This is the fifth article in the OWASP Top 10 Series Overview…
OWASP TOP 3: Sensitive Data Exposure Basics
This is the fourth article in the OWASP Top 10 Series Overview…
OWASP TOP 2: Broken Authentication and Session Management Basics
This is the third article in the OWASP Top 10 Series Overview…
OWASP TOP 1: Injection – Basics
This is the second article in the OWASP Top 10 Series INTRO…
Web Application Security: OWASP TOP 10
This is the first of a series of articles related to OWASP…
Mono.Cecil (Part II): Basic Operations
INTRO In this second article I´ll try to ilustrate some of the…
Mono.Cecil (Part I): Overview
This is the first of a series of articles related to Mono.Cecil…
Metaprogramming: Overview
INTRO Under this topic we are going to review a set of…
Roslyn & You (Part III) : Playing with Syntax Trees
Now we have reviewed the basics of Roslyn it´s time to starting…