CloudmersiveHow to Scan Files for Unsafe Archives using C#/.NET CoreWe can define an unsafe archive as any compressed file format with an extraction outcome that negatively impacts (or fully compromises) our…May 31, 2023
Daniel KiminPallyConDecentralizing DRM with Blockchain and NFTBlockchain-based Content Security Solutions for WEB 3.0Apr 4, 2023
Darshana MallickReact Security Best Practices for Startups | Essential GuideIEnsuring Security in the Startup Environment with ReactMay 19, 2023May 19, 2023
CloudmersiveHow to Check Text Input for Cross-Site Scripting (XSS) Attacks in PHPIdentify and normalize XSS attempts with a simple, low-code API solution. Use ready-to-run PHP code examples to get started in minutes.Mar 21, 2023Mar 21, 2023
CloudmersiveHow to Virus Scan Files using Python (with Advanced Content Security Features)Maintaining file security is a critical element of any file processing workflow. Otherwise, seemingly normal files hiding viruses and…Jan 30, 2023Jan 30, 2023
CloudmersiveHow to Scan Files for Unsafe Archives using C#/.NET CoreWe can define an unsafe archive as any compressed file format with an extraction outcome that negatively impacts (or fully compromises) our…May 31, 2023
Daniel KiminPallyConDecentralizing DRM with Blockchain and NFTBlockchain-based Content Security Solutions for WEB 3.0Apr 4, 2023
Darshana MallickReact Security Best Practices for Startups | Essential GuideIEnsuring Security in the Startup Environment with ReactMay 19, 2023
CloudmersiveHow to Check Text Input for Cross-Site Scripting (XSS) Attacks in PHPIdentify and normalize XSS attempts with a simple, low-code API solution. Use ready-to-run PHP code examples to get started in minutes.Mar 21, 2023
CloudmersiveHow to Virus Scan Files using Python (with Advanced Content Security Features)Maintaining file security is a critical element of any file processing workflow. Otherwise, seemingly normal files hiding viruses and…Jan 30, 2023
Daniel KiminThe StartupForensic Watermarking Technologies and ApplicationsUnderstanding various types of forensic watermarking which are used to prevent illegal content distributionMay 24, 2019
CloudmersiveHow to Protect Your Applications from XML External Entity (XXE) Attacks using GoIf your application parses XML inputs, XXE (XML External Entity) attacks are likely a persistent concern. Thankfully, our XXE Detection API…Dec 8, 2022
Daniel KiminPallyConChoose your weapon to fight screen recording piracyVarious content security solutions to choose fromSep 22, 2020