top of page
Search

The Tech Platform
Oct 28, 2022
Cookies in ASP.NET Core
In web development, cookies play a crucial role in maintaining the session state and improving the browsing experience for users. Cookies...

The Tech Platform
Oct 27, 2022
What is Cyber Insurance?
Cybersecurity Insurance is a contract that helps to reduce the financial risks associated with an online business. Companies that...

The Tech Platform
Aug 22, 2022
The Dark Web: Why people Use it?
The dark web is the hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet...

The Tech Platform
Aug 4, 2022
Introduction to SQL Injection Attacks
SQL injection attacks pose a significant threat to web applications that rely on SQL databases. These attacks allow hackers to exploit...

The Tech Platform
May 30, 2022
What is Multifactor Authentication and How does it work?
Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of...

The Tech Platform
May 26, 2022
Notification System Design : Types and Features
A notification system has become a mandatory feature os any system that helps touch it users, collect analytics data, etc. It's more than...

The Tech Platform
May 13, 2022
How does two step verification works
Two-factor authentication (2FA) is a security process in which users provide two different authentication factors to verify themselves....

The Tech Platform
May 12, 2022
Introduction to Security Token
A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a login...

The Tech Platform
Apr 26, 2022
What is Session Hijacking and How To Prevent It?
Session Hijacking When a Session is a time when you are on the internet, Session hijacking means an attack over your internet session and...

The Tech Platform
Apr 18, 2022
Go Application Vulnerability Cheatsheet
Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data...
bottom of page