This article describes how to encrypt data into secure packets by using 256-bit AES encryption in C#.
This article describes how you can create two-factor authentication codes using TOTP in .NET.
This article describes what CIDR ranges are and how you can represent them in C# code.
This post outlines how to authenticate with Azure, get credentials for the Kubernetes cluster and execute API requests.
This article describes what a binary search tree is, how it can be used to keep objects in sorted order, and provides the source code for one and its nodes in PHP.
This article describes the "Model" part of MVC, how to use them, create forms to edit models using Razor markup, and utilise model attributes to perform model validation.
This post will describe how to create and utilise strongly typed Resources in an ASP.NET MVC project.
This article provides the source code for a PHP-equivalent of .NET's System.Uri class.
This article provides the source code for an IReadOnlyStringDictionary and talks about the origins of the related dictionary interfaces in .NET
My first post, an introduction to what i want to achieve through this blog.