Thought provoking and helpful articles
from the Gooroo community.

Do you have something to say? Contribute or create an article and add it to your Gooroo bio.

  1. Creating HSTS and Pre-load with Cloudflare

    Most people are familiar with HTTPS and the concept of secure websites. Securing websites become more and more common, which is a really good thing. Not only do we know that the data sent and received from the website is secure, but we also get a sense of knowing we will be alright. We expect that we get confidentiality, authenticity and integrity from modern websites. After all, we see sites every day with this:This is becoming more and more common, and according to Scott Helme almost 31% of the...
  2. Using Geo-Location in Your Web App

    The use of GPS data has become second nature for most everyday tasks. The most common scenario of finding your way from A to B using GPS is obvious, but there are a lot of other uses as well. When you ask to find the nearest store on a company website, GPS is used. When you log into Facebook in a foreign country and you subsequently get ads for all of the Swedish natural foods you can eat, GPS is used. When you ask Google to remember where you parked your car, GPS is used. And many more ways. 
  3. Introduction to Progressive Web Apps

    As some people know, I have been very passionate about Windows Phone since the early days of the platform. I am still using a Windows 10 Mobile device, and I still love the operating system and the Windows 10 platform. However, I am not living in a cave, and I do realise that the future potential of the Windows mobile platform is limited. I still don't think it is "dead", but it is certainly limited. I started learning Xamarin a couple of years ago, to use my C# knowledge and skills for building...
  4. Securing your Exchange Online

    If your company its using Exchange Online services and you are responsible for email security, you have many options that you can implement to improve email security. By default every new Exchange Online tenant come with a defaults protections policy such as:Every default policy can be viewed, edited but not deleted. Its so recommended that you review all of this policies.As administrator, you can create additional malware or spam policies and applies it to specific users or groups.The malware filter...
  5. Custom user roles and role-based authorization in ASP.NET core

    I've recently been trying to contribute to the developer community, in more ways than I previously have. One of the areas I decided to delve into, is spending more time on tech forums and resources like StackOverflow.  Well not for asking questions or checking for answers, but more for answering as many questions as I possibly can. The aim is to provide answers primarily to questions budding developers are asking. so Let's hope I do a lot of that as time goes on. Hey, I might...
  6. How to Query Twitter with C#

  7. Visual Studio: Creating and managing digital certificates in C#

    Digital Certificates are used for secure communication between two parties. In digital certification we ensure that the peoples who are using our apps or services are securely communicating with each other and those peoples can be individual consumers or businesses.In Digital Certification we use both Hashing and Asymmetric encryption for creating digital signatures.After encrypting the hash of data we obtain a digital signature later which is used for verification of data.As there are a lot more...
  8. How to install pfSense onto a CheckPoint Firewall Appliance

    pfSense is an Open Source firewall platform that can also be used for site to site connectivity as well as mobile client connectivity.Having used pfSense in the past and knowing how robust and secure the platform is, I wanted to see if I could port or install pfSense onto a CheckPoint firewall appliance. I figured that the CheckPoint appliances should have more than enough power to run pfSense.I was able to test the installation of pfSense using a few older CheckPoint appliances that were decommissioned...
  9. Initiating the Git

    How to initiate git through sshlogin using shh~~~git $ ssh [email protected] ~~~creating a folder ~~~git $ mkdir folder_name ~~~changing to that newly created folder~~~git $ cd folder_name ~~~initiating as a master branch~~~git $ git init --bare ~~~changing the windows pack~~~git $ git config pack.window 0 ~~~##step 5 : clone to local machine usingcloning the newly created folder to local~~~git $ git clone [email protected]:/home/folder_name ~~~adding the all files which are created
  10. Trying to demystify PowerShell conditional statements processing performance

    Recently, I was drafting some PowerShell codes and stumbled across which conditional statement should I use for a very simple task and decided to explore abit more on their performance differences.Below is a sample code that I have coded to display the result of the overall performance between some of the conditional statements method and it is purely for educational coding purposes.If anyone is interested to find out, copy the codes below, paste it on PowerShell ISE and run it.
  11. Edit DRAFT Edit

    • updated