How to hide URL query information in ASP.NET in VB.NET

This ASP.NET Security tutorial explains how to hide URL query information in ASP.NET in VB.NET.

In many cases, the URL query contains information that should keep on hidden from the user. You can switch to another form of state management or encrypt the query string. You can encrypt the query string by using the cryptography [...]

How to hide URL query information in ASP.NET in C#

This ASP.NET Security tutorial explains how to hide URL query information in ASP.NET in C#.

In many cases, the URL query contains information that should keep on hidden from the user. You can switch to another form of state management or encrypt the query string. You can encrypt the query string by using the cryptography [...]

How to use dynamic queries with multiple values to protect ASP.NET web application from SQL injection in VB.NET

This ASP.NET Security tutorial explains how to use dynamic queries with multiple values to protect ASP.NET web application from SQL injection in VB.NET.

There is a specific kind of SQL injection that is related to handling multiple values in a query. Multiple values are often used in dynamically generated queries, for example, in combination with [...]

How to use dynamic queries with multiple values to protect ASP.NET web application from SQL injection in C#

This ASP.NET Security tutorial explains how to use dynamic queries with multiple values to protect ASP.NET web application from SQL injection in C#.

There is a specific kind of SQL injection that is related to handling multiple values in a query. Multiple values are often used in dynamically generated queries, for example, in combination with [...]

How to use parameterized SQL queries to protect ASP.NET web application from SQL injection in VB.NET

This ASP.NET Security tutorial explains how to use parameterized SQL queries to protect ASP.NET web application from SQL injection in VB.NET.

SQL injection is used as a way to gain control over a web application by simply injecting some specially created SQL query via a parameter. This kind of the worst attack for a web [...]

How to use parameterized SQL queries to protect ASP.NET web application from SQL injection in C#

This ASP.NET Security tutorial explains how to use parameterized SQL queries to protect ASP.NET web application from SQL injection in C#.

SQL injection is used as a way to gain control over a web application by simply injecting some specially created SQL query via a parameter. This kind of the worst attack for a web [...]

How to use asymmetric encryption in ASP.NET in VB.NET

This ASP.NET Security tutorial explains how to use asymmetric encryption in ASP.NET in VB.NET.
If you have to use asymmetric encryption in your ASP.NET project you can use the class described in the article How to create asymmetric encryption utility class in ASP.NET in VB.NET. To illustrate this you can create a page that permits you [...]

How to use asymmetric encryption in ASP.NET in C#

This ASP.NET Security tutorial explains how to use asymmetric encryption in ASP.NET in C#.

If you have to use asymmetric encryption in your ASP.NET project you can use the class described in the article How to create asymmetric encryption utility class in ASP.NET in C#. To illustrate this you can create a page that [...]

How to create asymmetric encryption utility class in ASP.NET in VB.NET

This ASP.NET Security tutorial explains how to create asymmetric encryption utility class in ASP.NET in VB.NET.

The major difference between symmetric and asymmetric algorithms is key management. Symmetric algorithms have one key, and asymmetric algorithms have two keys: public key for encrypting data and private key for decrypting data. The public key can be [...]

How to create asymmetric encryption utility class in ASP.NET in C#

This ASP.NET Security tutorial explains how to create asymmetric encryption utility class in ASP.NET in C#.

The major difference between symmetric and asymmetric algorithms is key management. Symmetric algorithms have one key, and asymmetric algorithms have two keys: public key for encrypting data and private key for decrypting data. The public key can be [...]