GoorooTHINK

Thought provoking and helpful articles
from the Gooroo community.

Do you have something to say? Contribute or create an article and add it to your Gooroo bio.

  1. Securing your Exchange Online

    If your company its using Exchange Online services and you are responsible for email security, you have many options that you can implement to improve email security. By default every new Exchange Online tenant come with a defaults protections policy such as:Every default policy can be viewed, edited but not deleted. Its so recommended that you review all of this policies.As administrator, you can create additional malware or spam policies and applies it to specific users or groups.The malware filter...
  2. Custom user roles and role-based authorization in ASP.NET core

    I've recently been trying to contribute to the developer community, in more ways than I previously have. One of the areas I decided to delve into, is spending more time on tech forums and resources like StackOverflow.  Well not for asking questions or checking for answers, but more for answering as many questions as I possibly can. The aim is to provide answers primarily to questions budding developers are asking. so Let's hope I do a lot of that as time goes on. Hey, I might...
  3. Visual Studio: Creating and managing digital certificates in C#

    Digital Certificates are used for secure communication between two parties. In digital certification we ensure that the peoples who are using our apps or services are securely communicating with each other and those peoples can be individual consumers or businesses.In Digital Certification we use both Hashing and Asymmetric encryption for creating digital signatures.After encrypting the hash of data we obtain a digital signature later which is used for verification of data.As there are a lot more...
  4. How to install pfSense onto a CheckPoint Firewall Appliance

    pfSense is an Open Source firewall platform that can also be used for site to site connectivity as well as mobile client connectivity.Having used pfSense in the past and knowing how robust and secure the platform is, I wanted to see if I could port or install pfSense onto a CheckPoint firewall appliance. I figured that the CheckPoint appliances should have more than enough power to run pfSense.I was able to test the installation of pfSense using a few older CheckPoint appliances that were decommissioned...
  5. Https Redirect with Asp.Net Core RC2 And Kestrel on Windows

    June 1, 2016I've learned a lot about Asp.Net Core RC2, Kestrel and ports as I failed in various attempts to get a http to https redirect. I share this as a retrospective for myself and in hopes of helping you avoid the swamp and to stay on the narrow road.Update: This approach works with the 1.0 release of Asp.Net Core as well as RC2.Host Asp.Net with Kestrel without IIS for an internal app. I'd like to hit the machine at http://machine-name/ and get redirected to a login at https://machine-name...
  6. One Weird Trick To Improve Web Performance

    The web is chock full of web performance advice. There are books on the subject, I've written articles about them, and there are countless case studies proving just how critical web performance is. All of these tips, patterns and "best practices" are important to understand and apply when appropriate, but the current state of the art, science and technology that drives the web (not to mention the politics!) has created a climate in which one simple web performance trick will likely provide...
  7. "Let's Encrypt" Azure Web Apps the Free and Easy Way

    The process of acquiring TLS/SSL certificates has never been one that I'd call smooth. Its certainly gotten easier and cheaper over the years - I remember once having to prove I received a piece of physical snail mail to satisfy a certificate authority - but there's still plenty of room for improvement.> Aside: SSL (Secure Sockets Layer) is the name of the proprietary protocol originally developed by Netscape. When the IETF improved and standardized the protocol in 1999 with RFC 2246, they renamed...
  8. Two Strategies for Crossing Origins with Performance in Mind

    The web's same-origin policy is one of the cornerstone mechanisms upon which web security is built. It restricts the way that resources can be shared between web applications that have differing protocols, hosts or ports.A few years ago, the Cross-Origin Resource Sharing (aka CORS) specification extended the policy to enable various scenarios that were previously restricted. While the new scenarios are certainly useful, they introduce new considerations for the performance minded. The remainder of...
  9. Why Adobe got it wrong with passwords

    You may have read the media reports or seen the xkcd comic about Adobe's password database being hacked and released to the public.This event has brought to light some concerning issues about the way some companies are dealing with private user information.Hypothentically, if you treat passwords properly in your system, there should be no problem releasing your password database to the public. Adobe however used a very poor form of encryption called 3DES .3DES is designed to be reversible and reversible...
  10. The difference between encryption, hashing, and salting

    Without going into too technical and mathematical detail, it might be useful to explain a little bit about the difference between _encryption_, _hashing_, and _salting_.Encryption has been around for an awfully long time. The Egyptions used it to create mystery and amusement, and the Romans used it to send secret messages. When you encrypt a password, you apply some sort of algorithm which scrambles it up. Applying the key, unscrambles it.ROT13 is a simple example of an encryption algorithm. It basically...
  11. Edit DRAFT Edit

    • updated

Top Tags

Trending Articles

  1. Securing your Exchange Online

    Last updated: 5 months ago by Jose Beltre
  2. Custom user roles and role-based authorization in ASP.NET core

    Last updated: 1 day ago by Temi Lajumoke
  3. Visual Studio: Creating and managing digital certificates in C#

    Last updated: 10 months ago by Mobeen Rashid
  4. How to install pfSense onto a CheckPoint Firewall Appliance

    Last updated: one year ago by Paul Scobie
  5. Https Redirect with Asp.Net Core RC2 And Kestrel on Windows

    Last updated: 10 months ago by Kevin Logan
  6. One Weird Trick To Improve Web Performance

    Last updated: one year ago by Nik Molnar
  7. "Let's Encrypt" Azure Web Apps the Free and Easy Way

    Last updated: one year ago by Nik Molnar
  8. Two Strategies for Crossing Origins with Performance in Mind

    Last updated: one year ago by Nik Molnar
  9. Why Adobe got it wrong with passwords

    Last updated: 3 years ago by Carl Joseph
  10. The difference between encryption, hashing, and salting

    Last updated: 3 years ago by Carl Joseph

Publishing guidelines

Gooroo is a professional community interested only in consuming quality content. Here are our pretty simple guidelines for all contributors to follow.