ASP.NET Tutorial: Fededim.Extensions: ASP.NET Data Protection Integration

Fededim.Extensions.Configuration.Protected implements a custom ConfigurationBuilder and a custom ConfigurationProvider defining a custom tokenization tag which whenever found inside a configuration value decrypts the enclosed encrypted data using a pluggable encryption/decryption provider (a default one based on ASP.NET Core Data Protection API is provided). Introduction On October 2023, I posted an article ProtectedJson on CodeProject about …

ASP.NET Tutorial: Integrating OpenAI’s Assistant API in .NET Applications

Artificial Intelligence (AI) has transformed many industries by rendering capabilities that were previously held to be futuristic a present reality. OpenAI offers the Assistant API, so developers can easily integrate AI-based conversational agents into the applications. The Assistant API that OpenAI offers is based on powerful natural language processing capabilities to be integrated into.NET. This …

ASP.NET Tutorial: Add rel=”nofollow noopener noreferrer” to External Links in Sitecore

In many of the solutions we develop with Sitecore, for external links, we need to add the nofollow noopener noreferrer values ​​of the rel attribute for the <a> tags to have a final markup like this.

These values allow us to nofollow: Tells search engines not to follow the link. noopener: Stops the new …

ASP.NET Tutorial: How to Create Dynamic Error Based Log Information?

You can use these procedures to generate dynamic error-based log data in.NET and save it in a database table. Make a database table for logs. To save log data, first create a table in your database. This is an illustration of how the table could appear.

Create a Logging Class in .NET Create a …

Security Best Practices in ADO.NET

Within the.NET framework, ADO.NET is a potent data access technology that lets programmers communicate with databases. However, when using ADO.NET, it’s imperative to guarantee data security and defend against typical dangers. The best techniques for safeguarding sensitive data, stopping SQL injection, putting in place secure authentication and authorization, and securing database connections are all covered …