Sabtu, 27 November 2010
Controlling a Pixel shader’s parameters with reflection
IntroductionCurrently I’m working on an image editor, which will use Pixel Shader effects. To save a lot of time manually hard coding each effects control interface I built a simple reflection based controller system for the effects. This article shows the technique behind it. This is my first article that I publish here on CodeProject. The CodeReflection controll is achived using a few custom
NSurgeon MSIL Manipulation Library
Project DescriptionNSurgeon project is based on Mono.Cecil library. The project is composed of the next modules:- SDK - Aspect Oriented Programming- Decompiler - Assemblies decompiler. Supports for MSIL, C#, VB.NET, F# - planned - Immunity - obfuscator - plannedRead more: Codeplex Posted via email from .NET Info
Subterranean IL: Custom modifiers
In IL, volatile is an instruction prefix used to set a memory barrier at that instruction. However, in C#, volatile is applied to a field to indicate that all accesses on that field should be prefixed with volatile. As I mentioned in my previous post, this means that the field definition needs to store this information somehow, as such a field could be accessed from another assembly. However, IL
Managing your web site with Mercurial
I use the Mercurial source control system for (nearly) every one of my free software projects. Recently, I began using it to manage all of my web sites. If you are like me, you likely have a web server and SQL server of some sort running on your desktop, permitting you to work locally. I make many frequent changes to my sites. Sometimes things don't go so well for various reasons. I may need to
Session: C#'s Greatest Mistakes
C# is a lovely language in many ways... but it's not perfect. Mistakes made early in a language or platform's development are often impossible to fix afterwards, so this talk isn't a set of suggestions for the C# team. Instead it's a reflection on what we might do if we had a time machine. Which features which seemed like a good idea at the time have actually caused the development community
XamlQuery/WPF - The Write Less, Do More, WPF Library
What is XamlQuery/WPFXamlQuery/WPF is a lightweight yet powerful library that enables rapid development in WPF. It simplifies several tasks like page/window traversing; finding controls by name, type, style, property value or position in control tree; event handling; animating and much more. XamlQuery/WPF provides two approaches for finding controls.Using Selector Queries, andUsing Managed Helper
5 Cloud-Oriented Operating Systems Available Now
Google announced Chrome OS in 2009, promising the cloud-centric operating system would be available in 2010. Unfortunately, it will be next year before Chrome OS is widely available, Engadget confirmed this week. Google may release its own Chrome OS netbook next month, and there are already experimental builds available based on the Chromium OS source code. But if you don't want to wait for a
XmlDSigEx XML Digital Signature Library
Project DescriptionThe XmlDSigEx library is an alternative to using the SignedXml classes in the .Net Framework. It addresses some of the shortcomings of the standard types particularly in regards to canonicalisation and the enveloped transform. It is currently under development. Read more: Codeplex Posted via email from .NET Info
Jumat, 26 November 2010
Kinect + Javascript hack shows potential for web interfaces
Developed by the clever folks at MIT Media Lab – Fluid Interfaces Group, DepthJS is a web browser extension that allows any any web page to interact with Microsoft Kinect via Javascript. Released last night this video shows the potential that DepthJS has for developers and is open source, and available to download at GitHub. DepthJS has a plethora of possibilities for online interfaces including
Privilege escalation 0-day in almost all Windows versions
Today proof of concept code (source code, with a compiled binary) of a 0-day privilege escalation vulnerability in almost all Windows operating system versions (Windows XP, Vista, 7, Server 2008 ...) has been posted on a popular programming web site. The vulnerability is a buffer overflow in kernel (win32k.sys) and, due to its nature allows an attacker to bypass User Access Control (UAC) on
Grab Up to 768 MB Free Dropbox Space Through Social Media Connections
Need a little more space in your free Dropbox file syncing account? Already run through the "Getting Started," .EDU referrals, and all your friends? If you hook Dropbox up to Twitter and Facebook, you can snag up to 768 MB more storage. You don't even have to actually post anything about Dropbox to your Twitter or Facebook accounts to activate the majority of the 128 MB upgrades listed at
Improving Application Startup Time
Visual Studio is a wonderful development environment, whose IntelliSense®, integrated debugging, online help, and code snippets help boost your performance as a developer. But just because you're writing code fast doesn't mean you're writing fast code. Over the few past months, the CLR performance team met with several customers to investigate performance issues in some of their applications. One
Future of Personal Computing: Post-iPad Concepts
Note, we did not say that iPad is the future of personal computing - it is too early to say, for example, how well it performs with various professional applications - but iPad is certainly a step toward more popular use of computing (even your grandma might get enticed to touch its screen and shiny silver back). However, the question remains, what's beyond iPad, and is there anything our there
Four Facebook Alternative Alternatives
Now that Diaspora, which is building an open-source distributed social network, has launched in private alpha, I figured it’d be a good idea to remind you that there are several alternatives to that particular Facebook alternative, some of which have been around longer and in more advanced stages of development. Note that there may be more initiatives that I haven’t heard of or simply didn’t or
The Seven Principles You Need to Know to Build a Great Social Product
Social products are an interesting bird. For even the most experienced product designer, social products prove an elusive lover. While there are many obvious truths in social products, there are also alot of ways to design them poorly. Especially when you are deep in the moment making pixel-level decisions trying to remember what’s important, things may not be so clear. The only magic I’ve found
How to Triple Boot Your Hackintosh with Windows and Linux
We've walked through how to triple-boot your Mac with Windows and Linux, but if you're using a shiny new Hackintosh, the process is a bit more complicated. Here's how to get all three operating systems up an running on your new PC. While the Chameleon bootloader (the default boot screen for your Hackintosh) is a great friend to Hackintosh builders, Windows and Linux try to muck everything up by
Kinect hacks let you control a web browser and Windows 7 using only The Force (updated)
Hacking the Xbox 360 Kinect is all about baby steps on the way to what could ultimately amount to some pretty useful homebrew. Here's a good example cooked up by some kids at the MIT Media Lab Fluid Interfaces Group attempting to redefine the human-machine interactive experience. DepthJS is a system that makes Javascript talk to Microsoft's Kinect in order to navigate web pages, among other
Infinitec Infinite USB Memory Drive review
The idea behind Infinitec's Infinite USB Memory Drive is actually quite straightforward, but we've found that when we tell friends and acquaintances about the unit, it often boggles their minds. So, we'll try to keep it real simple: This red plastic stick is a 802.11b/g/n WiFi radio disguised as a USB flash drive. And when we say "disguised", we're not just talking about the stick's size, but its
OpenVizsla hopes to bring USB sniffing to the everyhacker
Remember that Kinect hack how-to? A key figure in the story was the use of a USB analyzer that was plugged in-between the Kinect and the Xbox to pick up on USB traffic and pull out a log that could be used for hacking. Well, there's a new 'OpenVizsla' project on KickStarter that's aiming to build open source hardware that can put this typically expensive tech ($1,400+) in the hands of more
Streaming over HTTP with WCF
Recently I had a customer email me looking for information on how to send and receive large files with a WCF HTTP service. WCF supports streaming specifically for these types of scenarios. Basically with streaming support you can create a service operation which receives a stream as it’s incoming parameter and returns a stream as it’s return value (a few other types like Message and anything
Kamis, 25 November 2010
Building a Go Compiler in Go
One of the biggest design decisions we made with erGo™ was the decision to write the compiler itself in the Go language. It’s had a huge impact on every level of our development process. In the end, we believe that we absolutely made the right decision. On the other hand, we completely understand why the original Go team didn’t do it that way. It would’ve been close to impossible. The only reason
Lucandra.NET
Project DescriptionLucandra.NET is a Lucene + Cassandra implementation written in C# which is based on the Lucandra (Java) project by Jake Luciani. Apache's Lucene is a high-performance full-text search engine, and Apache's Cassandra is a promising NoSQL database, originally developed by Facebook. Note: This page is currently under construction and I'm working on the documentation as much as I
The Small Things: Converting a Existing Web Application to a MVC Web Application
I have an existing web application that contains a couple of WCF services, but today I also wanted to add some pages and decided that I wanted to create them with ASP.NET MVC2. This is the steps I took to get the MVC pages to run just fine in my existing application. First of all I added references to System.Web.Mvc and System.Web.RoutingI created a dummy MVC project so that I could see what was
Efficiently Generating SHA256 Checksum For Files Using C#
I’m building a file synchronization with the cloud application and I want to store a checksum with the file so that I can verify later that the file is what I think it is. I’m not a crypto guy so I searched around the internet for a solution. I found lots of examples and settled on this one that uses SHA256 for the job. I also found some comments saying that it would be more efficient to wrap
Visual Studio Sharing Files Between Projects
Normally when an existing file is added to a project within Visual Studio, the file is copied into the project folder. There is an option to link to the file, rather than duplicate it, allowing files to be shared between multiple projects. Adding Existing Files to a ProjectWhen you are creating a project using Visual Studio you can create and add new files or include files that already exist.
Enabling email notifications in the SQL Agent for Alerting & Job monitoring
To enable email notifications in SQL Agent you will need to follow the following steps:1. Configure Datbase Mail: create an email SMTP account and corresponding Email Profile. To do so please follow directions outlined in the blog post: "SQL Database Mail - Send Emails from SQL Server". 2. In SSMS (SQL Server Managment Studio) select SQL Server Agent node and right click on the properties (see
10 Secret Reasons Why You Lose Clients
Have you ever lost a client and then wondered why?Of course, you can always ask your client what went wrong, but many will not tell you. They may be afraid of hurting your feelings or they may just want to avoid a potentially unpleasant confrontation with you. Since I use freelancers once in a while that puts me in the unique position of being a freelancer and also an occasional client of
Inside Native Applications
IntroductionIf you have some familiarity with NT's architecture you are probably aware that the API that Win32 applications use isn't the "real" NT API. NT's operating environments, which include POSIX, OS/2 and Win32, talk to their client applications via their own APIs, but talk to NT using the NT "native" API. The native API is mostly undocumented, with only about 25 of its 250 functions
Rabu, 24 November 2010
RawWrite for Windows
RawWrite (or rawrite) is an essential tool for creating boot disks and other floppy disk images. Traditional rawwrite programs do not run under modern versions of windows so here is the Win32 version which does. Read more: chrysocome.net Posted via email from .NET Info
Rootkit In a Network Card Demonstrated
Guillaume Delugré, a reverse engineer at French security firm Sogeti ESEC, was able to develop proof-of-concept code after studying the firmware from Broadcom Ethernet NetExtreme PCI Ethernet cards... Using the knowledge gained from this process, Delugré was able to develop custom firmware code and flash the device so that his proof-of-concept code ran on the CPU of the network card. Read more:
One Giant Cargo Ship Pollutes As Much As 50M Cars
One giant container ship pollutes the air as much as 50 million cars. Which means that just 15 of the huge ships emit as much as today's entire global 'car park' of roughly 750 million vehicles. Among the bad stuff: sulfur, soot, and other particulate matter that embeds itself in human lungs to cause a variety of cardiopulmonary illnesses. Since the mid-1970s, developed countries have imposed
Seagate To Pay Former Worker $1.9M For Phantom Job
The jury in a Minnesota-based wrongful employment case delivered a verdict ordering disk-drive manufacturer Seagate to pay $1.9 million to a former employee who uprooted his family and career at Texas Instruments in Dallas to move to Minnesota for a job that did not exist. The man was supposed to be developing solid state drive technology for Seagate but was laid off months later. 'The reason
$1.3 Billion Oracle-SAP Verdict Is Biggest Ever For Software Piracy
After an 11 day trial whose highlights included the hilarious “Where In The World Is HP CEO Leo Apotheker?“ the Oracle vs. SAP intellectual property case has finally ended today in a whopping $1.3 billion dollar verdict, “The largest amount ever awarded for software piracy” according to Oracle co-president Safra Catz. Before the trial, SAP admitted that its 2005 acquisition TomorrowNow pirated
AJAX 2: What is coming with XMLHttpRequest Level 2? - JS Classes blog
XMLHttpRequest, often referred as AJAX, is going to get a new and improved specification version named Level 2. This article gives an overview of what is planned for XMLHttpRequest Level 2 and how it can be used to improve Web applications usability. ContentsIntroductionBrief history of XMLHttpRequestXMLHttpRequest limitationsAJAX 2: What is XMLHttpRequest Level 2?ConclusionsIntroductionFor those
Open-Source Social Network Diaspora Goes Live
Diaspora, a widely anticipated social network site built on open-source code, has cracked open its doors for business, at least for a handful of invited participants. 'Every week, we'll invite more people,' stated the developers behind the project, in a blog item posted Tuesday announcing the alpha release of the service. 'By taking these baby steps, we'll be able to quickly identify performance
Visual Studio 2010 Slowdown: VMDebugger is the Culprit
I recently wrote how Visual Studio 2010 is very slow on my fast PC, taking 25-30 seconds to start up. Thanks to a Microsoft employee who helped me but wishes to remain anonymous, my problem is solved. The VMWare add-in, VMDebugger, causes Visual Studio 2010 to load very slowly on my fast PC.Note that your mileage may vary, and VMDebugger may not ultimately be responsible. Software is so complex
11 Things to Do When a Client Files Bankruptcy
Bankruptcy filings are up considerably. So, don't be surprised if you open your mail and find a letter from an attorney telling you that one of your clients or customers is seeking relief from the courts to solve his or her financial troubles. The bankruptcy process is full of rules that the debtor and creditor must follow. However, bankruptcy is not as formal as say civil court, says Victoria
Grid, Cloud, HPC … What’s the Diff?
It’s always nice when another piece of the puzzle comes into focus. In this case, my time speaking at the first ever International Super Computer (ISC) Cloud Conference the week before last was well spent. The conference was heavily attended by those out of the grid computing space and I learned a lot about both cloud and grid. In particular, I think I finally understand what causes some to
HTTP Post Denial Of Service: more dangerous than initially thought
What’s special about this denial of service attack is that it’s very hard to fix because it relies on a generic problem in the way HTTP protocol works. Therefore, to properly fix it would mean to break the protocol, and that’s certainly not desirable. The authors are listing some possible workarounds but in my opinion none of them really fixes the problem. The attack explainedAn attacker
10 Essential Tools for building ASP.NET Websites
I recently put together a simple public website created with ASP.NET for my company at Superexpert.com. I was surprised by the number of free tools that I ended up using to put together the website. Therefore, I thought it would be interesting to create a list of essential tools for building ASP.NET websites. These tools work equally well with both ASP.NET Web Forms and ASP.NET MVC. Performance
Passing Configuration Data to the Master Page in ASP.NET MVC
One of the common activities that I have found myself doing lately whenever I create a new project is to identify a way of loading configuration information and customizing the behavior of the Master Page. The way I initially went about solving this problem was to create a base class and have all of my Page ViewModel’s inherit from it. This caused two different things that I had to constantly
Ice Meteorite Found with Extraterrestrial Life-Forms
Duane P. Snyder will announce the discovery of the first and only known ICE METEORITE containing EXTRATERRESTRIAL LIFE-FORMS on November 30, 2010 at 10:00am at the Ramada Inn Conference Center, 1555 Phoenix Road, South Haven, MI 49090. SOUTH HAVEN, Mich., Nov. 21, 2010 /PRNewswire/ -- Duane P. Snyder will announce the discovery of the first and only known ICE METEORITE containing
Common WinDbg Commands (Thematically Grouped)
Common WinDbg Commands (Thematically Grouped) 1) Built-in help commands 9) Exceptions, events, and crash analysis 17) Information about variables Collapse all examples 2) General WinDbg's commands (clear screen, ..) 10) Loaded modules and image information 18) Memory PDF 3) Debugging sessions (attach, detach, ..) 11) Process related information 19) Manipulating memory ranges 4)
Setting up kernel mode debugger in windows
IntroductionWhen ever there is a bug in your program you usually open a debugger(GDB,visual studio debugger etc) to fix it, but how do you debug a bug in the operating system? Do you load the running OS in to debugger? Is it possible? The simple answer is no, Because even the debugger works with the help of OS. Its a catch22 situation History Earlier developers used two machines one is the
Installing QT 4.7.x for VS2010
had some issues installing QT on windows with vs2010 so I thought I'll share the solution that worked for me. I'm using win7 64 bit , vs2010, qt 4.7.1 What do I need ? qt add on for visual studio (qt-vs-addin-1.1.7.exe) qt open source distribution (qt-everywhere-opensource-src-4.7.1.zip) Installation Process download and install qt add on for visual studio download qt open source distribution
Build a Pandora clone with Silverlight 4
For the uninitiated, Pandora is a popular Flash-based internet radio service: users create their own radio stations by seeding an artist or song, and by giving a thumb-up or thumb-down to played songs. The software responds by playing more of what the user likes based off these inputs. In this article, I'm going to show you how to build a Pandora-like music service using Silverlight 4, WCF, and
Why does machine.config contain invalid Xml content after installing .Net 3.5 patches?
For quite a few times, I heard customers would hit this issue after installing .Net 3.5 patches or repair 3.5 on Windows Vista or Windows 2008 Server. Basically the machine.config file contains some invalid Xml content and applications using configuration do not work, especially for IIS-hosted applications. The main problem is that the WCF 3.5 installer (WFServiceReg.exe) did not handle the
zlibnet - c# zlib wrapper library
Project Descriptionzlibnet - c# zlib wrapper libraryFeatures:-zip-unzip-compression/decompression stream-fast, since using the unmanaged zlib library-64bit support Not supported:-encryption/password protection-multi volume archives-UTF8 filenames/comments (can be added if needed, but not added yet since not supported by Windows Compressed Folders)-ZIP64 (can be added if needed, but not added yet
David Reveman lands GPU acceleration for Moonlight…
David Reveman had a great birhtday present for me today. He just completed the hardware accelerated support for Moonlight.You can watch two quick videos I made today with David: Hardware acceleration with Moonlight and Moonlight 3D Perspective Support. In Moonlight hardware acceleration is used for a number of features:Applying 3D transforms to any Silverlight objects (drawings, images, videos).
Top picks from a honkin’ big list of Windows Phone 7 tips
I don’t have a Windows Phone 7 handset yet but I am really hoping for one in the new year so I’ll be bookmarking this list of 72 tips from Pocket-lint for future reference.In the meantime though here’s my top picks of their tips. 5. Removing apps from the Start screenYou like the app, but you don’t really want it on your Start screen anymore. No worries. Hold your finger on the tile in question
Debugging: Failed to Enable Constraints
I have a DataSet that has had a new field added to it recently. When my console application runs, it was throwing a “Failed to enable constraints” exception. I needed to find out which column in the DataSet was causing the error, so a co-worker suggested I create a temporary data adapter/set, so I can examine the GetErrors() method. Once the exception occurs, access the GetErrors() property using
Debugging SQL Queries, Functions, & Stored Procedures with SQL Management Studio’s Integrated Debugger
Working with Stored Procedures and functions on a database tier can be time consuming, hard to debug and sometimes just difficult to get clarity on what is “happening”. A rarely discussed feature of Microsoft SQL Management Studio is its inbuilt debugging features. These allow you to see exactly what is going on, and step through your logic in a similar fashion to working in Visual Studio. I
Hexa.xText
Project DescriptionHexa.xText is a .Net command line tool to extract text from source files for later translation, just like the GNU xgettext does.Extracted text are placed inside po files that must be compiled into satellite assemblies through the included PO2Assembly MSBuild task. Hexa.xText will extract any string contained in a method call like the following:t("String to extract");where t is
Selasa, 23 November 2010
Palm Top Theater
YoutubeThe International Film Festival Rotterdam has brought cinema to the large screen. We think that the intimacy of small mobile screens are giving new impulses to the cinematic experience. V2_ will present a series of films and animations small enough to watch in the palm of your hand. Acquaint yourself with a new 3D film experience on your iPhone or iPad at the Palm Top Theater exhibition.
Design barter
We design, you pay whatever and whenever you like.Submit a job now »Read more: Design Barter Posted via email from .NET Info
RHEL 6 released
Red Hat is pleased to announce the world-wide availability of Red Hat Enterprise Linux 6. This is a milestone event for Red Hat as we once again push forward and upward our leadership position in the market. Red Hat Enterprise Linux 6 delivers dramatic improvements in reliability, security, performance, scalability and infrastructure flexibility. Red Hat Enterprise Linux 6 has been specifically
Nessus 4.4.0 Released!
Tenable is excited to announce a new release of the Nessus vulnerability scanner! This is a major release (moving from 4.2.2 to 4.4.0) and includes several new features and enhancements, including the addition of scan scheduling and enhanced reporting. The GUI and web server have both been updated and will be released through the plugin feed. The enhancements included in the plugin feed will be
The Placebo Effect Not Just On Drugs
It seems the placebo effect isn't just valid on drugs. It's also a fact on elevators, offices and traffic lights. An article by Greg Ross says: 'In most elevators installed since the early 1990s, the 'close door' button has no effect. Otis Elevator engineers confirmed the fact to the Wall Street Journal in 2003. Similarly, many office thermostats are dummies, designed to give workers the illusion
Game Design Evolution – Yeah, That’s About The Size of It…
I don’t know who is originally responsible for this image, but it pretty much sums everything up nicely, and not just for first-person shooters or map design: Read more: Tales of the Rampant Coyote Posted via email from .NET Info
Forget 200 lines, Red Hat speeds up Linux with 4 lines of code
Speeding up Linux, doesn't necessarily have to be a gargantuan task and it doesn't have to be done by Linus Torvalds either.On Monday, Torvalds praised a new 200 line Linux kernel patch that was going to make Linux faster for all. Inside of the same week, a new userspace patch has emerged that can likely do the same thing, but with less code and even better performance. "I really wonder why logic
Create jQuery Loading Animation to make your website Attractive
A loading animation is important to signal the user that the application is still doing something and the user should wait for an action to complete. This gets even more important when you use Ajax in your webapp. Using the Ajax library jQuery it is very easy to create a loading animation that will be shown whenever an Ajax request is running.First of all, you need an animated gif with a loading
Attachmate To Acquire Novell For $2.2B Cash
Novell has agreed to be acquired by Attachmate Corporation for $6.10 per share in cash, in a transaction valued at approximately $2.2 billion. The Boston Globe reports that the deal also includes the sale of some intellectual assets to a consortium organized by Microsoft. Attachmate plans to operate Novell and SUSE as separate business units. Here is the press release. Read more: SlashdotRead
How to Quickly Create New Google Documents with a Shortcut or Hotkey
If you’ve switched over from Microsoft Office to Google Docs, you’ve probably noticed there’s just one problem: creating a new document takes far too many steps. Here’s how to create new documents with single click—or even a shortcut key. Note: you can use these shortcuts to create Documents, Spreadsheets, and Presentations, but we’ve not yet figured out how to make a shortcut for a new Drawing.
lxc Linux Containers
The container technology is actively being pushed into the mainstream linux kernel. It provides the resource management through the control groups aka process containers and resource isolation through the namespaces. The linux containers, lxc, aims to use these new functionalities to provide an userspace container object which provides full resource isolation and resource control for an
Beta Version of Nevercookie Released
Anonymizer has released a beta version of Nevercookie, the recently announced Firefox plugin designed to protect against the Evercookie, a JavaScript API built and made available to prove that the more you store and the more places you store it, the harder it is for users to control a Web site's ability to uniquely identify their computer. Evercookie is a more persistent form of cookie that
Lamebook
Funny Facebook Statuses, Fails, LOLs and More Read more: Lamebook Posted via email from .NET Info
Privoxy
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Privoxy is Free
Direct3D 10/11 Is Now Natively Implemented On Linux!
It's a pity Luca Barbieri or any Mesa / Gallium3D developers are not at Oktoberfest as they are deserving of more than a few Maß of Augustiner. In fact, today a new Gallium3D state tracker was pushed into Mesa and it's perhaps the most interesting state tracker for this open-source graphics driver architecture yet. It's a state tracker that exposes Microsoft's DirectX 10/11 API on Linux! And it's
12 Ubuntu Derivatives You Should Consider
It's no secret that Ubuntu 10.10, or Maverick Meerkat, is one of the most user-friendly Linux distributions of all time for business and home users.What many people don't realize, however, is that there are several other Linux distributions out there that are also based on Ubuntu and offer many of the same advantages. Some are focused on a specific niche; others are simply variations on the same
.Net Memory. Problem with uncontrolled LOH size & possible solution
Introduction Managed memory in .Net is separated on “Stack” memory and some kind of “heaps”. The most important types of “heaps” is SOH (Small Object Heap) and LOH(Large Object Heap). From the names of memory types becomes clear that SOH - stores only small objects & LOH stores large objects. In this article I will consider only possible problem with LOH memory. Other memory types are out of
CUDA-Multiforcer – GPU Powered High Performance Multihash Brute Forcer
The Cryptohaze Multiforcer is a high performance multihash brute forcer with support for per-position character sets, and very good performance scaling when dealing with large hash lists. As an example, on a list of 10 hashes, the Cryptohaze Multiforcer achieves 390M steps per second on a GTX260/216SP@1.24ghz card. On a list of 1.4 million hashes with the same card, performance drops to 380M
HowTo: MSDeploy & MSBuild
Big Picture from MSDeployWe start with the big picture of MSDeploy. The aim is to build a Deployment Package to make the delivery of software easier. Therefore we have several providers which are used to, for example, pack the data bank or the main ASP.NET Files into one package. Now you are able to publish this package quit easy with MSDeploy. MSDeploy should be installed on the Server too. At
Consequences of using variables declared __declspec(thread)
As a prerequisite, I am going to assume that you understand how TLS works, and in particular how __declspec(thread) variables work. There's a quite thorough treatise on the subject by Ken Johnson (better known as Skywing), who comments quite frequently on this site. The series starts here and continues for a total of 8 installments, ending here. That last page also has a table of contents so you
Agile versus Waterfall Videos
The Rise and Fall of Waterfall is a cute video (although with a somewhat annoying soundtrack.. watch with the sound off). YoutubeMy favorite part of it is the screenshot (seen above) showing the waterfall stages and their respective impacts. The poor Operations folks at the bottom remind me of Ken Johnston’s quote: Ops beware; unpleasant matter tends to roll downhill and you are near the
Thread Local Storage
Windows, like practically any other mainstream multithreading operating system, provides a mechanism to allow programmers to efficiently store state on a per-thread basis. This capability is typically known as Thread Local Storage, and it’s quite handy in a number of circumstances where global variables might need to be instanced on a per-thread basis. Although the usage of TLS on Windows is
WAITFOR what ?
I raised a feedback to sqldocfb@microsoft.com regarding the documentation for the WAITFOR statement in BOL. It has been the same ever since SQL 2000 and I think it is wrong WAITFOR { DELAY 'time_to_pass' | TIME 'time_to_execute' | [ ( receive_statement ) | ( get_conversation_group_statement ) ] [ , TIMEOUT timeout ] } But if it was consistent with other items in BOL such as RAISERROR
XQuery for the Non-Expert
It’s time for a new series to blog posts – XQuery for the Non-Expert. The purpose for these posts will be to provide a foundation for using XQuery against XML.Myself, I am not an XQuery expert. These posts are summarizing what I know and understand. Some of this knowledge and understanding is changing on a regular basis. Please correct me if something incorrect is posted here. To prepare for
Part 1 of 4 : Tips/Tricks for Silverlight Developers.
I wanted to create a series of blog post that gets right to the point and is aimed specifically at Silverlight Developers. The most important things I want this series to answer is :What is it? Why do I care? How do I do it?I hope that you enjoy this series. Let’s get started:Tip/Trick #1)What is it? You can easily enable a visual Framerate counter inside your Silverlight Application. The end
MonoDevelop 2.4.1 is out
MonoDevelop 2.4.1 has been released. This release is focused mostly on bug fixes, but we still managed to add a few nice features:we now support .NET 4.0 projects;the Gtk# designer now works on OSX; better native OS integration on Mac and Windows.Improved support for XBuild projectsRead more: Miguel de Icaza's web log Posted via email from .NET Info
Thumbnail Previews in the IDE Navigator
n vstipTool0023 (http://blogs.msdn.com/b/zainnab/archive/2010/05/17/using-the-ide-navigator-vstiptool0023.aspx)I showed you how to use the IDE Navigator. This next tip comes from Paul Harrington on the Visual Studio Team. In Visual Studio 2008 when you used the IDE Navigator you also were able to see thumbnail previews of the documents in the list. However, this feature was removed from Visual
Coded UI Editor – Guide
Feature Pack 2 is Available! and it’s Awesome!The feature pack comes with some great features and the one I want to talk about in this post is – Coded UI Test Editor.I’ve recorded a simple CUIT on Windows Calculator that adds to numbers and show the result. Getting StartedAfter you install the Feature Pack 2 you will notice that Double Click or Right click on “UIMap.uitest” file will open a new
Senin, 22 November 2010
Геолокация в Windows 7 без GPS
Много ли вы видели ноутбуков, которые оснащены GPS датчиком? Примерные оценки можно посмотреть тут, 58 штук из 4380, то есть 1.3%. Прямо скажем — не много. Трудно назвать все причины, по которым производители не оснащают портативные компьютеры, в общем-то, недорогим чипом, но наша заметка как раз о том, как ваш ноутбук снабдить функциональностью геолокации, даже если GPS датчика у вас нет. А
25 Fresh inspiration website design
Web designers always stay up to date on current trends, with seeing how to structure web layout, choose color palettes, work with usability, and understand the overall design process. It’s important to frequently check out other inspirational designs to see how you can apply new trends to your own project and continue to go forward as a designer. There are plenty of creative and beautiful
"Save To My Skydrive" Come True
More than two years ago, I wrote a blog post of my view on Cloud Computing, titled "Save To My Skydrive". Back then both OfficeLive and Google Docs provided online Office applications and collaboration tools. But one thing missing in both offerings was the feature that allows one to easily save local docs to the cloud, by simply clicking "File"-->"Save To Skydrive" in MS Office software. Today,
uClibc
uClibc (aka µClibc/pronounced yew-see-lib-see) is a C library for developing embedded Linux systems. It is much smaller than the GNU C Library, but nearly all applications supported by glibc also work perfectly with uClibc. Porting applications from glibc to uClibc typically involves just recompiling the source code. uClibc even supports shared libraries and threading. It currently runs on
Kinect hack creates world's greatest shadow puppet (video)
Hey Xbox 360 Kinect owners, want to spice up those family shadow puppet shows? Then check out the installation prototype created by Emily Gobeille and Theo Watson using an Xbox Kinect connected to a laptop using the libfreenect Kinect drivers and ofxKinect. The openFrameworks system tracks the elbow, wrist, thumb, and tips of the fingers to map a skeleton onto the movement and posture of an
Google Offered To Buy Twitter For $2.5-$4 Billion – Sources
Earlier this year, as part of an on-going dialogue between Google's corporate development team and Twitter, Google floated the idea of an acquisition with a price around $2.5 billion, we've heard from a source close to an executive involved in the talks. We'd caution that this was not a formal offer – more of a casual offer to offer. The overture was refused – even characterized as "insulting." A
Razer Nostromo gaming keypad supplants Belkin's n52te Speedpad, does it proud
Think you've been gaming on the PC for awhile? If you can't vividly remember gushing over this thing (and scrounging up pennies from under the couch in order to finance one), move along. If, however, you're still the proud owner of an attic-bound Belkin Nostromo n52, you can definitely prepare yourself for a healthy dose of nostalgia here. After co-developing Belkin's n52te Speedpad a few years
zButterfly torrent client focuses on current movie releases
new Windows BitTorrent client called zButterfly has a twist that sets it apart from the competition: a menu of current movie releases, including the hottest flicks that are still running in theaters. zButterfly has an easy-to-use interface for searching and browsing the releases, and operates entirely on torrentless downloading via magnet links. Even the most clueless downloader can use
Intel Talks 1000-Core Processors
An experimental Intel chip shows the feasibility of building processors with 1,000 cores, an Intel researcher has asserted. The architecture for the Intel 48-core Single Chip Cloud Computer (SCC) processor is 'arbitrarily scalable,' According to Timothy Mattson 'This is an architecture that could, in principle, scale to 1,000 cores,' he said. 'I can just keep adding, adding, adding cores Read
Microsoft Lync: Ushering in a new generation of communications
Today, with our customers and partners in New York City, we are celebrating the launch of Microsoft Lync -- the next generation of Office Communications Server. Earlier this year, Exchange 2010, SharePoint 2010 and Office 2010 launched, delivering the best productivity experience across the PC, phone and browser. Together, these products provide the productivity backbone of modern businesses and
Useful SQL Server System Stored Procedures You Should Know
System Stored Procedures are useful in performing administrative and informational activities in SQL Server. Here’s a bunch of System Stored Procedures that are used on a frequent basis (in no particular order): System Stored Procedure Descriptionsp_help Reports information about a database object, a user-defined data type, or a data typesp_helpdb Reports information about a specified database
One possible reason why ShellExecute returns SE_ERR_ACCESSDENIED and ShellExecuteEx returns ERROR_ACCESS_DENIED
(The strangely-phrased subject line is for search engine optimization.)A customer reported that when they called ShellExecute, the function sometimes fails with SE_ERR_ACCESSDENIED, depending on what they are trying to execute. (If they had tried ShellExecuteEx they would have gotten the error ERROR_ACCESS_DENIED.) After a good amount of back-and-forth examing file type registrations, a member of
MySQL Database Backup Utility
IntroductionOne of the most frequent questions on forums is how to back up MySql databases directly from a .NET application. Unfortunately, unlike Access, SqlLite etc., it is not really a case of just copying a file and renaming it, you really have to get down and dirty and basically recreate the SQL that creates all tables and inserts all data back into tables from scratch. There are
Why do I recommend switching over from MyISAM to Innodb!
MyISAM has been the default storage engine for MySQL for years now. But that is soon going to change. With MySQL 5.5, Innodb is going to be the default storage engine (and I am pretty pleased about that, no more new users complaining about MySQL not being ACID compliant). But why do I recommend Innodb over MyISAM. Following are the reasons:I will start of with reasons not so obviously discussed
IIS Smooth Streaming HD Sample Content
OverviewThe following high-definition (HD) Smooth Streaming video presentations are encoded with Microsoft Expression Encoder 4 into multiple bit rates that allow you to experience on-demand Smooth Streaming in action: Big Buck Bunny H.264 720p.zip. A sample Smooth Streaming video presentation encoded with H.264 video and AAC audio codecs in 8 standard bit rates.Elephants Dream H.264 720p.zip. A
How to Detect if a Method is Overridden
Suppose you want to know if (the class of) a particular object overrides a virtual method. For an example of this see OpenJDK's Thread.isCCLOverriden() (line 1573).In Java the obvious way to do this would be to use reflection. On the CLR there is another way that is both more accurate1 and more efficient. Here's the MSIL method from IKVM's java.lang.Thread.isCCLOverridden() implementation:.method
Visual Studio Add-In For creating Vista Gadget
Project Description The absence of tools in Visual Studio that can help developers to create Vista gadgets is strange and disappointing, in my opinion. I hope it's a temporary state, but now, I want to show you some tools that can help you to develop Vista gadgets using only Visual Studio 2008 or 2010 IDE. These tools include Visual Studio template for creating Vista gadgets and Visual Studio
MSI Explorer - A quick and simple means to spelunk MSI’s
Most of us are quite familiar in creating MSI or Setup for our applications. By using a MSI, we can make sure all dependencies for running the application will be placed properly. MSI is the best option available on Windows OS for packaging and distributing our application. For .NET developers, Visual Studio presents lot of features in creating setup and deployment projects for our application.
OpenID Starter Kit for ASP.NET MVC
OpenID Starter Kit for ASP.NET MVCOverviewOpenID Starter Kit for ASP.NET MVC is first and foremost it is a learning tool. I've learned a lot about OpenID while developing this and commented the code a lot. If you want to use it in this way I running the application and stepping through the code. Apart from it's education value you can also use it as a starter kit for your ASP.NET MVC based web
.NET LwVCL (visual components library)
IntroductionLwVCL (http://www.lwvcl.com) is fast, flexible, small visual components library that provides rich set of various UI components (~30) and is thrifty to system resources usage. We have been developing the project for more than two years. It grows fast, keeping its best features. The next generation of the library is not just a components set - it's a solid GUI toolkit that adds
Minggu, 21 November 2010
WPF & Silverlight: Интерфейс ICommand и его назначение
"Для чего нужен интерфейс icommand wpf" – подобные запросы зачастили в последнее время, решил написать небольшую статью на эту тему.Интерфейс ICommand представляет основу для команд в паттерне MVVM. Он реализует известный паттерн – Команда. Более подробно об паттерне MVVM есть здесь: http://msdn.microsoft.com/ru-ru/magazine/dd419663.aspx, да и я писал несколько раз на эту тему, воспользуйтесь
Fxcop ASP.NET Security Rules
Project DescriptionFxcop ASP.NET security rulesThis is a set of code analysis rules aiming at analyzing ASP.NET and ASP.NET MVC security against best practices. The rules can be used by Visual Studio 10 Ultimate or FxCop v10 standalone. InstallationSimply run the installer and specifiy the rules folder of your FxCop installation. For Visual Studio it's normally C:\Program Files (x86)\Microsoft
Code-Signing Best Practices
This paper provides information about code signing for the Microsoft Windows family of operating systems. It provides guidelines for:• Chief technology officers (CTOs) or chief security officers (CSOs) who deploy the code signing infrastructure. • Test lab managers who manage the process of test signing and verifying applications.• Build engineers who sign and verify applications for use with
Building and Using Expression Blend Behaviors
Behaviors are a cool way of adding functionality to XAML design elements in Expression Blend. The idea is that some rich functionality that would be hard for a designer to do can be wrapped in a way that can then be used as a drag-and-drop feature to add that functionality to a XAML element in Expression Blend. A Behavior then is an ‘object’ that implements a certain base class and member(s) so
Goodbye Google App Engine (GAE)
Choosing GAE as the platform four our project is a mistake which cost I estimate in about 15000€. Considering it's been my money, it is a "bit" painful.GAE is not exactly comparable to Amazon, Rackspace or any of this hosting services, because it is a PaaS (Platform as a Service) rather than just a cluster of machines. This means that you just use the platform and gain scalability, high
Build Interactive Content Slider using Accordion Control in Silverlight 4
The Accordion is a web control that allows you to provide multiple panes and display them one at a time. It is like having several CollapsiblePanels where only one can be expanded at a time. The Accordion is implemented as a web control that contains AccordionPane web controls. Each AccordionPane control has a template for its Header and its Content. We keep track of the selected pane so it stays
Facebook Removing Gmail From List Of Third Party Email Providers
Something is up on the Facebook vs. Google data reciprocity front. It looks like Facebook is removing Gmail from the list of third party email providers on “Find Friends”, whereas we were seeing direct link downloads to Gmail contacts still offered as an option just a couple of days ago. It gets stranger. Some new users who sign up with their Gmail accounts can still see the option to add
Whoa, Google, That’s A Pretty Big Security Hole
Facebook would probably just consider this a feature, but the rest of us will definitely consider this a big security hole. The creator of http://guntada.blogspot.com (don’t visit that site just yet) emailed us this morning to explain. If you’re already logged in to any Google account (Gmail, etc.), and visit that site, he’s harvested your Google email. And proves it by emailing you immediately.
Interacting with javascript in Silverlight
ometimes you need to interact with javascript from your Silverlight application. Sometimes you even need to have javascript manipulate the state of your Silverlight objects. In this post I’m going to show you how you can pass an object created in Silverlight to a javascript prototype, which changes a value on that object, and then have the Silverlight application request that object back with
How many times did my database auto grow?
Today as I entered the Office, I came know that we were receiving alerts stating that the transaction log files of tempdb on one of the instances was almost full. This instance was running SQL Server 2000. I quickly looked at the transaction log file of tempdb and shocked to see that the initial size was set at 250 MB and auto growth of 100 MB! Also there were a lot of 833 errors in the Event Log
NHibernate: Complex relationships
I got an interesting question today (I am teaching my NHibernate course now).The tabular structure is similar to this: But the desired object structure is: Read more: Ayende @ Rahien Posted via email from .NET Info
How do I : Use Sql File Stream
IntroductionSql Server 2008 has a file stream data type. This data type allows users to store content on the disk instead of the database as a real file.There are many articles on this topic on the net however they are not all from a perspective of a developer. This article will just tell us enough on how to get started removing all the extra noise. I will try to link more advanced concepts as
Mono 2.8.1 is out
We have just released Mono 2.8.1. Mono 2.8.1 is a bug fix release for Mono 2.8 that contains the major fixes for bugs that were identified in Mono 2.8, it also contains a few security fixes.You can download this version from our Download page Fix DateTime's from binary representation #648252 (gonzalo)Fixed Nullable's serialization in Remoting's binary serializer #646556 (gonzalo)Logging profiler
Miracle patch out-performed by four lines of bash
Well it’s nothing if not interesting. The ~200 line “miracle” patch promises a huge improvement in desktop responsiveness, but Lennart Poettering (from Red Hat) has replied to Linus’ praising comments with 4 lines of bash which out-perform it, on the current vanilla kernel. (And by the way, Lennart seems to agree with Con Kolivas about this patch, in that make -j is not a valid desktop use case.)
HTML5 – Netscape/IE 3 all over again?
I attended two in-depth sessions on HTML5 at Oredev 2010 last week, which completely changed my perspective at it. After watching Giorgio Sardo present Microsoft’s plans for HTML5 and Robert Nyman present different HTML5 APIs, I feel that we’re moving ahead in technology but fear that we’re going back to the browser incompatibility horrors of a decade ago. Microsoft is committed to HTML5Giorgio
The Linux Programming Interface
The Linux Programming Interface (published in October 2010, No Starch Press, ISBN 978-1-59327-220-3) is a detailed guide and reference for system programming on Linux and UNIX systems. With 1552 pages, 115 diagrams, 88 tables, nearly 200 example programs, and over 200 exercises, TLPI is the most comprehensive description of Linux and UNIX system programming available. The author, Michael Kerrisk,
Simple Apache Proxying
I was recently working with Apache and a service running on Kris Zyp's Persevere project (which is beyond awesome). Persevere was pushing messages to my application which was running on Apache; the problem was that Persevere and Apache were running on different ports which technically made them cross-domain. In order to make the server believe the web service was on the same domain/port, I
Black Duck KnowledgeBase
Black Duck continuously searches the internet for open source and downloadable code. The result is the industry’s most comprehensive database of open source software and associated license and other information, the Black Duck KnowledgeBase. KnowledgeBase ContentsThe Black Duck KnowledgeBase includes over 230,000 projects from more than 4,500 sites and is updated with thousands of new projects on
Making an Apple-style Splash Screen
The Beatles are on iTunes! Or, if you are like me and don’t care that much about it, you’ve probably noticed the awesome splash screen that Apple used to promote the event. Risking to start a trend, in this tutorial we are going to create a simple jQuery plugin that will display fancy Apple-style splash screens for us. The HTMLEncapsulating the splash screen functionality into a jQuery plugin
Stanford Engineering Courses online
SEE programming includes one of Stanford’s most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seven more advanced courses in artificial intelligence and electrical engineering. Read more: Stanford Engineering Courses online Posted via email from .NET Info
25 BEST SSH COMMANDS / TRICKS
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure
INTEGRATE HTML5 FORM IN ASP.NET MVC
This article is divided into three parts. In the first, part I will show you how you can add Html5 forms in your ASP.NET MVC application with very minimum effort. In the second part, I will show you how to implement client side validation which will trigger automatically even when the browser does not have the html5 client side validation support and in the last part I will show widgetify the
Prism v4 - VB Style and Training Kit too
Prism provides guidance designed to help you more easily design and build rich, flexible, and easy to maintain WPF desktop applications and Silverlight Rich Internet Applications (RIAs).File Name: PrismV4_VB.Exe Size: 30.4MBVersion: 4.0Date Published: 11/19/2010Language: English…Prism provides guidance designed to help you more easily design and build rich, flexible, and easy to maintain Windows
Want to Make Your SQL Server Run Faster for Free?
I know I do!The trick is to properly manage your VLFs.What are VLFs? The short anser is that VLF stands for virtual log file. SQL Server database log files are made up of many smaller virtual log files that make it easier for SQL Server to manage the log files. For a much more in-depth answer see the Transaction Log section Paul Randal’s (Blog|Twitter) TechNet article. The problem with virtual
Taking Baby Steps with Node.js – Threads vs. Events
In a previous blog post, I provided a shallow introduction to Node.js. I also mentioned where you can find more information on how to get it installed on Windows as well as how to install a seemingly popular package manager in the JavaScript community called Npm. In the mean time, I’ve started to get a more clearer view on the general concepts on which Node.js is based on, as well as the kind of
VirtualPathProvider
In .Net 3.5, WF services were introduced making it easier to host workflows as services. With the send and receive activities, a workflow can be used instead of coding a service by hand. The common way to expose workflows as services is to place the .svc/.xoml or .xamlx files and supporting libraries in the host path. This works well if you have the workflow definitions stored in files. If
TSQL Challenge 43 – Identifying incomplete segments and missing elements
The problem presented in this challenge is related to a validation requirement needed as part of an electronic data exchange process. There are two applications involved in this process. The “Sender” sends a ASCII file in a predefined format to the “Receiver”. The “Receiver” application accepts the files and inserts the data into a staging table. The following illustration shows how the data
Introduction to SQL Server 2008
I have recently completed the development of a new fundamental course about SQL Server 2008. If you are doing your first steps this is the course you want to take. You will learn the basic SQL commands and you will learn how to execute them when using the SQL Server 2008. The course is available for free personal usage at www.abelski.com and it includes slides, video clips, forums and assignments
Kamis, 18 November 2010
Virtual Disk Service
PurposeThe Virtual Disk Service (VDS) manages a wide range of storage configurations, from single-disk desktops to external storage arrays. The service exposes an application programming interface (API). Where ApplicableApplication developers who use the interfaces described in this guide can query and configure a heterogeneous set of vendor-supplied and internally managed storage. VDS hides from
Caching of, in, and around your Silverlight application
This is the first in a 3-part series of articles about caching & Silverlight.Part 1: The client: XAP & Assembly CachingPart 2: The Silverlight application: Isolated StoragePart 3: The server: caching your result sets You can download the source code here.A lot can be written about this subject, and because of that, quite a few misunderstandings about Silverlight and caching exist.Let’s start with
Step-by-Step Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit
Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent DropperPart 2: Reverse Engineering the Kernel-Mode Device Driver Stealth RootkitPart 3: Reverse Engineering the Kernel-Mode Device Driver Process Injection Rootkit Part 4: Tracing the Crimeware Origins by Reversing the Injected CodeSUMMARYThis four part article series is a complete step-by-step tutorial on how to reverse
The Black Art of P/Invoke and Marshaling in .NET
Last week I finally managed to hunt down and resolve a bug that I had been chasing for quite some time. A couple of years ago I built an ASP.NET web service that makes use of a native library to provide most of its functionality. This native DLL exposes a C API, much like the Win32 API, that we’ve been using for integrating a highly-expensive product from a certain vendor into our system. I didn’
Obfuscating JavaScript with Closure Compiler Advanced Optimizations
While working on our upcoming game, Onslaught! Arena, we wanted to obfuscate the JavaScript code as much as possible. Using tools like YUICompressor and Google Closure Compiler (with Standard Optimizations) just weren’t enough. Luckily, Closure Complier has an “Advanced Optimizations” mode. This mode will really make your JavaScript gross and unreadable! Here are some cases to watch out for along
Android Theme For GMail And 4 More New Themes
Google has been bringing the Android branding to pretty much every web product they own. Earlier we told you about an Android Theme for Google Chrome Browser. Now, Google has released an Android theme for GMail which has the GMail logo turned into a Bot! Four more new theme have been released in addition to the Android theme for GMail. Apart from the Android theme for GMail, there are four more
Hacked Kinect Brings Futuristic User Interface
The video above is a picture browsing application running in Ubuntu controlled using Microsoft’s Kinect. It allows for a multi-touch like control without touching the surface – like the stuffs we see in Sci-Fi movies. Read more: digitizor Posted via email from .NET Info
Did Internet Explorer 9 Cheat In The SunSpider Benchmark?
A Mozilla engineer has uncovered something embarrassing for Microsoft – Internet Explorer might be cheating in the SunSpider Benchmark. The SunSpider, although developed by Apple, has nowadays become a very popular choice of benchmark for the JavaScript engines of browsers. While Mozilla engineer Rob Sayre was benchmarking Firefox 4 with different browsers, he noticed something with Internet
Google Refine lets you fix and handle huge, messy sets of data
Google has just introduced a new product, and this time it's a PC application (with a browser-based UI). It's called Google Refine, and it solves a problem that is enormous for some people: it lets you take massive sets of "messy data" and massage them into shape so that they're uniform, make sense, and can be statistically analyzed. The video after the jump shows a very good example, which is
Gravity attempts to be the Pandora of the Web
Gravity, a new company set up by three former MySpace executives, has just had its public launch at the Web 2.0 Summit in San Francisco. The company's rather ambitious goal is to become the "Pandora of the Web," able to bring you the content it thinks you might be interested in based on your interests. To gauge what you might like to view, Gravity proposes to use your public social network feeds
Hacked iRobot Uses XBox Kinect To See World
A student at MIT's Personal Robotics Group is going to put Microsoft's Kinect to a good use: controlling robots. Philipp Robbel has hacked together the Kinect 3D sensor with an iRobot Create platform and assembled a battery-powered bot that can see its environment and obey your gestured commands. Tentatively named KinectBot, Robbel's creation can generate some beautifully detailed 3D maps of its
UIControlSuite .NET
V13.6 has now been released: What's new?Docking control for SilverlightDocking control for WPFMulti-column combobox for WPF and SilverlightRibbon control for SilverlightAdvanced Grid control for the WPFAdvanced Grid control for Silverlight Advanced Grid control for ASP.NET MVC 2.0Scheduler for WPF, with Hour, Day, Month and Year viewsScheduler for Silverlight, with Hour, Day, Month and Year
Web Deploy: How to see the command executed in Visual Studio during publish
I just saw a post on Twitter asking the question Is there any easy way to see the underlying MSBuild command when building in VS2010? Want to see the MSDeploy params. @wdeploy?One thing to know is that when you publish from Visual Studio, by default we use the MSDeploy (AKA Web Deployment Tool) Object Model in order to perform the deployment. We do this for performance and other reasons.
GeckoFX
GeckoFX is a Windows Forms control written in clean, commented C# that embeds the Mozilla Gecko browser control in any Windows Forms Application. It also contains a simple class model providing access to the HTML and CSS DOM. GeckoFX was originally created by Andrew Young for the fast-growing visual CSS editor, Stylizer. It is now released as open-source under the Mozilla Public License.Visit the
OpenWrap
Any .NET project beyond "hello world" is going to require external libraries and tools. There's an abundance of free, open source libraries out there, but how do you get what you need? Manually searching, downloading (and in some cases building from source) is not a productive use of your time. It's even worse when one library depends on another and you have to manage dependency chains! The
Browser Information In Silverlight
In this post I will show you how to get the browser information.To get the browser information the namespace used for this is System.Windows.Browser. The BrowserInformation object contains properties such as the name, product name, product version , browser version etc. Let us start with the example which will use to get this information and display on the screen which I will share with you at
How to: create a nonrectangular ChildWindow - part 1
This article describes step by step how to create a non rectangular child window. A ring-shaped child window is created. Step 1 - preparations In expression blend 4 a new Silverlight 4 project is created. A button is added to the surface of MainPage.xaml. This button is later used to call the ChildWindow. Then--add new item… is the Silverlight project by right-clicking on the project->
Changing the viewport of a listbox in WPF
One of the nice thing about the WPF controls is the ability for them to mimic almost anything….In my case I wanted to recreate an old Winform sample of a NASDAQ sales status board…Which required a grid to draw different colors, show new items being added – but do it with out scrollbars…Turns out the WPF Listbox does all this with no or very little code at all – in most cases just a little mark up
Creating a ASP.NET MVC HTML Helper for Silverlight
Over the last few weeks I have started investing some time in learning ASP.NET MVC (specifically ASP.NET MVC 2). This has nothing with the ongoing "Silverlight is dead" debate and I actually started a deep dive into the technology back in August 2010. I think that ASP.NET MVC is very important for Silverlight developers to learn (more on this in another blog post), because of its obvious
Decoding clr20r3 .NET exception – using mono cecil
I have often seen Devs trying to figure out the cause of the app crash without a memory dump. The only information that is available to analyze is the Windows Error Reporting message in the event viewer which would have “Event Name: CLR20r3″ along with Watson bucket information like this. Fault bucket , type 0Event Name: CLR20r3Response: Not availableCab Id: 0Problem signature:P1:
Word2CHM, convert a word document to a CHM file.
Word2CHM is a open source C# program which can convert MS Word document(in 2000/2003 format) to a CHM document. It require HTML Help Workshop and MS Word 2003.BackgroundMany people write customer help document with MS Word, because MS Word is very fit to write document include text, images and tables. But many customers did not want read help document in MS Word format, but they like CHM format.
Gaikai beta opens
Notable developer Dave Perry has announced that Gaikai entered open beta on Sunday.The game-streaming service is being launched gradually, with 1,000 invites sent out to consumers at the weekend, and more being issued in waves of 10,000. “Everyone will be getting invited in batches and if you are too far from our servers, don’t worry you’ve actually helped as you’ve shown us where we need to
GFS the Google File System in 199 Lines of Python
GFS, the Google File System, sits as the backbone of the entire Google infrastructure. However, for many it is a mystery, especially for those lucky enough to be more acquainted with high-level python code than low-level C operating system sources. But have no fear, we shall break through the veil and describe an implementation of GFS in 199 lines of python. Naturally, you may want to read about
No More Magic Strings! Presenting: @string.of
The ProblemHow many times have you seen the following code snippets?1. Checking method parametersif (executeMethod == null){ throw new ArgumentNullException("executeMethod"); }2. Implementing a property in a WPF / SL view-modelpublic double Size{ get { return _size; } set { _size = value; RaisePropertyChanged("Size"); }}The first time I had to wrote code like this I
CppUnit
What is CppUnit? CppUnit is a C++ unit testing framework. It started its life as a port of JUnit to C++ by Michael Feathers. For a quick tour of unit testing with CppUnit, see the Cookbook in the latest documentation. For an introduction to unit testing, see [UnitTest], [ProgrammerTest], and [CodeUnitTestFirst] at the [wiki:Wiki:FrontPage C2.com wiki]. Features:XML output with hooks for
Rabu, 17 November 2010
Missing INTERNET_STATUS_REQUEST_COMPLETE callback after calling Wininet’s FtpOpenFile() in asynchronous mode
Symptom: To reproduce the issue:1. Put a zero byte file on a FTP site.2. Call InternetOpen() with flag INTERNET_FLAG_ASYNC3. FtpOpenFile() to download the file. Wininet will send out a FTP request. After receiving the response, the registered callback procedure will receive an INTERNET_STATUS_REQUEST_COMPLETE event.4. Call FtpOpenFile() again.This time Wininet will not
30 Fresh Inspirational Web Designs
Web design inspiration can help you stay up to date on current trends, as well as seeing how to structure designs, control color palettes, work with usability, and understand the overall design process. It’s important to continually check out other inspirational designs to see how you can apply new concepts to your own designs and continue to evolve as a designer. Here you’ll find some
Web.config Transformation Syntax for Web Application Project Deployment
Web.config files typically include settings that have to be different depending on which environment the application is running in. For example, you might have to change a database connection string or disable debugging when you deploy a Web.config file. For Web application projects, ASP.NET provides tools that automate the process of changing (transforming) Web.config files when they are
Y PPA Manager: Easily Search, Add, Remove Or Purge PPAs In Ubuntu
Y PPA Manager is a project I've been working on for a couple of weeks for easily managing and finding Launchpad PPAs in Ubuntu. Y PPA Manager is a tool for easily managing Launchpad PPAs that uses YAD for a graphical user interface (a Zenity fork which comes with a lot of improvements) and comes as a .deb and with a Launchpad PPA for easy updates. Please note that this is a pre-alpha release as
Google Translation bots
Google Talk can help you with quick translations, or even translate your chats in real-time! All you need to do is chat with one of our Translation Bots. The bots are named using two-letter language abbreviations formatted as '[from language]2[to language]@bot.talk.google.com,' and all available combinations are listed in the table below. To use a bot, add it to your Friends list and send it the
The ~200 Line Linux Kernel Patch That Does Wonders
There is a relatively miniscule patch to the Linux kernel scheduler being queued up for Linux 2.6.38 that is proving to have dramatic results for those multi-tasking on the desktop. Phoronix is reporting the ~200 line Linux kernel patch that does wonders with before and after videos demonstrating the much-improved responsiveness and interactivity of the Linux desktop. While compiling the Linux
How to rescue your friends' email addresses from Facebook and export them to Gmail
With Google calling out Facebook last week for trapping your contacts, it seems like a perfect time to offer a solution for rescuing those Facebook contacts and their email addresses -- sorry, still no phone numbers -- and exporting them to Gmail or your other address book of choice. To do this, you'll need a Yahoo! account (Mozilla's Asa Dotzler says a Windows Live account works, too). It's
Cracking Passwords With Amazon EC2 GPU Instances
As of Nov. 15, 2010, Amazon EC2 is providing what they call 'Cluster GPU Instances': An instance in the Amazon cloud that provides you with the power of two NVIDIA Tesla 'Fermi' M2050 GPUs... Using the CUDA-Multiforce, I was able to crack all hashes from this file with a password length from 1-6 in only 49 Minutes (1 hour costs $2.10 by the way.). This is just another demonstration of the
How To Use Your Wii Remote as a Gyroscopic Mouse
If you have a spare Nintendo Wii remote with the Motion Plus add-on, you can use it to control your Windows PC from across the room. Here’s how to get it working in a couple of easy steps.Using the Wii’s Motion Plus add-on and some software, you can easily control presentations or your home theater PC. You will need: A Wii remote (obviously)The Motion Plus add-onWindows XP, Vista, or 7A
TDL4 Rootkit Bypasses Windows Code-Signing Protection
In recent versions of Windows, specifically Vista and Windows 7, Microsoft has introduced a number of new security features designed to prevent malicious code from running. But attackers are continually finding new ways around those protections, and the latest example is a rootkit that can bypass the Windows driver-signing protection. The functionality is contained in TDL4, which is the latest
DIY Kinect Hacking
Introduction!Everyone has seen the Xbox 360 Kinect hacked in a matter of days after our "open source driver" bounty - here's how we helped the winner and here's how you can reverse engineer USB devices as well! USB is a very complex protocol, must more complicated than Serial or Parallel, SPI and even I2C. USB uses only two wires but they are not used as 'receive' and 'transmit' like serial.
jQuery 1.4.4 API Cheat Sheet
Read more: jQuery 1.4.4 API Cheat Sheet Posted via email from .NET Info
101 Great Computer Programming Quotes
“Most software today is very much like an Egyptian pyramid with millions of bricks piled on top of each other, with no structural integrity, but just done by brute force and thousands of slaves.”(Alan Kay) Read more: Dev Topics Posted via email from .NET Info
What every developer should know about fonts
I originally thought using fonts would be pretty simple. However, proper handling of fonts has ended up being a significant effort in Windward Reports (our XML and SQL Reporting system). If you're going to do much more than place a line of text in a form, then the details start to matter. Fonts & GlyphsSo what is a font? Fundamentally a font is a series of glyphs. What you think of as a character
Tenacious C
Tenacious C presents pointers and memory in a visual format that makes the hard parts of C ridiculously easy. Read more: Tenacious C Posted via email from .NET Info
Difference between InnoDB and MyISAM in MySQL
MyISAM and InnoDB are two most commonly used storage engines of MySQL database. However, MyISAM is the default storage engine chosen by MySQL database, when creating a new table. The major differences between these two storage engines are : InnoDB supports transactions which is not supported by tables which use MyISAM storage engine.InnoDB has row-level locking, relational integrity i.e. supports
HTTP Error 404.3: WCF Hostes in IIS. Add a MIME type
Normally when we host a WCF Service in IIS and while browsing we get the following frustrating screen. The error message in the above screen is very clear. We need to add MIME type for .SVC extension. To solve above problem Open command prompt as Administrator Navigate to C:Windows\Microsoft.Net\Framework\v3.0 Read more: C# Corner Posted via email from .NET Info
How to Setup Your Java Development Environment in Ubuntu
In this post, I’m going to explain how you can setup a Java development environment (JDK + Eclipse) in Ubuntu. I’m using Ubuntu 10.10, but these steps should be applicable to majority of Ubuntu versions. Let’s start with JDK first.Install Sun JDK:Download the Linux version of latest JDK binary from the Oracle website. For Java 6, the file name would be: jdk-6u22-linux-i586.binCopy the downloaded
List all Default Values in a SQL Server Database
I had earlier written a query to Find a Column Default value using T-SQL. Here’s how to find the default value of all columns in all tables of a databaseSELECT obj.name as 'Table', col.name as 'Column', object_definition(default_object_id) AS [DefaultValue]FROM sys.objects obj INNER JOIN sys.columns colON obj.object_id = col.object_idwhere obj.type = 'U'The sys.objects and sys.columns provides
Why does Coded UI Test playback fail to scroll the Silverlight control into view?
Bringing the control into view is an essential part of the UITestAction during Playback since Coded UI Test performs actual Mouse/Keyboard actions on the control instead of programmatic action on the control. In case of failure to bring the control into view, the playback will throw a FailedToPerformActionOnBlockedControl exception or a PlaybackFailure exception. The Coded UI Test playback engine
Top 7 Coding Standards & Guideline Documents For C#/.NET Developers
Some time back, I collated a list of 7 Must Read, Free EBooks for .NET Developers, and a lot of people found it useful. So, I thought about putting together a list of Coding Standard guidelines/checklists for .NET /C# developers as well. As you may already know, it is easy to come up with a document - the key is in implementing these standards in your organization, through methods like internal
10 Dirty Internet Explorer CSS Hacks You Might Not know
IntroductionDisclaimer: The intention of this article is not to encourage to apply this hack to your web projects but to understand what have been using by other web designers/developers. The best way to solve Internet Explorer's CSS layout issue is - create different style sheets for different versions of Internet explorers. Alright, have ever found yourself in this situation, you were trying to
Reversing the source of the ZeroAccess crimeware rootkit
We recently undertook a project to update the hands-on labs in our Reverse Engineering Malware course, and one of our InfoSec Resources Authors, Giuseppe "Evilcry" Bonfa, defeated all of the anti-debugging and anti-forensics features of ZeroAccess and traced the source of this crimeware rootkit: Part 1InfoSec Institute would classify ZeroAccess as a sophisticated, advanced rootkit. It has 4 main
Visual Guide to NoSQL Systems
There are so many NoSQL systems these days that it's hard to get a quick overview of the major trade-offs involved when evaluating relational and non-relational systems in non-single-server environments. I've developed this visual primer with quite a lot of help (see credits at the end), and it's still a work in progress, so let me know if you see anything misplaced or missing, and I'll fix it.
How to make sharing code between .NET and Silverlight (a little) less painful
Windsor ships for both .NET and Silverlight. However working with the codebase in such a way that we can target both runtimes at the same time with the least amount of friction possible proved to be quite a challenge. ProblemWe’re using single .sln and .csproj files to target both runtimes (actually 5 of them, as we ship for 3 versions of .NET and 2 versions of Silverlight, but I digress) with
Automating Windows Applications Using the WCF Equipped Injected Component
IntroductionThis article discusses a way to convert a Windows application that does not export any program interface to an automation server. Many very good publications have presented and discussed in depth various aspects of this problem. Most of these works dealt with techniques for injection of code into process to be automated (target process) and API hooking. This article demonstrates the
Extended WPF Toolkit–Updated ColorPicker control
If you are using the Extended WPF Toolkit you have probably noticed the ColorPicker control. If you are not familiar with the Color Picker control, it is simply a WPF editor control that allows a user to select a color. If you are using release version 1.2 or less the color picker will look something like this: Read more: Posted via email from .NET Info
בלעדי! כל הפרטים על התקנת DENALI!
עלק בלעדי.בנקודה הזאת אני בטוח שכל אחד מכם כבר הוריד את Denali, התקין, ויודע בעל פה את הסינטקס של יצירת Availability groups. לא?אז לכל מי שהיה לו יותר חשוב להתעסק בלחפש כורסת טלוויזיה טובה עם מסז’ ולא לכלך את הידיים עם המוצר שבסך הכל הולך לקבוע את עתידו המקצועי ובעקבות כך הכלכלי, האישי והחברתי בשנים הקרובות, קבלו את ההתקנה בתמונות: מסך ההתקנה הראשי, זה שאף ישראלי מעולם לא קרא: Read more: אם הייתי
Adobe Acrobat X
Adobe Acrobat X has just been released! And continuing in our tradition of providing the direct download links for major Adobe software such as CS5, Lightroom 3, and Elements 9, below you’ll find the direct links for the brand new Acrobat X (10)… We also have added the direct links (DDL) for the previous version Acrobat 9 as well, in case you need them for any reason. The links given below go to
Pure virtual destructors in C++
To work correctly, classes with virtual methods must also have virtual destructors. Interestingly, virtual destructors can be declared pure, which can be useful in some cases.Imagine you have a base class you want to make abstract. In this base class all methods have meaningful default implementations, and you want to allow the derived classes to inherit them as-is. However, to make a class
WPF - DoEvents like Windows Forms
בגלל ארכיטקטורה שונה אין ב WPF את הפונקציה DOEVENTלהלן הקוד ל WPF: public static void DoEvents(){// Create new nested message pump. DispatcherFrame nestedFrame = new DispatcherFrame();// Dispatch a callback to the current message queue, when getting called, // this callback will end the nested message loop.// note that the priority of this callback should be lower than the that of UI event
Shared Application Settings in machine.config
BackgroundApplication behavior frequently depends on exogenous parameters, such as a service URI or file paths, that are supplied by a developer or administrator. These inputs must be amenable to quick change without the need to refactor or recompile. A common answer to this requirement is to place such inputs in a configuration file: app.config for Windows applications or web.config for web
10 Best Server Monitoring Tools That Kick Ass
Blogger always prefer front end tools; Although Developers and designers are also worried about handling website. They have to make sure that website script looks fine from backend. Sometimes, it would be difficult to identify the problems. Most of the time physical machine is not optimized and use a lot of resources of website. It would be trouble to take full advantage for working effectively.
Removing Strong-Signing from assemblies at file level (byte patching)
IntroductionThis article describes how Strong Signing works in .NET Framework 1.1 and 2.0. In particular, it is about how Strong Signing is implemented at file level - I mean, bytes in an assembly EXE or DLL. Knowing this allows me to best understand how security should and can be implemented in managed code. Lastly, we must be aware that Strong Signing assemblies is not a definitive way against
Secret Debug registers in AMD processors
Hidden password-protected debug registers in the Athlon XP is enough to make any hardware-oriented programmer more paranoid about what could be lurking between the registers. If you work with assembler you slowly grow to understand the architecture of the machine and to know its registers and operations as if they were your own. So it comes as a shock to discover that there is something hidden
F# MonoDevelop Add-In Available
Tomas Petricek has announced the availability of the F# MonoDevelop Add-In.The add-in provides intellisense for MonoDevelop, inline documentation and access to the F# interactive shell. Most of the heavy lifting is done by the F# compiler itself which is used directly by the Add-In as a service: Read more: Miguel de Icaza's web log Posted via email from .NET Info
Visual Studio 2010 Feature Pack 2 released–new set of Testing capabilities
I am very happy to announce that we have just released Visual Studio 2010 Feature Pack 2 – which extends the Visual Studio 2010 product with a great set of capabilities – this time in the area of Testing. As you know, we have adopted a concept of feature pack releases which enhance and complement the capabilities we released with the Visual Studio 2010 product earlier in the year. These feature
Langganan:
Postingan (Atom)