Friday, 29 November 2024

CSRF Attack

 A CSRF (Cross-Site Request Forgery) attack is a type of security vulnerability that tricks a user into performing actions on a website or web application without their knowledge or consent. This type of attack takes advantage of the trust a website has in the user's browser.How CSRF Works:Victim logged in: The victim is authenticated and logged into a web application (e.g., a banking website).Malicious...
Continue Reading →

Thursday, 21 November 2024

Identify application performance

Below are steps and methods you can use to diagnose application performance problems:1. Monitor Server MetricsBefore diving deep into the application, gather information about the server’s resource usage:CPU Usage: Check if the server's CPU is being heavily utilized (over 85% usage for extended periods) which could indicate that your application or system processes are CPU-bound.Memory Usage: Excessive...
Continue Reading →

Wednesday, 20 November 2024

Prevent SQL injection

To prevent SQL injection in a C# web application or web API, it's essential to follow best practices for interacting with databases. SQL injection occurs when malicious users insert or manipulate SQL queries to perform unauthorized actions on the database. Here are several strategies you can implement to prevent SQL injection:Use Parameterized Queries: The parameters are treated as data, not...
Continue Reading →

Entity Framework Vs Entity Framework Core

 The main differences between Entity Framework (EF) and Entity Framework Core (EF Core) stem from their architectural changes, cross-platform support, performance improvements, and additional features. Below are the key distinctions:1. Platform Support:Entity Framework (EF):Primarily designed to run on the .NET Framework, which is Windows-only.Entity Framework Core (EF Core):Cross-platform: Works...
Continue Reading →

Claim in jwt authentication token

 In JWT (JSON Web Token) authentication, a claim is a piece of information that is encoded within the token. Claims represent statements about an entity (usually the user) and additional metadata. Claims are used to convey information that is relevant to the authentication or authorization process.A JWT typically contains three parts: the header, the payload, and the signature. The claims are...
Continue Reading →

What information JWT token contains

JWT (JSON Web Token) is a compact, URL-safe token format used for securely transmitting information between parties. In the context of a Web API, a JWT typically contains three main parts:1. Header:The header typically consists of two parts:Type: This is usually "JWT" to indicate the token format.Algorithm: The algorithm used for signing the token, such as HS256 (HMAC SHA-256) or RS256 (RSA SHA-256)....
Continue Reading →

JWT Token Generation Code in C#

Install the required NuGet packagesYou'll need the following packages in your C# project:System.IdentityModel.Tokens.Jwt (for JWT token generation and validation)Microsoft.IdentityModel.Tokens (for creating signing keys and algorithms)Set up the JWT Token Generation CodeHere’s an example of how to generate a JWT token in C# using various options:public string GenerateJwtToken(string username){ ...
Continue Reading →

Topics

ADFS (1) ADO .Net (1) Ajax (1) Angular (47) Angular Js (15) ASP .Net (14) Authentication (4) Azure (3) Breeze.js (1) C# (55) CD (1) CI (2) CloudComputing (2) Coding (10) CQRS (1) CSS (2) Design_Pattern (7) DevOps (4) DI (3) Dotnet (10) DotnetCore (20) Entity Framework (5) ExpressJS (4) Html (4) IIS (1) Javascript (17) Jquery (8) jwtToken (4) Lamda (3) Linq (10) microservice (4) Mongodb (1) MVC (46) NodeJS (8) React (10) SDLC (1) Sql Server (32) SSIS (3) SSO (1) TypeScript (3) UI (1) UnitTest (2) WCF (14) Web Api (16) Web Service (1) XMl (1)

Dotnet Guru Archives