Clear SQL logs
In SQL Server, whenever something is done, its log is stored in a file called ERRORLOG.n . The letter n at the end of the ERRORLOG filename is a number that whenever SQL is restarted or executed, a new file with a new number is created. For example , ERRORLOG.1 ....
Read more
Differences between Scoped, Transient and Singleton in .net core
Services that are registered as Transient are always different . That is, for each service call, a new instance of the object is created and provided to the DI . Services that are registered as Scoped provide one object to the DI for each ....
Read more
Implementing Autofac in Asp.Net Core 3.1
Autofac is a tool for managing interdependence between classes that simplifies application development as it grows in size and complexity. Asp.Net Core, unlike the classic Asp.Net, supports built-in Dependency Injection ....
Read more
Prevent Brute Force Attack
One of the most common attacks faced by developers is Brute-Force Attack. In these attacks, users use any possible combination of letters, numbers and symbols to discover the correct combination to discover the password. If your website needs authentication ....
Read more
How to implement password forgetting on the OWASP website
On the first page of implementing a secure password forgetfulness you ask the user to enter at least the information he has already registered. At the very least, you should have collected data that will allow you to send password recovery information to the user via SMS, email, and so on. ....
Read more
