wGrow - Team Notes

Sharing Expertise: Tech Insights and Case Studies
Archive by tag: SecurityReturn
In today's world, securing networks from possible threats and attacks is more than a necessity; it's an absolute must. In my role as an AWS network security expert, I recently had an opportunity to work on an interesting project where the customer required a network firewall setup for an Internet Application Server.
Read More
This document provides a detailed overview of the security architecture we implemented for a medical service group on Amazon Web Services (AWS) and Microsoft Azure. It covers various facets of cloud server security - from initial setup to continuous monitoring and improvements, showcasing our comprehensive expertise in ensuring robust and secure cloud infrastructure.
Read More
Backing up important emails from your Gmail account is essential to ensure data security and availability. This article will guide you through creating a desktop application using C# to backup emails from a Gmail account to a local drive and restore them to either the original Gmail account or a Yahoo Email account. The application will use the Google APIs Client Library for .NET to interact with the Gmail API and the MailKit library to send emails to Yahoo Email.
Read More
Let's Encrypt is a free, automated, and open Certificate Authority (CA) that provides SSL/TLS certificates for websites. The ACME (Automatic Certificate Management Environment) protocol is used to automate the process of obtaining and renewing SSL certificates. In this article, we will create a Windows Service that automates the process of obtaining, installing, and renewing Let's Encrypt SSL certificates for IIS websites using the ACME challenge.
Read More
Remote Desktop Protocol (RDP) is a widely used feature in Windows to access a computer remotely. However, it can also be a target for malicious activities, such as brute force attacks. In this article, we will create a Windows Service that monitors the Windows Event Log for multiple failed RDP authentication attempts within a specific time frame, sends an email alert to the server owner, and blocks the IP address temporarily.
Read More
In this case study, we will explore how our team developed a decentralized voting system using Ethereum smart contracts and a .NET C# application. The objective was to create a transparent, tamper-proof, and secure voting system that leverages blockchain technology to enhance the democratic process. By combining the power of Ethereum smart contracts with the familiarity of .NET C# development, we were able to deliver a robust solution that met all project requirements.
Read More
It's essential to ensure that SQL Server is secure and protected against potential cyber threats. Government cybersecurity requirements mandate that all agencies' SQL Server must undergo hardening before being put into production. We summarize the comprehensive SQL Server hardening checklist and best practices to secure SQL Server environment for an agency data centre.
Read More
In this case study, we describe the process of virtualizing a legacy Windows Server 2000 application that gathers data from semiconductor testing equipment and produces reports for analysis. The application was running on an unsupported HP 2U Server ProLiant, and the management wanted to address the security risks and high maintenance costs associated with the outdated hardware and operating system. Our goal was to virtualize the server and application while preserving their functionality, and t...
Read More
This technical article provides an overview of SQL Server Transparent Data Encryption (TDE) and demonstrates how to implement TDE in an ASP.NET web project. The article explains the benefits of TDE, the encryption process, and provides sample SQL and C# code to illustrate its use for securing sensitive data in a web application.
Read More
This article outlines the process of improving the performance of a commercial medical service provider's patient management system without resorting to expensive server upgrades. The solution involves separating employee and public portals, distributing data across multiple servers, implementing archiving and web services, and utilizing Windows Service scheduled timer jobs for report generation. The implementation is based on ASP.NET, MS SQL, and AWS infrastructure.
Read More
Page 1 of 2 FirstPrevious [1]
Contact Us
  • Our Address:
    114 Lavender Street, #07-51, CT Hub 2, Singapore 338729
    Malaysia Johor - 99-01 Jalan Adda 3/1 Taman Adda Height 81100 Johor Bahru Johor, Malaysia
  • Phone Number:
    +65 6652 3398
  • WhatsApp:
    WhatsApp Us
  • Email:
    [email protected]