search

So you're a dotnet developer and you've heard the hype surrounding graphql, and you think "oh yeah, I just HAVE to try this!". Well prepared to be deeply underwhelmed.

Aambharat shared on Mar 15, 2020
image
dev.to
bookmarks
share
favorite_border0 visibility19
favorite_border0 visibility19 share bookmarks

In this post, we will learn to setup a .NET core app to connect with MSSQL database on a docker container environment. We will run a SQL server on ubuntu container and attach volume on it. Then we will learn to run queries on the running sql server instance and persist changes on it.

Aambharat shared on Mar 15, 2020
image
stacksecrets.com
bookmarks
share
favorite_border0 visibility15
favorite_border0 visibility15 share bookmarks

Health check are important, both of our selves, but also of ourrrrr micro-services. This is something I came across lately – a health check of your connection to a database via EF Core context. Let’s check this out!

Bharat Dwarkani shared on Mar 15, 2020
image
michalbialecki.com
bookmarks
share
favorite_border0 visibility12
favorite_border0 visibility12 share bookmarks

Recently, on checking UX of Google Drive Forums. I came across how google has handled validation states for Text Box

Bharat Dwarkani wrote on Mar 15, 2020
image
sharetechlinks.com
bookmarks
share
favorite_border0 visibility12
favorite_border0 visibility12 share bookmarks

Specifying headers in middleware can be done in C# code by creating one or more pieces of middleware. Most examples in this post will use this approach. In short, you either create a new middleware class or call the Use method directly in the Configure method in Startup.cs

Bharat Dwarkani shared on Mar 13, 2020
image
blog.elmah.io
bookmarks
share
favorite_border0 visibility15
favorite_border0 visibility15 share bookmarks

The Mozilla Observatory has helped over 170,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely.

Bharat Dwarkani shared on Mar 12, 2020
image
observatory.mozilla.org
bookmarks
share
favorite_border0 visibility3
favorite_border0 visibility3 share bookmarks

JSON web tokens are a type of access tokens that are widely used in commercial applications. They are based on the JSON format and includes a token signature to ensure the integrity of the token. Today, we are going to talk about the security implications of using JSON web tokens (and signature-based tokens in general), and how they can be exploited by attackers to bypass access control.

Bharat Dwarkani shared on Mar 12, 2020
image
link.medium.com
bookmarks
share
favorite_border0 visibility12
favorite_border0 visibility12 share bookmarks

Regex is everywhere on the Internet nowadays. Downing Servers With Evil Regular Expressions. But can regex also lead to vulnerabilities? Today, let’s explore how attackers can exploit poorly…

Bharat Dwarkani shared on Mar 12, 2020
image
link.medium.com
bookmarks
share
favorite_border0 visibility7
favorite_border0 visibility7 share bookmarks

As a company grows, it becomes increasingly difficult to secure the hundreds and thousands of machines on the network. Often, all an attacker needs to compromise a network is a single bug on a public-facing machine! Today, we will talk about a common vulnerability on the network perimeter…

Bharat Dwarkani shared on Mar 12, 2020
image
link.medium.com
bookmarks
share
favorite_border0 visibility4
favorite_border0 visibility4 share bookmarks

the loading time of a particular analytics report was ridiculously slow for a big Enterprise customer. Since I am part of the Data platform, a flag was immediately raised and I got involved in debugging the issue.

Bharat Dwarkani shared on Mar 11, 2020
image
medium.com
bookmarks
share
favorite_border0 visibility6
favorite_border0 visibility6 share bookmarks
add