Articles Written by Bipin Joshi

Preventing Cross Site Scripting Attacks in ASP.NET MVC 4

One of the most common types of website attacks is Cross Site Scripting (XSS). Bipin Joshi discusses some of the basics involved in the process of safeguarding your website with ASP.NET MVC.

Using Unobtrusive Validation in ASP.NET 4.5 Web Forms

Updated: Earlier releases of ASP.NET validation controls depended upon JavaScript, emitted by the ASP.NET web form framework. Unobtrusive validation makes use of the data-* attributes of HTML5 for validation purposes. Bipin Joshi shows you how the new unobtrusive validation features work for Web Forms.

Zip and Unzip Files Programmatically in C#

The .NET framework 4.5 introduces some new classes in System.IO.Compression namespace that allows you to deal with Zip files programmatically. Using these classes you can create new Zip files, open and modify existing Zip files and extract the contents of Zip files via code. This article examines some of these classes.

Working with Arrays in C#

Although single dimensional arrays are most commonly used in C#, other varieties such as multidimensional arrays and jagged arrays are also available to C# developers. Additionally, the Array class comes in handy when it comes to sorting or searching an array.

Top White Papers and Webcasts

  • Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and get the facts about new automated compliance processes and how they will reduce your organization's vulnerability and risk. Learn to: Adopt a set of cyber "Rules of Engagement" Define the appropriate response through the "Response Index" Create actionable response metrics Ensure multiple levels of audit and reinforcement Plus, find out how to better align security and operations teams and put the …

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date