Uma Mahesh

Uma Mahesh

Author is working as an Architect in a reputed software company. He is having nearly 21+ Years of experience in web development using Microsoft Technologies.

WCF Security

Overview Services and service consumers are often on opposite sides of trust boundaries. A trust boundary is a physical or virtual boundary within which actual levels of trust can vary. A trust boundary can be an application process, a machine,…

Limitations of SQL Azure

Below are the limitations in the SQL Azure CTP1: When writing applications for SQL Azure, you can use the following drivers and libraries: • .NET Framework Data Provider for SQL Server (System.Data.SqlClient) from the .NET Framework 3.5 Service Pack 1…

Dispersed Team Management Part -2

Act Global, Think Local Although quite different in makeup and operation, dispersed teams and local teams share some important characteristics. All successful teams need to be well designed. That includes defining the purpose of the team, building in project management…

Detect MITM attacks and Secure your clients

The following code demonstrates a dynamic URL generator written in C# for use in ASP.NET, implemented as a static class method, and its corresponding parser module that singles out MITM attackers by detecting multiple IP address mismatches originating from the…

Symmetric key Encryption and Decryption

I saw many of the applications with out basic level of security with respect to data transfer etc. Few people uses Base64 Encoding while sending data through URL which is a common practice. But a simple Javascript code can reverse…