Senin, 23 Agustus 2010
Building Browser Helper Objects with Visual Studio 2005
This article demonstrates how to use Microsoft Visual Studio 2005 to create a simple Browser Helper Object (BHO), a Component Object Model (COM) object that implements the IObjectWithSite interface and attaches itself to Internet Explorer. This article describes how to create an entry-level BHO step-by-step. At first, the BHO displays a message that reads "Hello World!" as Internet Explorer
Введение в WinInet
Ещё вчера Вы даже и не думали о написании программ, использующих интернет протоколы, полагая, что это удел web-программистов. Но, уже сегодня перед Вами стоит задача прочитать/записать, передать/принять, получить/послать что-либо из своей программы на какой-либо интернет-сервер. Какие средства для этого существуют? Сколько времени уйдёт на их изучение и эксперименты? Давайте рассмотрим один из
Working with common WinInet APIs
This article has two parts. First part is the introduction to WinInet APIs required using InternetOpenUrl and second part is sample code. Sample code is a dialog base VC++/MFC application that is attached as Url.zip. Before talking about InternetOpenUrl, we need to look into InternetOpen API.InternetOpenThis function is root of all WinInet functions, and must be called before any WinInet function
How to call InternetErrorDlg to deal with certificate issues on SSL connections (C#)
Hi all,The following C# sample shows how to call WinInet APIs to make an SSL request and deal with possible certificate issues with InternetErrorDlg (which will show the same standard dialogs that Internet Explorer shows when something is wrong with server or client certs): using System; using System.Collections.Generic; using System.Text; using System.Runtime.InteropServices;
How to attach to Browser Helper Object (BHO) with C# in two minutes
IntroductionMicrosoft provided Browser Helper Object (BHO) to let developers "drive" Internet Explorer. The first BHO was introduced in 1997 with IE 4.0. I have been writing programs on BHO for months. It could be quite depressing at the very first beginning to learn all those things. Hereby, I am writing this article to help beginners like me get familiar with BHO as soon as possible.
Add-in Express™ 2010
Add-in Express for Internet Explorer is the only all-in-one framework that offers you a simple and quick way to customize Microsoft Internet Explorer with your own browser extensions. It completely supports the Internet Explorer Extensibility API and provides a coherent set of .net components, visual designers and deployment tools that make your IE add-on development and deployment very
Browser Helper Objects: The Browser the Way You Want It
IntroductionThere are sometimes circumstances in which you need a more or less specialized version of the browser. Sometimes you work around this by developing a completely custom module built on top of the WebBrowser control, complete with buttons, labels, and whatever else the user interface requires. In this case, you're free to add to that browser any new, nonstandard feature you want. But
WinINet
The Windows Internet (WinINet) application programming interface (API) enables applications to interact with FTP, and HTTP protocols to access Internet resources. As standards evolve, these functions handle the changes in underlying protocols, enabling them to maintain consistent behavior. Windows XP and Windows Server 2003 R2 and earlier: Also enabled applications to interact with Gopher.Read
Access a local SQL Compact database from Silverlight 4
Thanks to the new COM support in Silverlight 4, it is now possible for an elevated OOB application to access a local SQL Compact database. Keep in mind that COM suppport only is available on the Windows platform, not on Mac. And thanks to the excellent SilverlightCOM Toolkit on Codeplex, it is very easy to use the ADO COM objects from your Silverlight application in a familiar (.NET) manner. In
Announcing the Mindscape NHibernate Designer
We hate to admit it, but there are some people out there who don’t use LightSpeed. Whether through policy or preference, they’ve instead chosen a free object-relational mapper. And by far the most popular choices are Microsoft’s Entity Framework and the open-source NHibernate. NHibernate is an impressively flexible and extensible ORM. It’s often said that you can get NHibernate to do pretty
PostgreSQL Tutorial – Inserting Data
In the last two articles, we talked about creating your first PostgreSQL database, the syntax of createdb and psql, and creating tables in the database. Next up, we’re going to look at filling those tables with data. createdb -U jeremiah pagilapsql -U jeremiah -f pagila-schema.sql pagilapsql -U jeremiah -f pagila-insert-data.sql pagilaLoading Data From A FileWe’re going to be looking at the
Xaml Toolkit: Manipulation of Xaml
One of the interesting things you could easily do with the Xaml Toolkit is manipulation of Xaml. For example, in the case of XamlPadX, if we copy pasted xaml from a WPF application, it wouldnt render because of events, unknown members and so forth. We would need to extract these members in order to make the xaml render. Using the Xaml Toolkit, its pretty simple. XamlDomObject rootObject =
Nhibernate query only properties and many-to-one
This is how the domain was build, we decided to set a IList in the NickName class, and make this relation unidirectional. Now I need to issue a query to recover only Id and Url of all NickNameDomainRegistration object belonging to a certain NickName. The obvious solution is, Load the NickName fetching NickNameDomainRegistration, then grab the information you need. But I do
How do I get the reference count of a CLR object ?
A customer asked the rather enigmatic question (with no context):Is there a way to get the reference count of an object in .Net?Thanks,Bob SmithSenior DeveloperContosoThe CLR does not maintain reference counts, so there is no reference count to "get". The garbage collector only cares about whether an object has zero references or at least one reference. It doesn't care if there is one, two,
Loading the strings from the MUI file ?
It was a less than thirty four months ago that I wrote Cracking the binary (aka How to open .MUI files?). And it was a less than 24 hours ago that reader Vinzy asked in a comment to that blog:Is there a way to read strings from loaded MUI files, say shell32.dll.mui using C#? I'll admit my first thought was that the answer was in the original blog, albeit buried a bit. I mean after all, if you
Invoke a lambda function through reflection
IntroductionAt work I was writing a small library for a customer - in this library you are able to setup strongly-typed seaching objects that uses lambda expressions to search through a domain model. All-in-all a nice little library that worked fast and was easy to use. But I came across a problem when I needed to combine two or more search-objects. It is a small article that shows you how you
What is Clojure ?
This was originally a reply to some people in a thread asking me to explain what Clojure was and give a "Clojure Rocks" speech. After I wrote this, I decided to put it here so that I could link to it rather than have to reiterate myself in the future for these sorts of questions. So here it is, in all it's glory. Enjoy Clojure is a new language. It's a modern Lisp on the JVM (and the CLR). The
Mixing WPF and WinForms
One of the earliest—but still important—tenets of software engineering is the concept of reuse with “software building blocks”. In the .NET framework, user controls are the quintessential building blocks, giving you a simple yet powerful way to encapsulate a set of visual components into a more complex one. This holds true both in the WinForms realm and the WPF realm. That is, you can build
Windows 7 and Windows Server 2008 R2 Service Pack 1 Beta (KB976932)
Windows 7 and Windows Server 2008 R2 SP1 Beta helps keep your PCs and servers on the latest support level, provides ongoing improvements to the Windows Operating System (OS), by including previous updates delivered over Windows Update as well as continuing incremental updates to the Windows 7 and Windows Server 2008 R2 platforms based on customer and partner feedback, and is easy for
Implementing Video Brush and Transparent Brush in Windows Presentation Foundation (WPF)
Implementing Video Brush and Transparent Brush in Windows Presentation Foundation (WPF) WPF extensively makes use of Media Features. System.Windows.Media is an important namespace in WPF. This namespace provides access to Brush objects and other media features. In this article, I will demonstrate a simple Media Brush feature in WPF. In WPF we have the following Brush Types: 1. DrawingBrush.2.
Programming Video Tutorials
This tutorial will cover the C# programming language, which is a modern object-oriented language created by Microsoft for the .NET framework. C# is mostly used for writing windows applications because it’s run on the .NET platform which is currently only fully implemented on windows. C# is a well-designed language in that it builds upon some of the best features of the major programming languages
Using the “Hisowa Simple PopUp Behavior” in a DataGrid
In the http://www.codeproject.com/KB/silverlight/HisowaSimplePopUpBehavior.aspx article, it states that there was assistance by me. My assistance was mainly running each build (Haruhiro simply emailed the project to me each day), trying a few implementations, and complaining: I need to pass a parameter, any parameter, of any type, in and get it in the response.I need to bind to an ICommand, that
ViewState: Various ways to reduce performance overhead
Table of ContentsIntroductionWhat is viewstateProblems with ViewStateCompressing and Decompressing ViewStatePoints to RememberSaving viewState on server Using SessionRemoving ViewState file from serverPoints to RememberUsing Hidden fieldRemoving ViewState file from serverConclusionFeedback and Suggestions History Introduction:In this Article, I am going to explore the View State. View state is
An Inside Look at Hibernate Types
In this article we will see how Hibernate provides built-in types that map to common database types. We'll also see how Hibernate allows us to implement and use custom types when these built-in types do not satisfy the application's requirements, or when we want to change the default behavior of a built-in type. As you will see, you can easily implement a custom-type class and then use it in the
Software Engineering Radio
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. Every ten days, a new episode is published that covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes
You Are Already a Windows Phone Developer
It has been said that if you know Silverlight then you are already a Windows Phone 7 developer. Jesse Liberty joins John Papa this week on Silverlight TV to explore that statement and demonstrate the side-by-side creation of both a Silverlight application and a Windows Phone application. Watch as Jesse cracks open Visual Studio 2010 and creates two similar applications: one for Silverlight and
Minggu, 22 Agustus 2010
Updated collection of great Silverlight/WPF/Windows Phone Data Visualization resources!
It's been a few months since I posted my previous collection of Silverlight/WPF Charting links. In the meantime, the April 2010 release of the Silverlight Toolkit was published with support for stacked series and significant performance improvements! And Windows Phone 7 has been steadily building momentum - it's handy that the Data Visualization assembly also works on Windows Phone! So there's
Really, Really, Big Numbers with BigInteger in .NET 4.0
The .NET Framework has literally thousands (maybe tens of thousands) of hidden gems. In the dark ages programmers learned a language’s grammar and a few dozen keywords and used—don’t say it—books to learn about a language’s function library. Literally, you could pick up a new language relatively quickly—except for C++—but it was still hard to use because one had to read analog books; Kindle didn’
NHibernating a WCF Data Service
WCF Data Services ships with two built-in query providers, a query provider for Entity Framework that uses the CSL model to infer all the service metadata for the exposed entities and their associations, and another provider, a Reflection Provider that uses .NET reflection over the exposed object model to infer the same metadata. The Entity Framework provider is usually the one that most people
Synchronize Your Class View
Ever wish you could get Class View to show your location in code? By default, it doesn’t: But you can run the View.SynchronizeClassView command (see vstipTool0070 on running commands): Read more: Visual Studio Tips and Tricks Posted via email from .NET Info
Possible issues with catching unhandled exceptions in .Net
As a rule, in every application I write, I always implement both the Application.ThreadException and AppDomain.UnhandledException events, to catch exceptions which were not caught by a try..catch block. There are three reasons behind this:Present a custom failure message to the user (something like Twitter’s fail whale message) instead of the default ugly (and unclear) error dialog, i.e. “XXX.exe
CodePlex ClickOnce publishing from directly within Visual Studio
This extension adds a toolbar to VS, that is similar to the Web Deployment toolbar. It allows you to set up a profile (you input your CodePlex username/password and a few other fields). Once that is set up, and your project is correctly set up for ClickOnce publishes, you can simply publish using the toolbar, instead of going to your project's web page, and creating a release there. You also
Removing Event Handlers using Reflection
Introduction I've recently been working on a pretty massive WinForms project which is very complex. We noticed that the application was 'leaking' memory (i.e. the memory usage was continually growing despite objects being correctly 'Disposed'). Having run the application through SciTech's excellent .NET Memory Profiler we discovered the cause : "Direct EventHandler Roots".One of the biggest
Creating a localized Windows Installer & bootstrapper
This series of articles is a complete end-to-end solution for building a localizable Windows Installer & Bootstrapper using some real-world requirements.Part 1: Introduction & SetupPart 2: Defining Conditions Part 3: LocalizationPart 4: Provision PrerequisitesDownload WixWindowsInstallerDemo - 1.44 MBIntroductionIt's been a while still my last article so I thought I'd write about my recent
How to unit test SQL Server 2008 database using Visual Studio 2010
In this article I’ll discuss about unit testing SQL Server 2008 Database project using Visual Studio 2010. As Unit tests test the part of the program integration testing becomes easier, moreover unit tests help enhancing, maintaining or extending a solution provided they are well written. This is first part of this series “How to unit test SQL Server 2008 database using Visual Studio 2010”.
Difference between @@IDENTITY, SCOPE_IDENTITY, IDENT_CURRENT
IntroductionIn most of our application scenario we need to get latest inserted row information through SQL query. And for that we have multiple options like @@IDENTITY, SCOPE_IDENTITY, IDENT_CURRENT All three functions return last-generated identity values. However, the scope and session on which last is defined in each of these functions differ. Compare @@IDENTITY : It returns the last
Project file must include the .NET Framework assembly 'WindowsBase, PresentationCore, PresentationFramework' in the reference list.
I was adding a splash screen to my Silverlight project and ran into a sudden compile problem with the ASP.NET web site. The compile error was: Project file must include the .NET Framework assembly 'WindowsBase, PresentationCore, PresentationFramework' in the reference list. I verified that the loose Silverlight xaml file was set to just content, with no build action. However, I kept getting
Tips & Tricks: How to change the output location of the Silverlight XAP?
In this Tips&Tricks, I will describe about changing the location of the output of your Silverlight application i.e. the .XAP file from it’s original “ClientBin” location to a different place. Developers sometimes need to put the XAP file in a specific directory based on their requirement. This trick will help them relocating the XAP file. Read the full post & if you have any queries or
Validating Data in Silverlight 4 Applications – IDataErrorInfo
Data validation is an important part of any application. If you've written code to validate data in Silverlight applications prior to the release of Silverlight 4, you've probably discovered that there isn't a great way to ensure that data is entered correctly and errors displayed properly by controls. The typical technique used for validating data was to throw exceptions within property setter
Silverlight Architecture
In the previous article I attempted to explain What Silverlight is and how it is being used more and more to develop business applications. In this article I will try to explain Architecture of Silverlight in simpler manner. Silver light has borrowed lot of things from existing Microsoft technologies. We can think silver light plug-in as a combination of some technologies from core .NET framework
Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net
We already know about DES algorithm methodThe RSA Public Key Encryption is useful method for Encryption and Decryption .The Code behind the Method is mention below. using System; using System.Collections; using System.Collections.Generic; using System.Data; using System.Diagnostics; using System.Security; using System.Security.Cryptography; using System.Text; using
Analyzing Silverlight Memory Usage: Part 1 – Obtaining Measurements
A View from the TopSo you’ve decided that it’s time to optimize the memory footprint of your Silverlight application. Before you’ll be able to do this analysis and optimization, you’ll need to understand a little bit about the way that Silverlight is structured. Though the Silverlight programming model that you’ve come to know and love is accessed via managed code, much of Silverlight’s
Controller Action Design in MVC
Validate, Act, Translate, and Respond. That’s about it.I’ve been trying to come up with a nice acronym for how to structure code in Actions for some time now, and this is the best I have managed. I wish it spelt a nice word – so if you’ve a better suggestion shout up. What I’m trying to say is – “don’t stuff all your business logic and all sorts of other code into your controller” and, “follow a
Tshark – Network Protocol Analyzer & Traffic Dumper
Tshark is actually part of the Wireshark package, and has some similar functionality. It does some cool stuff though so I thought it’s worthy of its own post.TShark is a network protocol analyzer. It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing a decoded form of those packets to the standard output or writing the packets
CITray
Project DescriptionCITray provides a "universal" tray notification system for potentially all continuous integration servers: a plugins system allows third-party to integrate their favourite CI system with CITray. This project is in a very very early development stage and there's no ready to use package to download yet.Read more: Codeproject Posted via email from .NET Info
A COOL WINDBG/SOS HIDDEN FEATURE
Every once in a while you run across an undocumented trick that totally and completely makes your day. A great example of that is the ability to debug MSBuild scripts in Visual Studio. Today I ran across another amazingly useful feature in WinDBG and SOS for .NET 4.0 that will save you countless hours of typing when analyzing minidumps. If you thought using .cmdtree to click your way to SOS
Launching WPF application using CLR hosting from C++ application
Recently, I was working with one of my developer customers. Customer's objective was to launch a WPF application from a C++ console based application. To achieve the same the customer was using CLRHosting and launching WPF application by calling ExecuteInDefaultAppDomain method. The customer developed the application, but when he tried to execute it, C++ application failed with a first
Silverlight Inspector
Project Description Silverlight Inspector is a utility for inspecting Silverlight XAP files. Developers and designers can use it to view the visual tree of an application and/or control and view assemblies within a XAP. How Does it Work? Silverlight Inspector works by downloading and modifying the XAP file you specify. The application downloads the given XAP, modifies its AppManifest.xaml,
How do I open the firewall port for SQL Server on Windows Server 2008?
Windows Firewall on Windows Server 2008 helps prevent unauthorized access to computer resources. However, if the firewall is configured incorrectly, attempts to connect to an instance of SQL Server may be blocked. To access an instance of SQL Server that is behind the firewall, you must configure the firewall on the computer that is running SQL Server. This article helps you open the firewall
Windows 7 Device Driver Book
From TOC on the publisher website it looks like it mainly covers WDF: KMDF + UMDF. Read more: Crash Dump Analysis Posted via email from .NET Info
FUSE(file system in userspace) for MS-SQL using C#
IntroductionEvery time I use Linux, I feel a piece of jealousy to see its filesystems. Not only NTFS, FAT32, but huge palette of data storages included GDocs etc. Now I can raise head up! Dokan rocks! What is Dokan?What Dokan is? Simply device driver encapsulated filesystem calls. By using proxy functions gives programatically create response for ReadFile, WriteFile, FindFiles and other core I/O
Visual Studio Database Guide
Project DescriptionPractical guidance for Visual Studio 2010 Database projects, which is focused on 5 areas:Solution and Project ManagementSource Code Control and Configuration Management Integrating External Changes with the Project SystemBuild and Deployment Automation with Visual Studio Database ProjectsDatabase Testing and Deployment VerificationThis release includes common guidance, usage
Website diagnostics page to diagnose your ASP.NET website
Introduction Whenever you change web.config file or deploy your website on a new environment, you have to try out many relevant features to confirm if the configuration changes or the environment is correct. Sometimes you have to run a smoke test on the website to confirm if the site is running fine. Moreover, if some external database, webservice or network connectivity is down, it takes time to
GDAL Wrapper for .NET and Mono
After struggling to get the csharp bindings for GDAL distributed with FWTools to work in Mono on Linux, I found some code from MonoGIS that enabled me to produce this library. It should work both with .NET and Mono. Read more: Codeplex Posted via email from .NET Info
Apache Hadoop: Best Practices and Anti-Patterns
Apache Hadoop is a software framework to build large-scale, shared storage and computing infrastructures. Hadoop clusters are used for a variety of research and development projects, and for a growing number of production processes at Yahoo!, EBay, Facebook, LinkedIn, Twitter, and other companies in the industry. It is a key component in several business critical endeavors representing a very
Secure or a Security Hole, hardening your Area
What’s the best way to secure a MVC area from anonymous users? A customer on the MVC Forum asked this question. Several of the responses where horrifyingly wrong. The first suggestion was the traditional ASP.NET WebForms approach, add a web.config to the folder you want to restrict. MVC uses routes and does not map URLs to physical file locations like WebForms, PHP and traditional web servers.
Anatomy of the T4 Text Template
Visual Studio 2010 uses T4 text templates for code generation and within this blog post we’ll examine the anatomy of a text template and see how easily code and other text can be generated.Let’s take a look at an example in Visual Studio, we’ll create a new Visual C# empty project and add two new text templates files, one named AdventureWorks.tt and the other named SqlServerSmo.tt. You can find
How to change the default browser in Visual Studio programmatically with PowerShell and possibly poke yourself in the eye
I've heard and seen lots of complaints about how it's hard to set the default browser that Visual Studio launches when you launch a debug session for a website.Step 0 - AdequateFolks spend time hunting around the Tools|Options dialog in Visual Studio looking for setting. They eventually realize it's not in there at all, but instead you have to right-click on an ASPX page within a Web Project and
HTTP Modules in ASP.NET Request life cycle
HTTP module is a .NET Framework class that implements the IHttpModule interface, they called as ISAPI filter in IIS stack so modules are counterpart in ASP.NET, have ability to intercept and handle system events and other modules events. Based on the web.config file, per application basis, HTTP modules can filter the raw data, the context, within the request. Note: all ASP.NET applications
Developing a (very) Lookless Silverlight Radial Gauge Control
This blog post describes the development of a lookless radial gauge control. In this post I will explore the use of an attached view model in order to move view specific properties and logic out of the control code in order to give a truly lookless control. Today I had to get up far too early in order to catch an early morning flight to Copenhagen with a connection in Amsterdam. What to do for
MSBuild Hands-On
This site provides a Hands-On MSBuild experience. Try the Lab and feel free to provide feedback.We are currently evaluating appropriate content for this site. Please check back soon for videos and more. Read more: MSDN Posted via email from .NET Info
Show Previous Versions
If you run Windows Vista or better operating system then you have an option you may not have noticed before called "Show Previous Versions". It shows up in various applications like Notepad: Read more: Visual Studio Tips and Tricks Posted via email from .NET Info
Undocumented Stored Procedures
Just a quick list of undocumented SPs, many of which are deprecated.Note, use caution using some of these ! But others are very useful (e.g. sp_msforeachdb)sp_checknamessp_columns_rowset sp_enumoledbdatasourcessp_fixindexsp_gettypestringsp_ms_marksystemobjectsp_msaddguidcolumnsp_msaddguidindexsp_msaddlogin_implicit_ntloginsp_msadduser_implicit_ntloginsp_mscheck_uid_owns_anything
Hunting down those expensive SPs
A query to find out which Stored Procedures are taking the longest to run ( in this example – the Top 10).I’m sure there are many other ways but this is a quick and easy script I found.SELECT TOP 10 obj.name, max_logical_reads, max_elapsed_time FROM sys.dm_exec_query_stats ACROSS APPLY sys.dm_exec_sql_text(sql_handle) HINNER JOIN sys.sysobjects obj on H.objectid = obj.idORDER BY
Porting Applications from C# to Android and iPhone just got easier..
MonoDroid helps you port C# and Visual Studio over to the android phone system.. It is currently in beta so if you are interested sign up today for the beta. It’s sister product Monotouch let’s you create iPhone applications in Visual Studio 2010. Several applications that have been “approved” for the Apple App Store are up and for sale already there.. Read more: Don's Mobile Design Blog
Debugging Tips with Visual Studio 2010
Today’s blog post covers some useful debugging tips that you can use with Visual Studio. My friend Scott Cate (who has blogged dozens of great VS tips and tricks here) recently highlighted these to me as good tips that most developers using Visual Studio don’t seem to know about (even though most have been in the product for awhile). Hopefully this post will help you discover them if you aren’t
Why does the primary monitor have (0,0) as its upper left coordinate?
By definition, the primary monitor is the monitor that has (0,0) as its upper left corner. Why can't the primary monitor be positioned somewhere else?Well, sure you could do that, but then you'd have to invent a new name for the monitor whose upper left corner is at (0,0), and then you're back where you started. In other words, it's just a name. You could ask, "Why can't starboard be on the
A Pluggable Architecture for Building Silverlight Applications with MVVM
ContentsIntroductionRequirementsDatabase SetupArchitectureMVVMPlugin LibraryExportPluginAttribute ClassPluginCatalogService ClassModel ClassViewModel ClassPlugin View Class RemarksHistoryIntroductionThis article is a follow-up of my previous article series on how to develop a Silverlight application using MEF, MVVM Light Toolkit, and WCF RIA Services. The architecture from that article series is
Sabtu, 21 Agustus 2010
מה נפוליאון היה שואל בראיון עבודה
איך אתם יודעים כמה המרואיין טוב?אחרי שראינו את מבנה תהליך הגיוס, נתמקד בשאלות שאנחנו רוצים לשאול את המועמד. השאלות צריכות לחשוף לנו מצד אחד את מבנה האישיות של המועמד, מצד שני את רמת המקצועיות שלו, יכולת הלמידה ובסופו של דבר רמת הכימיה בינכם וההתאמה שלו ל - DNA של הארגון. "אני לא רוצה גנרלים מוכשרים, חכמים, טובים, נאמנים או אחראיים. אני רוצה גנרלים שיש להם מזל"למען האמת, בד"כ לא קל להחליט האם
BinPack
BinPack is a portable security environment for Windows. With 100+ security tools in the repository, you can easily convert any system into a hacking platform in minutes. Read more: West Coats Hackers Posted via email from .NET Info
Jumat, 20 Agustus 2010
Use Linux? Now you can video chat too
If you’ve been wanting to use voice and video chat on Linux (our top video chat request), then we have good news for you: it’s now available! Visit gmail.com/videochat to download the plugin and get started. .. Read more: TechBlips Posted via email from .NET Info
Kamis, 19 Agustus 2010
Google Product Graveyard
Not all Google projects was success. Take a look on this listRead more: makeuseof.com Posted via email from .NET Info
Intel buys McAfee for nearly $8 billion
While most of the IT guys I know aren't fans of McAfee -- especially after that teensy little definition screwup which resulted in thousands of unwanted desktop support hours -- Intel is obviously a fan. In a press release this morning, the IT behemoth has announced that they're swallowing up McAfee for the princely sum of $7.7 billion dollars. Whether guys like you or I like it or not, McAfee
PS3 Hacked via USB Dongle
PSX-scene.com reports that the first PS3 modchip has been tested and confirmed working. Working off of a USB dongle, It appears to be relatively user friendly and claims to not void your warranty, and online gameplay works (at least for the time being). It's been a long time coming, cheers to the PS Jailbreak Guys. Read more: Slashdot Posted via email from .NET Info
Intercepting .NET SQL queries at runtime
SQL Server Management Studio has been designed for a very fast interaction of the Administrator and/or users with the SQL Server objects. We can see the objects by just clicking in the appropriate item, example to get the views or the users. The purpose of this article is to show how with a quick knowledge of assembler language and pointers, the possibility to extract useful information without
SQL Server - Identifying identity columns using TSQL
One of my friends asked me if it is possible to identify the tables with identiy columns as he wanted to run dbcc checkident command to all the tables of the database.There are actually many ways to identify identity columns from a table.The following three methods will list out the table names and the identity column name (if available) Method 1 : Use columnproperty function select
How to run IronPython code from C#
I’ve just got back from a joint session with Shay at the local .NET user group, I’ve presented IronPython after an excellent IronRuby session done by Shay.One example I didn’t have the time to show was how to run IronPython script from within C# code. After the session I was asked by a group member to show this exact demo. So without further ado here is how to run IronPython from within the
Rabu, 18 Agustus 2010
12 for 7 - The 12 Windows Phone 7 Development Jump Start sessions are now available on demand (we’re talking 600’ish minutes, yeah, 10 hours, of WP7 Dev’ness)
Today we are publishing the first in our training content led by our MVPs. Rob Miles and Andy Wigley led an incredibly well received live training course about a month ago, focused on getting developers trained up on building amazing applications and games for Windows Phone 7. We recognize that providing as much technical content as we can for the full range of developers is what developers
Getting a “System.ArgumentException: Value was invalid” when trying to sign data using SHA256CryptoServiceProvider
Here is the symptom: 1. You are using RSACryptoServiceProvider for computing SHA-2 signatures. 2. Doing this you get unhandled exceptions of type "System.ArgumentException" in mscorlib.dll saying "Value was invalid". 3. A typical call that failed was:byte[] signature = rsa.SignData(data, new SHA256CryptoServiceProvider()); 4. The SHA1CryptoServiceProvider did not reproduce the
Visual Studio 2010 solution build process give a warning about indirect dependency on the .NET Framework assembly due to SSIS references
Here’s how I saw the problem… Install SQL Server 2005. Afterwards, Install SQL Server 2008. (Integration Services or Management tools features are enough usually)Install your favorite new tool Visual Studio 2010.Create or Open a solution for your C# or VB application. The Solution properties should target the “.Net Framework 3.5” to have this problem. Add references to one or more of the SSIS
Tips for troubleshooting SQL Agent Error: 15281
Tips for troubleshooting SQL Agent Error: 15281Chris Skorlinski Microsoft SQL Server Escalation ServicesWe encountered an interesting problem the other day I thought I would post on ReplTalk. Customer call when they noticed the SQL Server Agent resources in their SQL 2008 clustered installation would not start. The following error appeared in the Windows Application and System Event log.
כך תגבירו את חשיפת הבלוג שלכם
כולם רוצים יותר חשיפה לבלוג והשאלה תמיד היא איך עושים את זה? אז פוסט זה אינו מדריך ב 10 צעדים לפסגת החשיפה אלא תוספת אחת חשובה – או כמו שאמרו פעם: “התוספת שתופסת”. לפני הכל אני רוצה לציין שאין תחליף לתוכן טוב וכתיבה איכותית ושום גימיק לא יעזור. ואחרי הפתיחה…Techie Tal ממליץ: סרגל הכלים של Wibiya. קודם כל מה הוא סרגל הכלים של Wibiya: מדובר בסרגל כלים שמופיע בתחתית הבלוג (כפי שמופיע בשלי) שבו אתם
SQL SERVER – Negative Identity Seed Value and Negative Increment Interval
I just had interesting conversation with one of my friend who said identity value can not start from Zero. I told him that it can even start from negative value. He did not believe it. I quickly come with example and he was surprised to see it. USE [AdventureWorks]GOIF EXISTS (SELECT * FROM sys.objects WHERE OBJECT_ID = OBJECT_ID(N'[dbo].[IdentityNegative]') AND TYPE IN (N'U'))DROP TABLE [dbo].[
Encrypt a File using DES (Data Encryption standard) Algorithm in ASP.NET
Security in cryptographyCryptography play important role in Security. Using Cryptography we can Encrypt and Decrypt the information in the Coded form.How we Encrypt the File using DES (Data Encryption standard) algorithm. 1.Open visual studio and create a project2.Add the following assembly on the pageusing Microsoft.VisualBasic;using System;using System.Collections;using
IIS 7.0 and 7.5 configuration reference
If you need to look up the IIS 7.0 and 7.5 configuration reference there is an easy to remember URL:http://www.iis.net/configreferenceEven better, if you are a bit old fashioned like me and like a compiled help file (CHM) the download links at the bottom of that page let you download those too. Read more: Notes from a dark corner Posted via email from .NET Info
Why I Love NServiceBus
NServiceBus was designed around the fallacies of distributed computing and faces each fallacies head-on rather than trying to sweep the them under the rug and hide from them while pretending that they don’t exist. It is only by acknowledging and addressing these fallacies that our systems become truly and effectively distributed. This is one the foundational principle of NServiceBus. It’s not
Acronis True Image completely free
Acronis True Image is a powerful disk imaging software that creates backups and recovers PC systems.Unfortunately this software is not free.However Acronis has an agreement with Seagate and Western Digital and provides a re-branded version of Acronis True Image completely free. This rebranded version of Acronis True Image comes in 3 versions.DiscWizard for Seagate Users, MaxBlast for Maxtor users
NHibernate Logging Providers
NHibernate Logging Providers makes it possible to use your favourite logger with NHibernate. You no longer have to use log4net. The new NHibernate (since NH3) logging abstraction makes this possible. The providers are developed in C# using .Net 3.5. NoteI will keep updating the logging providers with the current NH Trunk. When a version if NH3 is tagged I will provide a permanent Download for
SQL commands help site
This web site hold an reference to most of the PL/SQL commands with examples. Read more: _EnterSources_ Posted via email from .NET Info
C# המדריך הישראלי ל
שמי חיים מיכאל ואני בחרתי להקים בלוג זה עבור הספר "המדריך הישראלי ל-#C" שאותו התחלתי לכתוב בשנת 2009. באמצעות בלוג זה אני מקווה לקבל פידבקים מאנשים שמשתמשים בספר כדי להבטיח את שיפורו ועידכונו לאורך זמן. מניסיוני בשנים האחרונות בהוראת שפות תיכנות מתקדמות באקדמיה, בצבא, בחברות פרטיות ובקורסים לקהל הרחב אחד החסמים הוא חוסר הידע בשפה האנגלית. זמינותם של ספרים בעברית עוזרת באופן משמעותי בתחילת דרכם של
SQL SERVER – Download SQL Server 2008 Interview Questions and Answers Complete List
I was getting many request to update SQL Server Interview Questions and Answers I had written couple of years ago. I have modified the original document a bit and corrected few of the typos and errors. I have really enjoyed going over all the Interview Questions and Answers. It has been the most popular subject always on this blog. I am in process of updating that with few new questions and
Windows Kerberos Authentication Bypass
OVERVIEW:A vulnerability was found in all recent Windows operating systems. The attack allows a malicious user to physically login on a target host in a Kerberos-based network, under the assumption that he knows a valid user principal and has the ability to manipulate network traffic. Our research shows that all recent versions of the Microsoft Windows operating systems are vulnerable to the
Selasa, 17 Agustus 2010
NHibernate tutorial
Working with object-oriented software and a relational database can be cumbersome and time consuming in today's enterprise environments. NHibernate is an object/relational mapping tool for .NET environments. The term object/relational mapping (ORM) refers to the technique of mapping a data representation from an object model to a relational data model with a SQL-based schema. NHibernate not
Model View Controller for Android
This weekend, Gaurav released his initial implementation of the MVC pattern for Android at http://blogs.mastergaurav.com/2010/08/14/model-view-controller-mvc-for-android/. This opens up several possibilities for anybody looking to create an application on Android. The implementation, even though is an initial early push, has a robust infrastructure. Here's an initial analysis and outline of the
Drill Into .NET Framework Internals to See How the CLR Creates Runtime Objects
Since the common language runtime (CLR) will be the premiere infrastructure for building applications in Windows® for some time to come, gaining a deep understanding of it will help you build efficient, industrial-strength applications. In this article, we'll explore CLR internals, including object instance layout, method table layout, method dispatching, interface-based dispatching, and
Git – Cloning and pushing via https (Linux and Windows)
Unfortunately the Eclipse team provider EGit does currently not support to use HTTPS for cloning and pushing. Fortunately the Git command line supports this (under Linux without problems):git clone https://vogella@github.com/vogella/de.vogella.rcp.example.git // do some changesgit push https://vogella@github.com/vogella/de.vogella.rcp.example.gitIf you are on Windows and if you are using msysGit
.NET Best Practice No: 1: Detecting High Memory consuming functions in .NET code
Introduction and GoalThanks a lot Mr. Peter SollichCLR Profiler to rescueFeatures of CLR profilerDo not user CLR on production and as a starting tool for performance evaluationHow can we run CLR profiler? Issues faced by CLR profilerThe sample application we will profileUsing CLR profiler to profile our sampleThat was a tough way any easy waySimplifying results using commentsAs said before do not
FireMon
What is FireMon? FireMon® is software that helps you manage your firewalls. FireMon will plan and report on any changes to the firewall policy, increasing visibility and reducing the cost of making changes. It will show you which of your rules are unused and how traffic flows through each rule, letting you clean up unnecessary access and tighten down existing rules. And, with continued,
AlgoSec Firewall Analyzer
The AlgoSec Firewall Analyzer (AFA) is comprehensive, multi-vendor policy management solution -- with exclusive topology-aware technology -- that intelligently automates analysis of your firewall, router and VPN infrastructure. AlgoSec Firewall Analyzer is a unique solution that helps you achieve the following: Eliminate RisksEnsure ComplianceOptimize Your Security PolicyEffectively Manage
Fire Walker
What is Fire Walker?Fire Walker is software that allows you to operate someone else's computer via a connection or through the internet, you can see their screen, send files, receive files, chat, draw and use their computer as if you were sitting in front of it. Read more: Nexus Concepts Posted via email from .NET Info
Test your antivirus software
The following site give an examples of viruses or malware programs - so you can check you current antivirus. Read more: Offensive Computing Posted via email from .NET Info
Senin, 16 Agustus 2010
Actipro WPF Studio
Actipro WPF Studio is a bundled suite of professional user interface controls and components for Windows Presentation Foundation (WPF).To make the bundle extremely cost effective, licenses for WPF Studio are priced to provide more than a 60% savings over the cost of purchasing all Actipro's WPF controls individually! The company behind WPF Studio, Actipro Software, has been making top-notch
ASP.Net – Calling JavaScript from Code Behind
.Net gives us the ability to call javascript code from the code behind. This means that you don’t have to write the javascript code in the “Source” of the aspx page. Just for an example, let’s say that you have a button on a form that just want to popup an alert that says “HEY” when it is clicked. protected void btnHey_Click(object sender, EventArgs e){ StringBuilder sb = new StringBuilder();
When do I need to use GC.KeepAlive?
Finalization is the crazy wildcard in garbage collection. It operates "behind the GC", running after the GC has declared an object dead. Think about it: Finalizers run on objects that have no active references. How can this be a reference to an object that has no references? That's just crazy-talk! Finalizers are a Ouija board, permitting dead objects to operate "from beyond the grave" and affect
Different ways to get Identity of New Inserted Rows in SQL Server
There are different methods to know the Identity Value of a newly added row.Let us consider the following example:--Create a TableCREATE TABLE test(id int identity(1,1),names varchar(100) )--Insert DataINSERT INTO test(names) SELECT 'testing'--Get Identity Value that is Populated in the Current ScopeSELECT scope_identity()--Get Identity value that is Populated in the Current Session SELECT @@
SQL SERVER – Finding the Occurrence of Character in String
This article is written in response to provide hint to TSQL Beginners Challenge 14. The challenge is about counting the number of occurrences of characters in the string. Here is quick method how you can count occurrence of character in any string. Here is quick example which provides you two different details.How many times the character/word exists in string?How many total characters exists in
Extended WPF Toolkit – New RichTextBox Control
There has been a new control added to the Extended WPF Toolkit project on CodePlex called the RichTextBox.The RichTextBox extends the System.Windows.Control.RichTextBox control that represents a rich editing control which operates on FlowDocument objects. The RichTextBox control has a Text dependency property which allows a user to data bind content to the RichTextBox.Document property. The
NHibernate Visual Designer from Mindscape
The developers at Mindscape have a fantastic Visual Designer for their LightSpeed O/R Mapper that integrates into Visual Studio. I absolutely love the roundtrip synchronization between the database and domain model as well as the added support for refactoring, inheritance, migrations, etc. The number of features and ease-of-use shows Mindscape's deep commitment to making the developer experience
Get GC Information in Silverlight
To demonstrate this I used the bing’s world leader search page and here is the urlhttp://www.bing.com/visualsearch?q=World+leaders&g=world_leaders&FORM=Z9GE74# Steps to get the GC information areStart a cmd or powershell as admin , this required to collect ETW tracingBrowse the above mentioned webpage using IEIssue the command “PerfMonitor.exe /process:4180 start” where 4180 is the internet
Got Error 0x80070520 When Binding Certificate to Web Site on IIS 7
One of my customers had a problem when using one certificate on IIS 7. This certificate once been used on IIS 6 and it works fine. This means there is no problem with the certificate itself. Here are the steps. Open the IIS MMC, open the Site Bindings, and then add a HTTPS binding. Select this certificate from the certificates drop down list, and click OK. Then, got follow error: A specified
Minggu, 15 Agustus 2010
Hosting a WCF REST Service with WebServiceHost
WebServiceHost factory helps us to host a WCF REST Service in managed application. This class is derived from ServiceHost class and automatically enables webHttpBinding and webHttpBehavior on the service End points. In this article, I will explain What is WebServiceHost Factory class?What is its function?Where to use it?One sample on hosting WCF REST Service using WebServiceHost.What is
My new home page, rejuvenated [Updated collection of great Silverlight/WPF/Windows Phone Data Visualization resources!]
It's been a few months since I posted my previous collection of Silverlight/WPF Charting links. In the meantime, the April 2010 release of the Silverlight Toolkit was published with support for stacked series and significant performance improvements! And Windows Phone 7 has been steadily building momentum - it's handy that the Data Visualization assembly also works on Windows Phone! So there's
SQL Server - Writing IF-ELSE code in TSQL
IF..ELSE clause in SQL Server is used for decision making. You can use it to run a set of statements based on certain conditions. The following are the examples on how to use it effectively for various purposes. declare @status bitset @status=1if @status=0 print 'The event is closed'else print 'The event is started'if @status=0 Begin print 'use id column in the where clause' select * from #t
LightSwitch Architectural Overviews
Last week we announced LightSwitch, a new tool for developers to make it easier to build line of business applications. You gave us a lot of great feedback, thank you for all of the comments and questions! One of the key requests was to provide more information about the architecture of the applications that are built with LightSwitch. The team has been working hard to publish a set of
Step-by-Step Guide to create a File Explorer in Silverlight 4
Table of ContentsIntroductionBackgroundBasic knowledge on the APIPrerequisiteSetting up ProjectConfigure Application for Out-of-Browser SupportConfigure Application for "dynamic" keyword Support Play with the XAMLCreate the basic UICreate the Template for drive selectorCreate the Template for folder browserImplementing CodeCreate the basic classesCreate Dependency PropertiesImplementing
Automatic Authentication with the Request Builder
The Request Builder feature in recent versions of Fiddler includes a number of enhancements, including the ability to follow HTTP redirections, and to automatically authenticate (using the current user's credentials) to servers that demand authentication using the NTLM or Negotiate (NTLM/Negotiate) challenge-response protocols. Following redirections is simple enough, but properly constructing a
Issues using Response.Redirect in Silverlight
I was working with one of customer's today, on a Silverlight application. The customer wanted to make the browser redirect the client to a different URL. As in the current scenario the re-direction was to be made to an internal Silverlight Page within the application we had to use something like- Response.Redirect();http://localhost/SilverlightSampleTestPage.aspx#/AboutIn the above example we are
WPF Inside Out: Dispatcher
Back in this post I showed you how you can have a look at the original source code of .NET, including original comments and variable names. In this post we’ll see a few interesting things about WPF’s Dispatcher class. But first some background on the subject. WPF Thread AffinityAlmost every WPF element has thread affinity. This means that access to such an element should be made only from the
כיצד לגרום להתקנת תוכנה בעת לחיצה פעמיים על סיומת של קובץ לא מוכר באמצעות Group Policy – שתי דרכים
דרך ראשונה – שימוש באופציה של Software Instllaton : ב GPO ברמת ה Software Installation לא כל מוצר נועד להפצה בדרך זו, ולכן המוצר לא רושם את הסיומות במאפייני המוצר תחת ה Software Installation, במקרה הזה לא נוכל להשתמש באופציה של ההתקנה אוטומטית בעת לחיצה על סיומת הקובץ. אציג כאן דרך לרישום המוצר ע"י עריכה באמצעותADSIEDIT . אתן דוגמא למוצר Acrobat Reader של חברת Adobe. על מנת להפיץ את המוצר יש צורך
Writing optical discs using IMAPI 2 in powershell
Today I’m going to show how to use Image Mastering API (IMAPI2) in powershell. I’m using that technique when need quickly to burn some data, in format, which is not exposed by default in Explorer. This also can be useful if you are developing some code on IMAPI2 and need some proof of concept, if that can be done using build-in windows image mastering API. IMAPI2 is written using COM, so no
NHibernating a WCF Data Service
WCF Data Services ships with two built-in query providers, a query provider for Entity Framework that uses the CSL model to infer all the service metadata for the exposed entities and their associations, and another provider, a Reflection Provider that uses .NET reflection over the exposed object model to infer the same metadata. The Entity Framework provider is usually the one that most people
SQL Compact ASP.NET Membership provider
Project DescriptionImplementation of a ASP.NET Membership provider for SQL Server Compact 4.0, for use with Forms Authentication for web sites using only SQL Server Compact 4.0. This project provides files that contain a Membership provider, a Role provider for ASP.NET and a SQL Compact database. How to use the provided files1. Change SqlCeMembershipProvider::encryptionKey to a random hexadecimal
Silverlight Startup Best Practices
IntroductionStartup is important because it is the first interaction that your user has with your application. You get one chance to impress, and failure to do so could mean the user closing and/or uninstalling your application permanently. What follows is a set of tips and tricks you can use to supercharge the startup path of your Silverlight application. The Cardinal RuleThere is, essentially
ASP.net MVC HTML5 Helpers Toolkit
The ASP.net MVC HTML5 Helpers Toolkit contains a rich set of controls that you can use to build ASP.net websites using HTML5. Harness the power of HTML5 and start using it in your applications. It's lightweight and can be a great step in getting your website up to speed with HTML Read more: Codeplex Posted via email from .NET Info
“Fade in” Screen in Silverlight 4
I’ve had a couple request to create a fade in screen using Silverlight/Expression Blend 4 and decided that I would add it to my blog. The whole point of this application, is to present information to the user and once they click on the screen for it to appear in the background. This could be used in numerous ways for a business application. (click to shop, click for more info, etc). Before diving
Sabtu, 14 Agustus 2010
Debugging Silverlight in Firefox
Just a little tip I learned recently but if you are an avid firefox user and you want to debug Silverlight 4 applications in the firefox browser, then here are a few steps you need to take to make that happen, since it doesn't work right out of the gate. Step 1In firefox, at the address bar type "about:config" without the quotes. If done correctly you will see a little warning.Step 2Accept the
OpenSolaris is Dead
Oracle is killing spree, after losing the ground over the top innovators of Sun, Oracle will do what is inevitable - Kill the Sun’s Open source. And no doubt, their baseless allegations against Google on Java usage in android also intend to do the same. Few months back they made Solaris 10 a shareware which was limited from Free to 90days trial. We knew this was coming — a leaked Internal mail
Jumat, 13 Agustus 2010
How Secure Is My Password?
How Secure Is My Password? Find out how long it would take a standard desktop PC to crack your password.Read more: How Secure Is My Password? Posted via email from .NET Info
Kamis, 12 Agustus 2010
Trendistic
Trendistic is a tool that allows you to track trends on Twitter, similarly to what Google Trends does for Google searches. It gathers tweets as they are posted, filters redundant ones and compiles the rest into one-hour intervals. This way, it shows how the frequency of one, two, three and four-word phrases fluctuate over time. The result is a visualization of what is popular and what is not
Valve Releases Updated Alien Swarm For Free With Code Base
baronvoncarson tips news that today Valve released an updated version of Alien Swarm, a popular Unreal Tournament 2004 total conversion mod. The creators of the mod were hired by Valve, and they've helped turn it into a stand-alone game running on the Source engine. Valve is also releasing the code base for Alien Swarm and an SDK. The game is available for free on Steam Read more: SlashdotRead
Is Open Source SNORT Dead?
Is Snort, the 12-year-old open-source intrusion detection and prevention system, dead? The Open Information Security Foundation, a nonprofit group funded by the US Dept. of Homeland Security to come up with next-generation open source IDS/IPS, thinks so. But Snort's creator, Martin Roesch, begs to differ, and in fact, calls the OISF's first open source IDS/IPS code, Suricata 1.0 released this
Rabu, 11 Agustus 2010
Cache On Delivery — Memcached Opens an Accidental Security Hole
jamie spotted this eye-opening presentation (here's a longer explanation) about how easy it is to access sensitive data on many sites using memcached, writing "If you already know what memcached is, skim to slide #17. The jaw-drop will happen around slide #33. Turns out many websites expose their totally-non-protected memcached interface to the Internet, including gowalla, bit.ly, and PBS."
Flash / Frash Ported to iPhone 4 !! [Video]
The title says it all! Yes, you can now get very alpha version of Flash (aka Frash) running right on your iPhone 4. Previously, we showed you how to install Flash (Frash) on iPad. And now folks at Grant Pannell site has managed to compile an iPhone 4 version of Flash. The credit for this of course goes to Comex, the guy behind Spirit and JailbreakMe tools for iOS devices. Without his hard work,
Rubik's Cube Now Solvable in 20 Moves
A few years ago we reported that it had been proven that Rubik's Cubes could be solved in 23 moves. Well now that number is down to just 20. Proving it required 35 years of computer time donated by Google to get it done. Read more: Slashdot Posted via email from .NET Info
Extreme Memory Oversubscription For VMs
Virtualization systems currently have a pretty easy time oversubscribing CPUs (running lots of VMs on a few CPUs), but have had a very hard time oversubscribing memory. GridCentric, a virtualization startup, just posted on their blog a video demoing the creation of 16 one-gigabyte desktop VMs (running X) on a computer with just 5 gigs of RAM. The blog post includes a good explanation of how this
Debugging WCF Clients and Services
Debugging WCF services from the client through to the service is much easier when attaching the debugger to either the service or both the client and the service.In the past, I have debugged services by firing up the client application and manually attaching to the WCF Service Host – which in this case is the ASP.NET worker process. This process is quite cumbersome. Visual Studio has feature that
Selasa, 10 Agustus 2010
Silverlight Tutorilals
Couple of days ago, I started working on writing Silverlight Tutorial for Beginners on request of Mr. Sheo Narayan (Web Master) from DotNetFunda.com. I was busy for last few days to publish it online. I was really excited for it. Today, I am announcing my first Chapter of the Silverlight Tutorial for the public view. It will be a continuous process to complete the full tutorial. Please keep an
TSQL Challenge 36 - Create a graph/Chart with TSQL
It is time for us to get 'graphical' and this challenge is to draw a graph using TSQL.Seq Data----------- -----------1 22 33 44 4 5 56 47 38 49 410 411 312 213 214 315 316 417 4 18 5Here is how your graph should look
Getting the Silverlight Toolkit Controls to work on WP7
As we get closer to the launch of WP7 (Windows Phone 7) more and more developers are starting to play around with the SDK and build out applications. Since WP7 supports Silverlight 3+ (3+ means it is basically Silverlight 3 w/ some tweaks to work in a multi-touch environment) it is logical to think that you should be able to use the Silverlight Control Toolkit for Silverlight 3. However if you
Everybody thinks about CLR objects the wrong way (well not everybody)
Many people responded to Everybody thinks about garbage collection the wrong way by proposing variations on auto-disposal based on scope:"Any local variable that is IDisposable should dispose itself when it goes out of scope." "You should be able to attach an attribute to a class that says the destructor should be called immediately after leaving scope.""It should have promised to call finalizers
When does an object become available for garbage collection?
As we saw last time, garbage collection is a method for simulating an infinite amount of memory in a finite amount of memory. This simulation is performed by reclaiming memory once the environment can determine that the program wouldn't notice that the memory was reclaimed. There are a variety of mechanism for determining this. In a basic tracing collector, this determination is made by taking
NET Debugging and C++ Debugging Resources
The following is a summary of tools and resources that you might be interested in after taking the .NET Debugging and/or C++ Debugging courses we offer at Sela.[Shameless plug: If you haven’t taken these courses yet, I strongly suggest that you check them out. Between the two of them they have more than 20 hands-on debugging exercises which basically guarantee that you’re going to come out a
Are Private Members Inherited?
When I interview someone, I start the question phase with simple object-oriented questions to get a feel for the person. Am I interviewing someone who writes rote procedural code or do I have someone in front of me who thinks in terms of objects and relationships. Even more intriguing, am I talking to a functional wunderkind who will enlighten me in my own journey through code? I start off with
August 2010 Security Release ISO Image
This DVD5 ISO image file contains the security updates for Windows released on Windows Update on August 10th, 2010. The image does not contain security updates for other Microsoft products. This DVD5 ISO image is intended for administrators that need to download multiple individual language versions of each security update and that do not use an automated solution such as Windows Server Update
Building your First End to End StreamInsight Application (Going Deep on Adapters)
So you’ve heard about this shiny StreamInsight thing, perhaps from my last post, and want to build something for yourself and understand how all of this stuff fits together. At this point you should have your Visual Studio environment up and running, along with StreamInsight installed (if you don’t, have a look at this post). Every StreamInsight application consists of the following core
Debugging a Bugcheck 0x109
I want to share with you a recent experience where 64-bit Windows Server 2008 servers at a customer location were encountering bugcheck 0x109 blue screen crashes. In 64-bit versions of the Windows kernel PatchGuard is present. If any driver or application attempts to modify the kernel the PatchGuard will generate the bugcheck (CRITICAL_STRUCTURE_CORRUPTION) mentioned below. PatchGuard protects
Understanding Commands: Arguments and Switches
Keyboard: CTRL + ALT + A Menu: View -> Other Windows -> Command Window Command: View.CommandWindow Versions: 2008,2010 Published: 8/10//2010 Code: vstipTool0069Folks I want to get your input on the possible title for the new book. Give me your comments at http://blogs.msdn.com/b/zainnab/archive/2010/08/09/proposed-book-title.aspx Some commands take arguments and switches so you can quickly
The Anatomy of a WPF Application
PrefaceThere a lot of advanced articles on WPF and their desktop applications reflect a lot of experience. But sometimes the learning curve can be steep, as may be a large gap between those at the advanced level and those at the beginning level. This article is an attempt to step through the building process. In any form of programming, the best way to learn how to program is to read well-written
log4net tutorial pt 1: getting started
I've found logging to be one of the most effective debugging and troubleshooting techniques in my engineering bag, but I'm surprised at how infrequently other people seem to use it. The arguments orbit around the notion that adding any form of logging won't be that helpful, or that it will slow the application to a crawl. My experience with application logging has been very positive, and quite
Creating a Silverlight Application that uses navigation framework and Viewbox control
Introduction:The objective of this article is to present the Viewbox control. I have also explained here the navigation framework of Silverlight 3.Viewbox Control:This control is a content decorator. It can resize its content based on its own size.It takes one child element.The most important property of Viewbox control is the Stretch property. It can take four values:Fill: When the Stretch
Case Study - How Last.fm Uses HornetQ for Their Streaming Infrastructure
This case study describes how Last.fm uses HornetQ to improve the performance and availability of its streaming infrastructure.What Is Last.fm?Last.fm is an online music service that tracks the music people listen to and generates recommendations and custom online radio stations based on this information. It allows user to track the song they listen to (by scrobbling the song) from Internet radio
Senin, 09 Agustus 2010
Everybody thinks about garbage collection the wrong way
Welcome to CLR Week 2010. This year, CLR Week is going to be more philosophical than usual.When you ask somebody what garbage collection is, the answer you get is probably going to be something along the lines of "Garbage collection is when the operating environment automatically reclaims memory that is no longer being used by the program. It does this by tracing memory starting from roots to
Browsing Android 2.2 (Froyo) Source code in Eclipse
No matter how good an API documentation is, if you have access to the code. The code is the best documentation.Android is huge in scale becoming automatically poor in documentation. It’s getting better and better everyday but so far I’ve needed to pop the hood for a more thorough look every now and then. The source code isn’t distributed with the SDK, and my beloved jadclipse just goes
Securing MySQL in 10 minutes
Much like my last entry on memcache, I'm not trying to write the ultimate security guide for securing a mysql server... I'm just outlining the kinds of steps you should take to have a level of security on par with the locks on your car... Enough to encourage the average plunderer to move along to another target. Listen Only Where You Want to HearJust like memcache, the default mysql install is
Using relative addresses for services in Silverlight applications
One of the biggest complaints about how Add Service Reference works for Silverlight applications is that the address it creates on the client config file (ServiceReferences.ClientConfig) points to the VS "test" web service (Cassini), something like http://localhost:12345/Service1.svc. It works perfectly when you debug on your machine (F5), but when you deploy it elsewhere (e.g., http://
Programmatically Invoke the C# Compiler
Imagine you have just generated some code using a code generation technique, wouldn’t it be really cool to then programmatically call the C# language compiler and generate assemblies from the generated code? Let’s imagine we used an Xslt transformation to generate some code: XslCompiledTransform transform = new XslCompiledTransform(); transform.Load("Program.xslt"); transform.Transform
Google and Yahoo Add to Calendar Html Helpers for Asp.net MVC
I’ve been working on implementing some iCal functionality for the my gig guide website – Gigpig so users could easily add concert dates to their calendars. This works fine and dandy if you have some desktop program to handle iCal files. I have however been informed that the cool kids roll with Google Calendar (and some strange people with Yahoo?!). I dug around a bit and found you can easily
Garbage Collection Algorithm with the use of WeakReference
We all know .NET objects deallocates memory using Garbage Collection. Garbage collection is a special process that hooks in to the object hierarchy randomly and collects all the objects that are not reachable to the application running. Let us make Garbage collection a bit clear before moving to the alternatives. Garbage Collection AlgorithmIn .NET, every object is allocated using Managed Heap.
Windows Identity Foundation (WIF) By Example Part I – How To Get Started.
This post reflects on the steps I needed to perform to create my first Windows Identity Foundation (WIF) application from zero to Hello World. It can serve as a bootstrap for starting developing Claims-Aware ASP.NET application using Windows Identity Foundation (WIF). This post quickly goes through preparing the development environment for using Windows Identity Foundation (WIF) and it walks
VirtualBox 3.2 Update
Oracle released another update for the 3.2.x VirtualBox line today. The latest release of the desktop virtualization application for x86 hardware includes various stability improvements and a number of changes. Today's version 3.2.8 improves upon the 3.2.6 update released in June. 3.2.8 allows users to attach a single disk to several VMs without needing any additional tools and features. There
Silverlight Exception: SaveFileDialog Dialogs must user-initiated
נדרשתי ליצור כפתור ב-Silverlight שלחיצה עליו תבצע 2 פעולות:1. "קבלת" נתונים מ-Web Service של MOSS 2. שמירה לתוך קובץ באמצעות SaveFileDialogהוצג Exception עם פרטים SaveFileDialog Dialogs must user-initiated בתוך המתודה MOSS_WS_GetDataCompleted לאחר הרצת הקוד הבא:private SaveFileDialog dialog = new SaveFileDialog();private string StringData = ""; try{ dialog.DefaultExt = ".txt"; dialog.Filter =
winAUTOPWN – Windows Autohacking Tool
winAUTOPWN is a TooL to Autohack your targets with least possible interaction. The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is easy to use and doesn’t require a lot of support of other
Resource Files and ASP.NET MVC Projects
If you try some of the traditional ASP.NET approaches to localization and internationalization in an MVC application you’re likely to run into a couple interesting* obstacles. Resx Files In App_GlobalResourcesUsing resource files in App_GlobalResources from your controller code will break your unit tests.When you drop a .resx file in the special App_GlobalResources folder, the IDE uses the
Silverlight Navigation Part 2
In the second of two navigation videos we filmed for Silverlight TV, Karl Shifflett joins John Papa to demonstrate how he made some simple extensions to the navigation API in Silverlight in order to solve very common business problems. Karl demonstrates how to navigate away from a screen and leave markers indicating that the screen is still active even though it is hidden. He also demonstrates
Different culture settings between IIS and ASP.NET’s Development Server
A few years ago I’ve stumbled on a very annoying scenario on my machine: I had used ASP.NET’s development server (the web server that pops up when debugging web applications in Visual Studio) while developing a web application and when I moved my web application to my local IIS, suddenly the culture of the thread changed from my local culture (he-IL) to a Greek culture (el-GR). This was a few
How To Change Visual Studio Default Editor
Yes I know this sounds strange, but some times this can be very useful, For example, let say we are .NET developers but really addicted to NotePad++, and each time I click on File.CS file I want notepad++ to open it… There are two ways to do it:The Ugly Way – RegistryUnder HKEY_CURRENT_USER\Software\Microsoft\VisualStudio\10.0 find the “Default Editors” key (create if doesn't exists). Create
Langganan:
Postingan (Atom)