• Home

  • Talks Academy

  • SHE

  • About Us

  • Blogs & Articles

  • Videos

  • Conferences

    • Dotnet Learner House Swamy
    • Talks with viswanatha Swamy
    • Talks with Aroh Shukla
    • Talks with Priyanka Shah
    • Talks with Shubham Dumbre
    • Global Power Platform Bootcamp 2022
    • Global AI Back Together 2021
    • Azure Community Bootcamp
    • Scope DTI
    • LightUp Conference
  • Events

  • Our Services

  • Contact Us

  • More

    Use tab to navigate through the menu items.
    logocrop.jpg
    • Facebook Social Icon
    • Twitter Social Icon
    • YouTube Social  Icon
    • LinkedIn Social Icon
    • Instagram Social Icon
    • All Posts
    • SQL
    • SharePoint
    • .NET
    • Active Directory
    • ADO.NET
    • Agile Development
    • AJAX
    • Alexa Skills
    • Algorithms in C#
    • Android
    • Angular
    • AI
    • ASP.NET
    • Augmented Reality
    • AWS
    • Azure
    • Big Data
    • BizTalk Server
    • Blockchain
    • Bootstrap
    • Bots
    • C#
    • C, C++
    • Cloud
    • Cyber Security
    • Cognitive Services
    • Data Mining
    • Data Analytics
    • Databases
    • DevOps
    Search
    How does two step verification works
    The Tech Platform
    • May 13
    • 4 min

    How does two step verification works

    0
    Introduction to Security Token
    The Tech Platform
    • May 12
    • 3 min

    Introduction to Security Token

    0
    What is Session Hijacking and How To Prevent It?
    The Tech Platform
    • Apr 26
    • 3 min

    What is Session Hijacking and How To Prevent It?

    0
    Go Application Vulnerability Cheatsheet
    The Tech Platform
    • Apr 18
    • 12 min

    Go Application Vulnerability Cheatsheet

    0
    STOMP - Simple (or Streaming) Text Orientated Messaging Protocol
    The Tech Platform
    • Feb 10
    • 1 min

    STOMP - Simple (or Streaming) Text Orientated Messaging Protocol

    0
    Access Control List in Networking
    The Tech Platform
    • Feb 10
    • 6 min

    Access Control List in Networking

    1
    Fake Windows 11 upgrade installers infect you with RedLine malware
    The Tech Platform
    • Feb 10
    • 2 min

    Fake Windows 11 upgrade installers infect you with RedLine malware

    0
    State hackers use new PowerShell backdoor in Log4j attacks
    The Tech Platform
    • Jan 18
    • 3 min

    State hackers use new PowerShell backdoor in Log4j attacks

    0
    Setting up Keycloak and Securing Spring Boot Rest APIs
    The Tech Platform
    • Jan 12
    • 9 min

    Setting up Keycloak and Securing Spring Boot Rest APIs

    0
    How To Hack Any Web Application (Website)
    The Tech Platform
    • Jan 12
    • 13 min

    How To Hack Any Web Application (Website)

    0
    What is YARA (Yet Another Recursive/Ridiculous Acronym) ? and What are YARA Rules?
    The Tech Platform
    • Jan 4
    • 6 min

    What is YARA (Yet Another Recursive/Ridiculous Acronym) ? and What are YARA Rules?

    0
    How to write YARA rules for improving your security and malware detection?
    The Tech Platform
    • Jan 4
    • 5 min

    How to write YARA rules for improving your security and malware detection?

    0
    Certificate Based Authentication in ASP.Net core Web API
    The Tech Platform
    • Dec 16, 2021
    • 2 min

    Certificate Based Authentication in ASP.Net core Web API

    0
    ERC 4337: account abstraction without Ethereum protocol changes
    The Tech Platform
    • Oct 5, 2021
    • 6 min

    ERC 4337: account abstraction without Ethereum protocol changes

    0
    Websockets : How to Handle WebSockets Security?
    The Tech Platform
    • Sep 21, 2021
    • 3 min

    Websockets : How to Handle WebSockets Security?

    0
    Implement Secure Remote Password Protocol (SRP) in your web app
    The Tech Platform
    • Sep 21, 2021
    • 4 min

    Implement Secure Remote Password Protocol (SRP) in your web app

    0
    Top 10 Ethical Hacking Tools and their Features
    The Tech Platform
    • Sep 6, 2021
    • 4 min

    Top 10 Ethical Hacking Tools and their Features

    0
    HTTP Security Headers: 5 important Security headers for your site
    The Tech Platform
    • Jul 19, 2021
    • 3 min

    HTTP Security Headers: 5 important Security headers for your site

    0
    Malware -  what are the different types of Malware. Learn how to detect them
    The Tech Platform
    • Jul 10, 2021
    • 4 min

    Malware - what are the different types of Malware. Learn how to detect them

    0
    What is Spam Calls? What are the Types of Spam Calls.
    The Tech Platform
    • Jul 9, 2021
    • 3 min

    What is Spam Calls? What are the Types of Spam Calls.

    0
    1/3

    Share

    Share your knowledge

    Read More >

    Learn

    Learn from experts around the world

    Read More >

    Ask

    Ask if you have questions

    Read More >

    Contact US

    Here for you

    Read More >