
JWT
C# Get JWT Token from Request .NET 6
This blog post will explore extracting a JWT token from incoming requests using C#. How to Get JWT Token from Request using C#
JWT
This blog post will explore extracting a JWT token from incoming requests using C#. How to Get JWT Token from Request using C#
Oracle
The function JSON_TABLE allows us to transform JSON data into a table relational format. This article will explore the Oracle JSON_TABLE function and its syntax and provide examples to demonstrate its usage and capabilities.
Oracle
Oracle MERGE statement is one of those powerful commands which allows you to perform INSERT and UPDATE operations in a single statement based on specific conditions.
xgh
I think therefore it's not XGH. In XGH you don't think, you do the first thing that comes to your mind. There's not a second option as the first one is faster.
JWT
In this article, we will work on implementing C# JWT Authentication using .NET 7 - which also works for .NET 6, and preview .NET 8 - using ASP.NET Core.
ChatGPT
In this blog post, we will explore the steps to develop a C# application using DALL-E model to generate images from text.
Serilog
One of the key features of Serilog is the ability to Enrich Log Events with additional contextual information that can help in troubleshooting and debugging. In this blog post, we will explore how to create a Custom Enricher with Serilog to add custom properties to log events.
ChatGPT
With the use of C#, we can develop a console application that uses the Chat GPT model to generate human-like responses to input.
C#
C# allows us to define Implicit and Explicit operators. Unlike casting Implicit and Explicit operators defines how C# should behave when encountering an equals sign. Implicit operator execution can be invoked when assigning a variable or calling a method. To use Explicit operator we should do the same as casting
C#
Here is a small extension method over System.DateTime that gives its relative time readable for humans, such as: * one minute ago * 2 minutes ago * one hour ago * 3 hours ago * 3 days ago Check out this extension method over the DateTime structure using switch patterns. public static string AsTimeAgo(
Linux
Exposing virtual machines to the internet it's not an easy task. Often managed using an SSH connection we must secure our machines as much as we can against hacker attacks. Let's go through some often and ease configurations that will make it an attacker hard if
C#
One of the new features of .NET 6 is the arrival of a new template, which will replace the default and bring a good reduction in code writing. Including the removal of the Startup.cs file. .NET 6 was released as LTS (long-term stable) which means support for 3 years.