September 26, 2025

SamTech 365 – Samir Daoudi Technical Blog

PowerPlatform, Power Apps, Power Automate, PVA, SharePoint, C#, .Net, SQL, Azure News, Tips ….etc

Internet has opened new market ways and gave a new vision and new methods of selling products. Ecommerce was a...

Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken. Do you think it is possible...

Attacks can be from internal or external sources and good security officers should plan and define measure to avoid or...

The appearance of Internet and the wide connection and interconnection of networks helped attackers thinking of wider and massive attacks,...

OS hardening To protect against misconfiguration-based attacks, install the very good hardening utility Bastille (http://sourceforge.net). Bastille essentially closes all the...

Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography. Initially developed by Shamir...

Security can be considered at different levels, we can think about how can we make our connexions secure and avoid...

Trying to build an efficient and secure system is a hard task and no exact method or technique has been...