wGrow - Team Notes

Sharing Expertise: Tech Insights and Case Studies
TECOM is our in-house ERP system for Order Process. System is great for sellers running multiple shops in various platforms and countries. We create many reports and features to address the problems faced by the management team and operation team.
Read More
In today's world, securing networks from possible threats and attacks is more than a necessity; it's an absolute must. In my role as an AWS network security expert, I recently had an opportunity to work on an interesting project where the customer required a network firewall setup for an Internet Application Server.
Read More
This document provides a detailed overview of the security architecture we implemented for a medical service group on Amazon Web Services (AWS) and Microsoft Azure. It covers various facets of cloud server security - from initial setup to continuous monitoring and improvements, showcasing our comprehensive expertise in ensuring robust and secure cloud infrastructure.
Read More
Backing up important emails from your Gmail account is essential to ensure data security and availability. This article will guide you through creating a desktop application using C# to backup emails from a Gmail account to a local drive and restore them to either the original Gmail account or a Yahoo Email account. The application will use the Google APIs Client Library for .NET to interact with the Gmail API and the MailKit library to send emails to Yahoo Email.
Read More
Let's Encrypt is a free, automated, and open Certificate Authority (CA) that provides SSL/TLS certificates for websites. The ACME (Automatic Certificate Management Environment) protocol is used to automate the process of obtaining and renewing SSL certificates. In this article, we will create a Windows Service that automates the process of obtaining, installing, and renewing Let's Encrypt SSL certificates for IIS websites using the ACME challenge.
Read More
Remote Desktop Protocol (RDP) is a widely used feature in Windows to access a computer remotely. However, it can also be a target for malicious activities, such as brute force attacks. In this article, we will create a Windows Service that monitors the Windows Event Log for multiple failed RDP authentication attempts within a specific time frame, sends an email alert to the server owner, and blocks the IP address temporarily.
Read More
In this case study, we will explore how our team developed a decentralized voting system using Ethereum smart contracts and a .NET C# application. The objective was to create a transparent, tamper-proof, and secure voting system that leverages blockchain technology to enhance the democratic process. By combining the power of Ethereum smart contracts with the familiarity of .NET C# development, we were able to deliver a robust solution that met all project requirements.
Read More
It's essential to ensure that SQL Server is secure and protected against potential cyber threats. Government cybersecurity requirements mandate that all agencies' SQL Server must undergo hardening before being put into production. We summarize the comprehensive SQL Server hardening checklist and best practices to secure SQL Server environment for an agency data centre.
Read More
In this case study, we describe the process of virtualizing a legacy Windows Server 2000 application that gathers data from semiconductor testing equipment and produces reports for analysis. The application was running on an unsupported HP 2U Server ProLiant, and the management wanted to address the security risks and high maintenance costs associated with the outdated hardware and operating system. Our goal was to virtualize the server and application while preserving their functionality, and t...
Read More
Deploy Bluetooth components into the equipment and design a Server-Based System with a Web Interface and a Mobile Interface (PWA) to meet the customer's requirements. The solution needed to be user-friendly, scalable, and robust, allowing engineers to easily manage the equipment from anywhere.
Read More
Page 1 of 3 FirstPrevious [1]
Contact Us
  • Our Address:
    114 Lavender Street, #07-51, CT Hub 2, Singapore 338729
    Malaysia Johor - 99-01 Jalan Adda 3/1 Taman Adda Height 81100 Johor Bahru Johor, Malaysia
  • Phone Number:
    +65 6652 3398
  • WhatsApp:
    WhatsApp Us
  • Email:
    [email protected]