation process itself.
Using fn_builtin_permissions
by Hannes Du Preez
Language: SQL, Expertise: Intermediate - Learn more about an SQL function that allows you to get a list of available permissions.
Employing DROP USER in MySQL
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn to how to properly use the drop user command in MySQL.
Creating a Secure Socket
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to secure your socket with encryption so that it is not an easy target for an attacker.
Knowing the Privileges of the Current User in MySQL
by Sridhar M S
Language: SQL, Expertise: Intermediate - See how to figure out what privileges users have in MySQL.
Find the TLS Version a Vendor Supports
by Srinath M S
Language: Enterprise, Expertise: Intermediate - Learn how to figure out which version of TLS is supported by a vendor.
Handy Function to Test for Email Validity
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Use this nifty function to check the validity of an email address.
Ascertain Whether or Not TLS 1.2 Is Enabled on a Server
by Srinath M S
Language: Security, Expertise: Intermediate - Learn a quick way to figure out if TLS 1.2 is enabled or not.
Secure Your Data in SQL 2016 with Row Level Security (RLS)
by Srinath M S
Language: SQL, Expertise: Advanced - Learn to implement restrictions on data row access in SQL 2016.
How to Turn on TLS Versions Without Affecting Earlier Versions
by Srinath M S
Language: .NET, Level: Advanced: - Learn how to configure the ServicePointManager to turn on the TLS version you want without affecting other versions.
Catching to Log in Java
by Octavia Anghel
Language: Java, Level: Beginner: - See why it is important to pass all required information along in the exception.
Decrypt HTTPS Traffic in Fiddler
by Srinath M S
Language: Enterprise, Expertise: Intermediate - See how to decrypt HTTPS traffic with Fiddler.
Do not Allow Critical Data to be Serialized
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to use the transient keyword for the variable that you do not want to be serialized.
Testing for String Equality
by Octavia Anghel
Language: Java, Expertise: Beginner See an example of the best way to check for string equality.
Change the Default TLS Version in .NET
by Srinath M S
Language: .NET, Expertise: Advanced - Learn a simple way to override the default security protocol used in .NET.
Enable TLS 1.2 Through PowerShell
by Srinath M S
Language: Security, Expertise: Advanced - Use the following script to enable TLS 1.2 on a server using PowerShell.
Block and Unblock Internet Access on a User's Computer Using C#
by Hannes du Preez
Language: .NET, Expertise: Intermediate - Control Internet connectivity on a user's PC via C#.
Get a User that has Deleted Rows with SQL
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Finding a user who has deleted rows is a multi-part process. Get some tips on how to get it done.
Making a File Read-only Using Java
by M S Sridhar
Language: Java, Expertise: Intermediate - Explore how the setReadOnly() method works in Java.
Performing Basic Validation with the Error Provider Control in C#
by Hannes du Preez
Language: .NET, Expertise: Beginner - See why the ErrorProvider control is quite useful when it comes to user input validation.
1-20 of 30     Previous     Next
Thanks for your registration, follow us on our social networks to keep up-to-date