• Home

  • Talks Academy

  • SHE

  • About Us

  • Blogs & Articles

  • Videos

  • Conferences

    • Dotnet Learner House Swamy
    • Talks with viswanatha Swamy
    • Talks with Aroh Shukla
    • Talks with Priyanka Shah
    • Talks with Shubham Dumbre
    • Global Power Platform Bootcamp 2022
    • Global AI Back Together 2021
    • Azure Community Bootcamp
    • Scope DTI
    • LightUp Conference
  • Events

  • Our Services

  • Contact Us

  • More

    Use tab to navigate through the menu items.
    logocrop.jpg
    • Facebook Social Icon
    • Twitter Social Icon
    • YouTube Social  Icon
    • LinkedIn Social Icon
    • Instagram Social Icon
    • All Posts
    • SQL
    • SharePoint
    • .NET
    • Active Directory
    • ADO.NET
    • Agile Development
    • AJAX
    • Alexa Skills
    • Algorithms in C#
    • Android
    • Angular
    • AI
    • ASP.NET
    • Augmented Reality
    • AWS
    • Azure
    • Big Data
    • BizTalk Server
    • Blockchain
    • Bootstrap
    • Bots
    • C#
    • C, C++
    • Cloud
    • Cyber Security
    • Cognitive Services
    • Data Mining
    • Data Analytics
    • Databases
    • DevOps
    Search
    What is Multifactor Authentication and How does it work?
    The Tech Platform
    • May 30
    • 5 min

    What is Multifactor Authentication and How does it work?

    Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of...
    Notification System Design : Types and Features
    The Tech Platform
    • May 26
    • 3 min

    Notification System Design : Types and Features

    A notification system has become a mandatory feature os any system that helps touch it users, collect analytics data, etc. It's more than...
    How does two step verification works
    The Tech Platform
    • May 13
    • 4 min

    How does two step verification works

    Two-factor authentication (2FA) is a security process in which users provide two different authentication factors to verify themselves....
    What is Session Hijacking and How To Prevent It?
    The Tech Platform
    • Apr 26
    • 3 min

    What is Session Hijacking and How To Prevent It?

    Session Hijacking When a Session is a time when you are on the internet, Session hijacking means an attack over your internet session and...
    Go Application Vulnerability Cheatsheet
    The Tech Platform
    • Apr 18
    • 12 min

    Go Application Vulnerability Cheatsheet

    Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data...
    Fake Windows 11 upgrade installers infect you with RedLine malware
    The Tech Platform
    • Feb 10
    • 2 min

    Fake Windows 11 upgrade installers infect you with RedLine malware

    Threat actors have started distributing fake Windows 11 upgrade installers to users of Windows 10, tricking them into downloading and...
    Writing a Network Scanner using Python
    The Tech Platform
    • Feb 3
    • 12 min

    Writing a Network Scanner using Python

    What is a Network Scanner? A network scanner is a software tool that scans the network for connected devices. It is also used for...
    Top 5 Programming Languages for Cyber Security
    The Tech Platform
    • Jan 25
    • 4 min

    Top 5 Programming Languages for Cyber Security

    Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from...
    How To Hack Any Web Application (Website)
    The Tech Platform
    • Jan 12
    • 13 min

    How To Hack Any Web Application (Website)

    This article is the third and final installment to this series. This is just a mere introduction tothese following topics. I will be...
    What is YARA (Yet Another Recursive/Ridiculous Acronym) ? and What are YARA Rules?
    The Tech Platform
    • Jan 4
    • 6 min

    What is YARA (Yet Another Recursive/Ridiculous Acronym) ? and What are YARA Rules?

    YARA (Yet Another Recursive/Ridiculous Acronym) YARA is a tool aimed at (but not limited to) helping malware researchers to identify and...
    Killware is much worse than Ransomware to the mankind
    The Tech Platform
    • Oct 26, 2021
    • 1 min

    Killware is much worse than Ransomware to the mankind

    Killware is much worse than the Ransomware The worst of mankind will be Killware directed to Kill or harm someone As rightly said no...
    Websockets : How to Handle WebSockets Security?
    The Tech Platform
    • Sep 21, 2021
    • 3 min

    Websockets : How to Handle WebSockets Security?

    WebSocket connections are initiated over HTTP and are typically long-lived. Messages can be sent in either direction at any time and are...
    Stored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk Plus
    The Tech Platform
    • Sep 15, 2021
    • 8 min

    Stored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk Plus

    The unauthorized access of FireEye red team tools was an eye-opening event for the security community. In my personal opinion, it was...
    Top 10 Ethical Hacking Tools and their Features
    The Tech Platform
    • Sep 6, 2021
    • 4 min

    Top 10 Ethical Hacking Tools and their Features

    Ethical hacking is the act of discovering vulnerabilities and weaknesses of systems and applications by reproducing the reasons and...
    HTTP Security Headers: 5 important Security headers for your site
    The Tech Platform
    • Jul 19, 2021
    • 3 min

    HTTP Security Headers: 5 important Security headers for your site

    When a user visits a site through his/her browser, the server responds with HTTP Response Headers. These headers tell the browser how to...
    Malware -  what are the different types of Malware. Learn how to detect them
    The Tech Platform
    • Jul 10, 2021
    • 4 min

    Malware - what are the different types of Malware. Learn how to detect them

    Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses,...
    What is Spam Calls? What are the Types of Spam Calls.
    The Tech Platform
    • Jul 9, 2021
    • 3 min

    What is Spam Calls? What are the Types of Spam Calls.

    Spam calls are similar to email spams in sense that they are form of unwanted communication. Spam calls and text messages are distributed...
    What are Robocalls? How to Block Robocalls in iPhone and Android.
    The Tech Platform
    • Jul 9, 2021
    • 2 min

    What are Robocalls? How to Block Robocalls in iPhone and Android.

    A robocall is a call that delivers pre-recorded messages through auto-dialing software to millions of people each day. If you answer your...
    Network security threats in Web services
    The Tech Platform
    • Jun 30, 2021
    • 3 min

    Network security threats in Web services

    In this Articles, we will learn about the Network Security Threats, Network Security Issue and Ways to protect your Network. Web...
    What are Cloud Security Challenges, Threats and Issues
    The Tech Platform
    • Jun 17, 2021
    • 4 min

    What are Cloud Security Challenges, Threats and Issues

    The term “cloud” has become eminent in modern-day businesses. Cloud technology is economical and flexible and it enables users to access...
    1/4

    Share

    Share your knowledge

    Read More >

    Learn

    Learn from experts around the world

    Read More >

    Ask

    Ask if you have questions

    Read More >

    Contact US

    Here for you

    Read More >