1-20 of 237
Previous
Next |
Understanding java.net.PasswordAuthentication
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to use PasswordAuthentication for better data security.
|
SQL Injection Tips, Part 3
by Hannes du Preez
Language: SQL, Expertise: Intermediate: SQL injection is probably the most common hacking technique out there. Learn more about hacking techniques to keep your data secure.
|
SQL Injection Tips, Part 2
by Hannes du Preez
Language: SQL, Expertise: Intermediate: Learn more about how to avoid issues with SQL injection.
|
SQL Injection Tips, Part 1
by Hannes du Preez
Language: SQL, Expertise: Intermediate: Learn more about how to avoid SQL injection issues.
|
Employing DROP USER in MySQL
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn to how to properly use the drop user command in MySQL.
|
Creating a Secure Socket
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to secure your socket with encryption so that it is not an easy target for an attacker.
|
Using COMPRESS in MySQL
by Sridhar MS
Language: SQL, Expertise: Intermediate: See how to easily encrypt text in MySQL with the compress method.
|
Locking a User Account in MySQL
by M S Sridhar
Language: SQL, Expertise: Intermediate - MySQL provides a mechanism to alter the user properties, thereby allowing you to lock the user account.
|
Ascertain Whether or Not TLS 1.2 Is Enabled on a Server
by Srinath M S
Language: Security, Expertise: Intermediate - Learn a quick way to figure out if TLS 1.2 is enabled or not.
|
Extract Faces Using Amazon Rekognition
by Srinath M S
Language: .NET, Expertise: Intermediate - Learn how to detect and extract faces with Amazon Rekognition.
|
Determine Files Present in a Zip File
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn more about a code snippet lets you scan the contents of a given zip file.
|
Understand the AES Encryption Method
by M S Sridhar
Learn how to understand the AES ENCRYPTION method that is supported by MySQL.
|
Using Symbolic Links in Java
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn about how to keep your real source code safe and the original location hidden with Symbolic links.
|
User Creation and Scenarios
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn more about the importance of providing a password during the user creation process itself.
|
Using fn_builtin_permissions
by Hannes Du Preez
Language: SQL, Expertise: Intermediate - Learn more about an SQL function that allows you to get a list of available permissions.
|
Knowing the Privileges of the Current User in MySQL
by Sridhar M S
Language: SQL, Expertise: Intermediate - See how to figure out what privileges users have in MySQL.
|
Find the TLS Version a Vendor Supports
by Srinath M S
Language: Enterprise, Expertise: Intermediate - Learn how to figure out which version of TLS is supported by a vendor.
|
Handy Function to Test for Email Validity
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Use this nifty function to check the validity of an email address.
|
Secure Your Data in SQL 2016 with Row Level Security (RLS)
by Srinath M S
Language: SQL, Expertise: Advanced - Learn to implement restrictions on data row access in SQL 2016.
|
How to Turn on TLS Versions Without Affecting Earlier Versions
by Srinath M S
Language: .NET, Level: Advanced: - Learn how to configure the ServicePointManager to turn on the TLS version you want without affecting other versions.
|
1-20 of 237
Previous
Next |