CoderJony

Security

3 Important Things About Backing Up Data

3 Important Things About Backing Up Data

Backing up data is important, but not that many people bother putting enough effort into making sure that their files are safe. The negligence should not be so prominent given how many different factors can lead to data loss.

Read More By Ankush Jain
When should we use Signing or Digital Signatures?

When should we use Signing or Digital Signatures?

In signing, a Digital Signature is shared with the recipient. The recipient uses this signature to verify the authenticity of the issuer.

Read More By Ankush Jain
What is Network Security Group in Azure

What is Network Security Group in Azure

Network Security Group (NSG) defines a set of access rules to control the incoming and outgoing traffic for an Azure Resource. We can think of it as a firewall in Azure. We can apply this NSG to either of the two levels.

Read More By Ankush Jain
Multiple ways to access Key Vault from .NET Core Web Application

Multiple ways to access Key Vault from .NET Core Web Application

There could be multiple ways to access the keys from Key Vault in a .NET Core application, but you could choose from the 2 explained below.

Read More By Ankush Jain
Difference between Asymmetric Encryption and Signing (Digital Signature)

Difference between Asymmetric Encryption and Signing (Digital Signature)

I often get confused between Encryption and Signing as both processes use the public key and private key. So, I thought to write a blog post about it so that I can look up to it the next time I get confused.

Read More By Ankush Jain
Understand Authentication and Authorization in Web Applications

Understand Authentication and Authorization in Web Applications

As Web API (Rest API) is stateless, so there should be some mechanism by which a server can identify the user in every request. So to enable a user's identity to a web server, we pass some data in headers in each web request to the server. The server reads that data & understands to identify the user. This process of identifying the user & ensuring that he is a valid one is known as Authentication.

Read More By Ankush Jain