Clear SQL logs


In SQL Server, whenever something is done, its log is stored in a file called ERRORLOG.n . The letter n at the end of the ERRORLOG filename is a number that whenever SQL is restarted or executed, a new file with a new number is created. For example , ERRORLOG.1 ....
Read more

Differences between Scoped, Transient and Singleton in .net core


Services that are registered as Transient are always different . That is, for each service call, a new instance of the object is created and provided to the DI . Services that are registered as Scoped provide one object to the DI for each ....
Read more

Implementing Autofac in Asp.Net Core 3.1


Autofac is a tool for managing interdependence between classes that simplifies application development as it grows in size and complexity. Asp.Net Core, unlike the classic Asp.Net, supports built-in Dependency Injection ....
Read more

Prevent Brute Force Attack


One of the most common attacks faced by developers is Brute-Force Attack. In these attacks, users use any possible combination of letters, numbers and symbols to discover the correct combination to discover the password. If your website needs authentication ....
Read more

How to implement password forgetting on the OWASP website


On the first page of implementing a secure password forgetfulness you ask the user to enter at least the information he has already registered. At the very least, you should have collected data that will allow you to send password recovery information to the user via SMS, email, and so on. ....
Read more