Selasa, 30 November 2010

What is your computer doing with all that memory? Write your own memory browser

What is your computer doing with all that memory? There are various kinds of memory allocated and used in each process. These include:·         Managed memory (VB.Net, C#, managed C++)·         Heap memory ·         Stacks·         Images (files loaded into a process) VirtualAlloc is the basis of these allocations. If a process needs more of these types of memory, VirtualAlloc is called. You can

Part 2 of 4 : Tips/Tricks for Silverlight Developers.

I wanted to create a series of blog post that gets right to the point and is aimed specifically at Silverlight Developers. The most important things I want this series to answer is :What is it? Why do I care? How do I do it?I hope that you enjoy this series. Let’s get started:Tip/Trick #6)What is it? Create a Notification Window in a Silverlight Out Of Browser Application.Why do I care? Its a

Setting mouse cursor position with WinAPI

Setting the mouse cursor position on a Windows machine with the help of .NET Framework shouldn't be that big of a problem. After all, there is the built-in Cursor class that lets you do that by executing a simple line of code: Cursor.Position = new System.Drawing.Point(0, 0);Of course, here 0 and 0 are the absolute coordinates for the mouse cursor on the screen. One thing to mention about this

BCL Extensions Source Code released on CodePlex

We (Solutions Design, creators of LLBLGen Pro) are in the process of releasing some of our general frameworks as open source, namely BCL Extensions and Algorithmia. Yesterday we released BCL Extensions on CodePlex, using Mercurial as the source-control system. Algorithmia will follow soon, likely later this week. We also re-released our Helpdesk / forum system HnD again to the public, on

How to send an email in Silverlight

IntroductionWelcome again to Dotnetfunda. In this article I am going to demostrate on how to send an email in Silverlight. I have previously wrote an article on how you can do that in asp.net, but now in Silverlight the approach is different and a newbie or even an experienced person can get lost. I am known by writing easly interpreted articles and I will keep on doing that , by even providing

Special features of Linux memory management mechanism

IntroductionIn this article, I am going to describe some general features and some specific ones of the memory management in Linux. It will be mainly on dynamic memory allocation and release, as well as the management of the free memory. The article concerns the Linux kernel versions 2.6.X. Structure of the Linux memory managementThe term “memory management” refers to the mechanisms implemented

SQL injection with raw MD5 hashes (Leet More CTF 2010 injection 300)

The University of Florida Student Infosec Team competed in the Leet More CTF 2010 yesterday. It was a 24-hour challenge-based event sort of like DEFCON quals. Ian and I made the team some ridiculous Team Kernel Sanders shirts at our hackerspace just before the competition started. The good colonel vs. Lenin: FIGHT! Here’s a walkthrough/writeup of one of the challenges.Injection 300: SQL injection

Writing a Managed Internet Explorer Extension: Part 4–Debugging

Picking up where we left of with Writing a Managed Internet Explorer Extension, debugging is where I wanted to go next. I promise I’ll get to more “feature” level stuff, but when stuff goes wrong, and it will, you need to know how to use your toolset. .NET Developers typically write some code and press F5 to see it work. When an exception, the debugger, already attached, steps up to the plate

Senin, 29 November 2010

Bit twiddling: What does warning CS0675 mean?

From the sublime level of continuation passing style we go back to the mundane level of twiddling individual bits.int i = SomeBagOfBits();ulong u = SomeOtherBagOfBits();ulong result = u | i; // combine them together Whoops, that's an error. "Operator | cannot be applied to operands of type int and ulong." There are bitwise-or operators defined on int, uint, long and ulong, but none between int

50 Open Source Apps You Can Use in the Cloud

The cloud computing boom has brought a surge of opportunity to the open source world. Open source developers and users are taking advantage of these opportunities in three key ways.First, many open source applications are now available on a Software-as-a-Service (SaaS) basis. For open source project owners, hosting apps in the cloud offers a new revenue stream. And for users, it means access to

Blend Extensions

Project DescriptionThis shows you how to extend blend. It provides the basic plumbing for adding custom menu items, panes etc. Twitter me any questions : @josefajardoTo extend blend you need to use the undocumnted, un-supported "Addins" api. There are a couple of approaches to getting your addin into blend, the one i like to use is to get the dll's containing the extensions into an "Addins"

Choosing a .NET 4 Content Management System

Utilize, Learn & Contribute to an Open Source, Microsoft .NET based Content Management SystemMy justification for the project is primarily to learn, and at the same time investigate ways to use the CMS to better manage my expanding list of websites and content.  I have used a lot of Open Source software and felt that it would be a good time to give back to the community and contribute to an Open

Loading 1TB in 10 Minutes in SSIS – SQL Server Scalability on high end hardware

This is a live post from the session of Henk van der Valk  at Tech Ed Israel 2010 .This session has great tips and tricks for you in SSIS and is in English (just in case you're reading this blog and don't understand Hebrew :)) Checking for problems when test loading data:Select * from sys.dm_os_wait_stats Number 1 wait: pageiolatch_upSolution: add more spindlesSo - just add more hardware?Number 2

"You Cannot Install Mac OS X on This Volume: How to resolve ?

Most of the Mac users who use the Intel based Mac night have not faced the error but if you try to Install a Mac OS X on the hard drive that uses the Intel based Mac, you will encounter this error.The error message will sound something of this sort. Error: You cannot install Mac OS X on this volumeThis error usually occurs as the Mac Installer doesn't allow you to install on to a disk that uses a

Hundreds of unknown Picasso works discovered in Paris

An extraordinary cache of hundreds of works by Pablo Picasso, painted during his most creative period and worth a conservative estimate of €60m (£50.5m), has been uncovered at the home of a retired French electrician. The collection of 271 paintings, drawings, sketches and lithographs, many of which were previously unknown, dates from 1900 to 1932.Among the works are nine cubist collages worth

Как обмануть NET.Reflector

Сегодня я задумался о том, как обфускаторы скрывают код методов от утилит деобфускации вроде NET.Reflector. Как ни странно, но я не нашел в интернете никакой полезной информации по этому вопросу (возможно, плохо искал) и поэтому пришлось провести маленькое исследования самостоятельно. Под катом краткая заметка о результатах. В примере кода будет снова использоваться Mono.Cecil и генерация кода,

How to Add Google Documents to the Windows Explorer “New” Menu

We’ve already shown you how to create shortcuts to create new Google Docs easily, but what if you want total Windows integration? Here’s how to add them to the Windows Explorer “New” menu for easier access. This should work for all versions of Windows, and you can modify it to work with Google Apps for your Domain as well. Keep reading for the full instructions.Import the Registry HackThe first

Aging Reversed In Mice

The Guardian reports that scientists claim to be a step closer to reversing the aging process after experimental treatment developed by researchers at Harvard Medical School turned weak and feeble old mice into healthy animals by regenerating their aged bodies. 'What we saw in these animals was not a slowing down or stabilization of the aging process. We saw a dramatic reversal – and that was

WikiLeaks: China directed Google hacking

The United States believes that Chinese authorities orchestrated a hacking campaign into computers of Google and Western governments, according to leaked documents cited by The New York Times.The secret cables released by whistleblower site WikiLeaks included one in which the US embassy in Beijing cited "a Chinese contact" who pointed to a government role in the hacking, the newspaper said. "The

How Microsoft IT Leverages Security Enhancements from Windows Server 2008 R2

IntroductionWindows Server 2008 R2 is an incremental upgrade that builds on the Windows Server 2008 foundation. By simultaneously releasing Windows Server 2008 R2 and Windows 7, Microsoft was able to build significant synergy between the two products. This article focuses on some of the technologies made possible by that synergy, including DirectAccess, BranchCache™, Network Access Protection (

Getting Real

Want to build a successful web app? Then it's time to Get Real. Getting Real is a smaller, faster, better way to build software.Getting Real is about skipping all the stuff that represents real (charts, graphs, boxes, arrows, schematics, wireframes, etc.) and actually building the real thing. Getting real is less. Less mass, less software, less features, less paperwork, less of everything that's

Uncovering the Hidden DLL Function Callback Feature

I took a little break today and dropped-in on the REBOL3 AltME world to find an interesting question being asked by Cyphre and a few other users: The word CALLBACK appears in the REBOL binary, but what does it do? Here is some little known information about this feature. Callbacks in DLL Functions (Routines)When using the External Library Interface (DLLs), you can pass a REBOL function to be

If programming languages were religions...

C would be Judaism - it's old and restrictive, but most of the world is familiar with its laws and respects them. The catch is, you can't convert into it - you're either into it from the start, or you will think that it's insanity. Also, when things go wrong, many people are willing to blame the problems of the world on it. Java would be Fundamentalist Christianity - it's theoretically based on C

Swarm: A true distributed programming language

FundamentalsThe fundamental concept behind Swarm is that we should “move the computation, not the data”.The Swarm prototype is a simple stack-based language, akin to a primitive version of the Java bytecode interpreter. I wanted the proof of concept to be quick to implement, while demonstrating that the concept could work for a popular runtime like the JVM or Microsoft’s CLR. Update (Sept 17th 09

SQL with Hibernate Criteria

Hibernate's Criteria is a very comprehensive API which provides the user alot of flexibility to write dynamic queries. But of course nothing is perfect. I came across a situation where i had to truncate a date field in order to get the correct result set without considering the time portion. While going through the Criteria API I did not find anything which allowed me to do this. And hence in the

HTML5 Techniques – Ultimate Collection of Tutorials

As my experience we always close to the latest technologies as we have one step ahead on web development techniques as HTML5. HTML 5 is the advanced version of  HTML.  HTML 5 is giving  new techniques and advanced features/structure in designing. These new features and tags makes designing very easy to create a web page. CSS3 and HTML 5 are capable of revolutionizing the way we design websites.

Revisiting Normalization and Denormalization

In this blog I have done at many articles on Normalization and Denormalization, but I have never put all of the arguments together in one place, so that is what I would like to do today.There are links to related essays on normalization and denormalization at the bottom of this post. This blog has two tables of contents, the Topical Table of Contents and the list of Database Skills.The What and

How to connect to Oracle database using WCF in Silverlight

In this article we will be seeing how to connect to the Oracle database using WCF in Silverlight and will perform a search to retrieve the data from the database, display them in the Silverlight data grid using Visual Studio 2010. In the Oracle database we will be having a table Employee Details with three columns Employee_ID, FirstName and LastName, having more than 10,000 data. Based on the

Optimize Images for High Performance Websites with Visual Studio 2010

This is a new image optimizer in the Visual Studio 2010 Extensions Gallery that uses SmushIt and PunyPNG to optimize images, called Image Optimizer. Image Optimizer essentially reduces the sizes of images by removing a lot of the EXIF and metadata in the file. The size reduction does not affect the quality of the image. For those wanting to build high performance websites that have a lot of

Multiple base addresses for WCF Service

If we do not want to explicitly set address for each EndPoint in our service then we define BASE ADDRESS for the EndPoint exposed for our service In above configuration, we added one more base address using net.tcp protocol. Read more: C# Corner Posted via email from .NET Info

Minggu, 28 November 2010

How to Create a Software RAID Array in Windows 7

Instead of having a bunch of separate drives to deal with, why not put them together into one big drive? You can use software RAID to accomplish this, and here’s how to do it.Windows has built in functionality to set up a software RAID (Redundant Array of Inexpensive Disks) without any additional tools. This makes it easy to turn your existing spare hard drives into massive storage or even

DansGuardian

DansGuardian is an award winning Open Source web content filter which currently runs on Linux, FreeBSD, OpenBSD, NetBSD, Mac OS X, HP-UX, and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to

Prevent Copying files from USB Drive without Disabling USB port

Today one of my friend called me up and was asking about this issue, but he also said that he want the USB drive to read files but don’t want to write files to it or copy from it for some security purpose. Suddenly i thought, is it possible to do it? i was little bit confused about it. Then i got some idea and was testing about it. and finally i got it. Using GP edit or Registry edit, one can

Ubuntu One for Windows – a quick run down of the first beta

Yesterday I got my invite to join the Ubuntu One Windows Beta. I thought I’d show off some screenshots.The installer is a small 12MB .msi installer and installation of it is straightforward.Setting up your Ubuntu One account after installation is just as easy on Ubuntu: you open the app, enter your Ubuntu One sign in details and connect. Read more: OMG! Ubuntu ! Posted via email from .

Company Seeks To Boost Linux Game Development With 3D Engine Giveaway

To support Linux game development, Unigine Corp. announced a competition: it will give a free license for its Unigine engine to a seasoned team willing to work on a native Linux game. The company has been Linux-friendly from the very start; it released advanced GPU benchmarks (Heaven, Tropics, Sanctuary) for Linux before and is working on the OilRush strategy game that supports Linux as well.

MISRA C

MISRA C is a software development standard for the C programming language developed by MISRA (Motor Industry Software Reliability Association). Its aims are to facilitate code safety, portability and reliability in the context of embedded systems, specifically those systems programmed in ISO C. There is also a set of guidelines for MISRA C++. However, there are now more MISRA users outside of the

KDE 4.6 Beta 1 – a first look

The first beta release of KDE SC 4.6 was released yesterday. OpenSUSE had packages up almost immediately, so being curious as to what’s new, I’ve downloaded and upgraded to the new release. These are my impressions thus far. KDE’s release notes tout the following (main) features of the 4.6 release:libplasma now does does something with QML for widgets on devices – why this is the number one

Pirate Bay founders lose appeal: jail time reduced, fines raised

It's been a while since the four Pirate Bay founders lost their case in a Stockholm district court -- April 2009, to be more precise. The verdict was of course appealed, but alas, it was not to be. A Swedish appeals court has upheld the original ruling but changed the sentencing. Three of the quartet have had their jail time reduced: Fredrik Neij gets ten months, Peter Sunde eight months, and

Windows Phone 7 Sales Continue To Struggle

Even with the pre-Christmas buying rush, Microsoft is already desperately offering a new buy one get one free offer similar to the ones they gave for the KIN. According to the article, 'Windows Phone 7 devices can't even manage two per cent of the fortnight's sales.' These aren't official Microsoft figures; they come from online shopping sites. But since Microsoft official sales figures seem

10 Free Server Tools Your Organization Needs

This list of 10 free, essential tools is an amalgam of tools for all sizes of companies and networks. The range of tools covered here are generally cross-platform (i.e., they run on multiple OSes) but all are extremely useful to the system administrator, network administrator and first-level support personnel. While all of these tools are free to download and use in your network without payment

C++0x Dynamic Message Passing

ntroductionSometimes it is useful to have dynamic message passing as in Objective-C. The small header presented below allows any class to contain a dynamic message map that can be used to add methods dynamically to an object. BackgroundObjective-C is deemed more flexible than C++ because it allows a form of dynamic dispatch known as message passing.Message passing is a form of dynamic dispatch

Asymmetric Encryption and Signing with RSA in Silverlight

While Silverlight is a powerful tool for rich client applications, it lacks the ability to perform asymmetric encryption out of the box.  In this article, I'm going to share a cryptography class library I've been working on and show you how to use it to perform standards compliant RSA Encryption in Silverlight that is cross compatible with .NET's built in RSACryptoServiceProvider, allowing you to

Online Tools That Make My Life Easier

Imagine a situation where you’re sitting in front of a colleague’s computer or one that is publicly used. By definition you’re missing all your favorite tools that you’re used to and you can’t install them even if you wanted to. Here’s a short list of online tools that help me a lot when I’m using a computer other than my own. These do not fully replace the desktop equivalents, but they’re good

ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks

With the recent OWASP AppSec DC presentation on Slow HTTP POST DoS attacks, the issue of web server platform DoS concerns have reached a new high.  Notice that I said, web server platform and not web application code.  The attack scenario raised by slow HTTP POST attack is related to web server software (Apache, IIS, SunONE, etc...) and can not be directly mitigated by the application code.  In

Binding TextBlock, ListBox, RadioButtons to Enums

IntroductionThis post demonstrates different ways to bind WPF controls to an enum property so that changing the selected item on the control automatically updates the value of the property. Examples for a ListBox, ComboBox, a group of RadioButtons and a ListBox of RadioButtons is shown. A way to convert the enum value to a user-friendly string is also shown. Using the CodeYou have an enum

Get Property using Reflection C# +Java

התבקשתי לכתוב ב java class מאוד גדול (שלא ניתן לחלק אותו)ולהפוך אותו ל xml, סיקרן אותי מאוד כיצד כותבים את אותו class גם ב c#: יש לציין שניתן להפוך Class ל XML גם בצורה אחרת דרך XmlSerializer.להלן הקוד ב C#://Class into XML//Get the Properties of the Class and //Create xml elementXElement xml_line = new XElement("je");Type type = MyClass.GetType(); //Get the Type of your ClassPropertyInfo[]

כיווץ מחיצות

שלום לכולם ,כאן ליעד מצוות התמיכה של Microsoft.היום נלמד כיצד להקטין את גודלן של המחיצות בדיסק הקשיח במערכת ההפעלה Windows 7  . ממשק ניהול המחיצות (מנהל הדיסקים) של Windows 7  מספק ממשק נוח וקל לשימוש דרכו ניתן להקליד , להקטין , לערוך ולמחוק מחיצות בדיסק הקשיח שלנו . כיום , ניתן להקטין מחיצה עד לחצי מגודלה המקורי – כלומר במידה וכונן C קיים במערכת ההפעלה ככונן יחיד וגודלו הוא 300GB נוכל להקטינו על

Rapid Dev – a new unit testing tool is born

It’s no secret that the .NET community has a lot to learn as far as unit testing is concerned. One of the contributing factors to unit testing adaptation is tool support – it’s not secret that if developers can crate and run tests easily form the comfort of their development environment (i.e. Visual Studio). But why settle for the bare minimum? wouldn’t you like your tests to run “automatically”

Collections in C

Inspired by Minecraft (like countless other people out there) I decided to give a clone a try to see how this can be accomplished. My last few adventures into the 3D world went through C++ but that always presented me with a problem: The C++ code I write does not scale well to computer games. This time I thought I can probably try to work around the problem by forcing myself to simple C. This

CUDA integration with C#

This article will focus on how to create an unmanaged dll with CUDA code and use it in a C# program. The example will show some differences between execution times of managed, unmanaged and new .NET 4 parallel versions of for() loops used to do computations on arrays. I will show in brief how to configure CUDA environment and run example program. CUDA itself is out of scope for this article

Cache Games - Bringing Access Based Cache Attacks on AES to Practice

Abstract: Side channel attacks on cryptographic systems are attacks exploiting information gained from physical implementations rather than utilizing theoretical weaknesses of a scheme. In particular, during the last years, major achievements were made for the class of access-driven cache-attacks. The source of information leakage for such attacks are the locations of memory accesses performed by

HowTo: Open MSTest with MSBuild

According to the blogpost about „HowTo: build solutions with MSBuild“ I’m going to show you a little example about how to call MSTests.ScenarioThe structure is nearly the same like in this blogpost. As a little add-on I created a new test project: I’ve added one more “RunTests” target to my BuildSolutions.target file where the MSBuild Script is included:

How to consume a web service from within SQL Server using SQL CLR

DISCLAIMER:This is just intended as proof of concept. I do feel that if you wish to consume web services from SQL Server, then you should probably put this code in an assembly outside SQL Server and then call that assembly from the CLR within SQL Server. This will make it more maintainable when, for example, the web service changes. If you then need to rebuild the references etc., it will be

Scrypt Enhanced Cryptography for Silverlight 3+

Project DescriptionThe Scrypt enahnced cryptography library provides additional cryptographic capabilities for Microsoft Silverlight 3+. In this initial release we've added RSA Encryption with support for key sizes from 256-bit to 4096-bit. This library is fully compatible with .NET's built in RSACryptoServiceProvider.For some usage examples, please visit my blog:http://www.dustinhorne.com/post/

Difference between int.Parse and Convert.ToInt32

I know this post sound basic to most of people but still lots of people does not know this. So I decided to post a blog post for this. Both int.Parse and Convert.ToInt32 are used to convert string into the integer but Only difference between them is to Convert.ToInt32 handle null and returns ‘0’ as output and int.parse is not going to handle NULL and will give a Argument Null Exception. Here is

NHibernate and Mapping Aggregates

A few days ago a friend emailed me the following question regarding NHibernate mappings for a solution he’s currently developing:“I have an idea entity that has a collection of comment entities and I need to get the comment count for each idea. I made a massive mistake at the beginning by calling idea.Comments.Count (even worse, I did it in the view!), which due to the collection being

CodeMirror port for Google Web Toolkit

I had been hunting for a good web based code editor when I came across CodeMirror at http://www.codemirror.net.Great project and a lot of hard and smart work indeed. I am a great fan of GWT and try to move anything and everything that comes my way to GWT The result is gCodeMirror project at Google Code and GitHub. If you are interested in directly jumping to a demo, browse to this test URL.Read

Subversion 1.6.15 Released

Just in time for Thanksgiving comes the next Subversion release: Subversion 1.6.15.  In addition to the usual group of bug fixes, this release includes a couple of fixes of import to administrators.  1.6.15 fixes a potential memory leak which can be caused by clients running 'svn blame -g' on large datasets.  Subversion 1.6.15 also fixes a crash in mod_dav_svn which can be caused by using

Silverlight basics. Validation. Part 1. DataAnnotations & ValidatesOnExceptions

Silverlight 4 has some new ways for validate input values (some new approaches to implement validation in your application). First approach is DataAnnotation. In this case you should describe validation rules with attributes. Two other ways (both of them is came with Silverlight 4) – you should implement one of interfaces for your ViewModel: IDataErrorInfo or INotifyDataErrorInfo. I want to talk

NHibernate Profiler Delivers!

Cognitive application awarenessVisual insight into the interaction between your database and application code.Analysis and detection of common pitfalls when using NHibernate. Analysis is delivered via perfectly styled SQL and linkable code execution.Supports NHibernate 1.2.x, 2.0.x and 2.1.xIntroductionNHibernate Profiler is a real-time visual debugger allowing a development team to gain valuable

LLBLGen Profiler

Cognitive application awarenessVisual insight into the interaction between your database and application code.Analysis and detection of common pitfalls when using LLBLGen Pro. Analysis is delivered via perfectly styled SQL and linkable code execution.Supports .Net 3.5 and .Net 4.0IntroductionLLBLGen Profiler is a real-time visual debugger allowing a development team to gain valuable insight and

How to convert Subversion repository to Mercurial (Hg)–it’s easier than you think!

Converting SVN to Mercurial, while keeping all the commit history, might sound like a hard thing to do, but in fact it isn't! This functionality is already built into Mercurial, it’s just not enabled by default. I will be using BitBucket as the Mercurial repository host for this example. You will also need the latest version of TortoiseHg.Conversion is done using the command hg convert, however

How The Garbage Collector Can Cause Random Slowness

In this article, I am going to use a number of tools to show how, because .NET applications run on top of the CLR, things are not always as straight forward as they seem. I’m also going to prove to you that high CPU usage and slow performance in your applications are not always caused by slow code, but sometimes by poor or excessive memory use. The example that I will use is of an ASP.NET website

Installing Visual Studio Versions Side-by-Side

Visual Studio 2010 can be installed on a computer that already has an earlier version of Visual Studio.Note:We recommend that you install Visual Studio versions in the order in which they were released. For example, install Visual Studio 2008 before you install Visual Studio 2010. Before you install versions side by side, review the following conditions:If you open in Visual Studio 2010 a

Dependency Graph in Visual Studio 2010 – View Assembly Dependencies

The Visual Studio 2010 Ultimate Edition has some excellent Architecture tools for modeling new applications, as well as analyze an existing application. One tool amongst them is the ‘Dependency Graph’. As quoted in MSDN, Dependency graphs help you learn more about the organization and relationships in existing code. So let us say that you have just joined a new project and the application has no

Visual Studio 2005/2008/2010 Put Curly Braces On Same Line

I have been looking at some code from Microsoft and I found that in C# they keep curly braces on the same line. This is also the preferred style in Java. Since I also write Java code these days I decided to keep the same style for curly braces. So how do you configure Visual Studio to place curly braces on the same line? It turns out that there are options which allow you to do this. In Visual

Sabtu, 27 November 2010

Controlling a Pixel shader’s parameters with reflection

IntroductionCurrently I’m working on an image editor, which will use Pixel Shader effects. To save a lot of time manually hard coding each effects control interface I built a simple reflection based controller system for the effects. This article shows the technique behind it. This is my first article that I publish here on CodeProject. The CodeReflection controll is achived using a few custom

NSurgeon MSIL Manipulation Library

Project DescriptionNSurgeon project is based on Mono.Cecil library. The project is composed of the next modules:- SDK - Aspect Oriented Programming- Decompiler - Assemblies decompiler. Supports for MSIL, C#, VB.NET, F# - planned - Immunity - obfuscator - plannedRead more: Codeplex Posted via email from .NET Info

Subterranean IL: Custom modifiers

In IL, volatile is an instruction prefix used to set a memory barrier at that instruction. However, in C#, volatile is applied to a field to indicate that all accesses on that field should be prefixed with volatile. As I mentioned in my previous post, this means that the field definition needs to store this information somehow, as such a field could be accessed from another assembly. However, IL

Managing your web site with Mercurial

I use the Mercurial source control system for (nearly) every one of my free software projects. Recently, I began using it to manage all of my web sites. If you are like me, you likely have a web server and SQL server of some sort running on your desktop, permitting you to work locally. I make many frequent changes to my sites. Sometimes things don't go so well for various reasons. I may need to

Session: C#'s Greatest Mistakes

C# is a lovely language in many ways... but it's not perfect. Mistakes made early in a language or platform's development are often impossible to fix afterwards, so this talk isn't a set of suggestions for the C# team. Instead it's a reflection on what we might do if we had a time machine. Which features which seemed like a good idea at the time have actually caused the development community

XamlQuery/WPF - The Write Less, Do More, WPF Library

What is XamlQuery/WPFXamlQuery/WPF is a lightweight yet powerful library that enables rapid development in WPF. It simplifies several tasks like page/window traversing; finding controls by name, type, style, property value or position in control tree; event handling; animating and much more. XamlQuery/WPF provides two approaches for finding controls.Using Selector Queries, andUsing Managed Helper

5 Cloud-Oriented Operating Systems Available Now

Google announced Chrome OS in 2009, promising the cloud-centric operating system would be available in 2010. Unfortunately, it will be next year before Chrome OS is widely available, Engadget confirmed this week. Google may release its own Chrome OS netbook next month, and there are already experimental builds available based on the Chromium OS source code. But if you don't want to wait for a

XmlDSigEx XML Digital Signature Library

Project DescriptionThe XmlDSigEx library is an alternative to using the SignedXml classes in the .Net Framework. It addresses some of the shortcomings of the standard types particularly in regards to canonicalisation and the enveloped transform. It is currently under development. Read more: Codeplex Posted via email from .NET Info

Jumat, 26 November 2010

Kinect + Javascript hack shows potential for web interfaces

Developed by the clever folks at MIT Media Lab – Fluid Interfaces Group, DepthJS is a web browser extension that allows any any web page to interact with Microsoft Kinect via Javascript. Released last night this video shows the potential that DepthJS has for developers and is open source, and available to download at GitHub. DepthJS has a plethora of possibilities for online interfaces including

Privilege escalation 0-day in almost all Windows versions

Today proof of concept code (source code, with a compiled binary) of a 0-day privilege escalation vulnerability in almost all Windows operating system versions (Windows XP, Vista, 7, Server 2008 ...) has been posted on a popular programming web site. The vulnerability is a buffer overflow in kernel (win32k.sys) and, due to its nature allows an attacker to bypass User Access Control (UAC) on

Grab Up to 768 MB Free Dropbox Space Through Social Media Connections

Need a little more space in your free Dropbox file syncing account? Already run through the "Getting Started," .EDU referrals, and all your friends? If you hook Dropbox up to Twitter and Facebook, you can snag up to 768 MB more storage. You don't even have to actually post anything about Dropbox to your Twitter or Facebook accounts to activate the majority of the 128 MB upgrades listed at

Improving Application Startup Time

Visual Studio is a wonderful development environment, whose IntelliSense®, integrated debugging, online help, and code snippets help boost your performance as a developer. But just because you're writing code fast doesn't mean you're writing fast code. Over the few past months, the CLR performance team met with several customers to investigate performance issues in some of their applications. One

Future of Personal Computing: Post-iPad Concepts

Note, we did not say that iPad is the future of personal computing - it is too early to say, for example, how well it performs with various professional applications - but iPad is certainly a step toward more popular use of computing (even your grandma might get enticed to touch its screen and shiny silver back). However, the question remains, what's beyond iPad, and is there anything our there

Four Facebook Alternative Alternatives

Now that Diaspora, which is building an open-source distributed social network, has launched in private alpha, I figured it’d be a good idea to remind you that there are several alternatives to that particular Facebook alternative, some of which have been around longer and in more advanced stages of development. Note that there may be more initiatives that I haven’t heard of or simply didn’t or

The Seven Principles You Need to Know to Build a Great Social Product

Social products are an interesting bird. For even the most experienced product designer, social products prove an elusive lover. While there are many obvious truths in social products, there are also alot of ways to design them poorly. Especially when you are deep in the moment making pixel-level decisions trying to remember what’s important, things may not be so clear. The only magic I’ve found

How to Triple Boot Your Hackintosh with Windows and Linux

We've walked through how to triple-boot your Mac with Windows and Linux, but if you're using a shiny new Hackintosh, the process is a bit more complicated. Here's how to get all three operating systems up an running on your new PC. While the Chameleon bootloader (the default boot screen for your Hackintosh) is a great friend to Hackintosh builders, Windows and Linux try to muck everything up by

Kinect hacks let you control a web browser and Windows 7 using only The Force (updated)

Hacking the Xbox 360 Kinect is all about baby steps on the way to what could ultimately amount to some pretty useful homebrew. Here's a good example cooked up by some kids at the MIT Media Lab Fluid Interfaces Group attempting to redefine the human-machine interactive experience. DepthJS is a system that makes Javascript talk to Microsoft's Kinect in order to navigate web pages, among other

Infinitec Infinite USB Memory Drive review

The idea behind Infinitec's Infinite USB Memory Drive is actually quite straightforward, but we've found that when we tell friends and acquaintances about the unit, it often boggles their minds. So, we'll try to keep it real simple: This red plastic stick is a 802.11b/g/n WiFi radio disguised as a USB flash drive. And when we say "disguised", we're not just talking about the stick's size, but its

OpenVizsla hopes to bring USB sniffing to the everyhacker

Remember that Kinect hack how-to? A key figure in the story was the use of a USB analyzer that was plugged in-between the Kinect and the Xbox to pick up on USB traffic and pull out a log that could be used for hacking. Well, there's a new 'OpenVizsla' project on KickStarter that's aiming to build open source hardware that can put this typically expensive tech ($1,400+) in the hands of more

Streaming over HTTP with WCF

Recently I had a customer email me looking for information on how to send and receive large files with a WCF HTTP service. WCF supports streaming specifically for these types of scenarios.  Basically with streaming support you can create a service operation which receives a stream as it’s incoming parameter and returns a stream as it’s return value (a few other types like Message and anything

Kamis, 25 November 2010

Building a Go Compiler in Go

One of the biggest design decisions we made with erGo™ was the decision to write the compiler itself in the Go language. It’s had a huge impact on every level of our development process. In the end, we believe that we absolutely made the right decision. On the other hand, we completely understand why the original Go team didn’t do it that way. It would’ve been close to impossible. The only reason

Lucandra.NET

Project DescriptionLucandra.NET is a Lucene + Cassandra implementation written in C# which is based on the Lucandra (Java) project by Jake Luciani. Apache's Lucene is a high-performance full-text search engine, and Apache's Cassandra is a promising NoSQL database, originally developed by Facebook. Note: This page is currently under construction and I'm working on the documentation as much as I

The Small Things: Converting a Existing Web Application to a MVC Web Application

I have an existing web application that contains a couple of WCF services, but today I also wanted to add some pages and decided that I wanted to create them with ASP.NET MVC2. This is the steps I took to get the MVC pages to run just fine in my existing application. First of all I added references to System.Web.Mvc and System.Web.RoutingI created a dummy MVC project so that I could see what was

Efficiently Generating SHA256 Checksum For Files Using C#

I’m building a file synchronization with the cloud application and I want to store a checksum with the file so that I can verify later that the file is what I think it is. I’m not a crypto guy so I searched around the internet for a solution.   I found lots of examples and settled on this one that uses SHA256 for the job.  I also found some comments saying that it would be more efficient to wrap

Visual Studio Sharing Files Between Projects

Normally when an existing file is added to a project within Visual Studio, the file is copied into the project folder. There is an option to link to the file, rather than duplicate it, allowing files to be shared between multiple projects. Adding Existing Files to a ProjectWhen you are creating a project using Visual Studio you can create and add new files or include files that already exist.

Enabling email notifications in the SQL Agent for Alerting & Job monitoring

To enable email notifications in SQL Agent you will need to follow the following steps:1. Configure Datbase Mail: create an email SMTP account and corresponding Email Profile. To do so please follow directions outlined in the blog post: "SQL Database Mail - Send Emails from SQL Server". 2. In SSMS (SQL Server Managment Studio) select SQL Server Agent node and right click on the properties (see

10 Secret Reasons Why You Lose Clients

Have you ever lost a client and then wondered why?Of course, you can always ask your client what went wrong, but many will not tell you. They may be afraid of hurting your feelings or they may just want to avoid a potentially unpleasant confrontation with you. Since I use freelancers once in a while that puts me in the unique position of being a freelancer and also an occasional client of

Inside Native Applications

IntroductionIf you have some familiarity with NT's architecture you are probably aware that the API that Win32 applications use isn't the "real" NT API. NT's operating environments, which include POSIX, OS/2 and Win32, talk to their client applications via their own APIs, but talk to NT using the NT "native" API. The native API is mostly undocumented, with only about 25 of its 250 functions

Rabu, 24 November 2010

RawWrite for Windows

RawWrite (or rawrite) is an essential tool for creating boot disks and other floppy disk images. Traditional rawwrite programs do not run under modern versions of windows so here is the Win32 version which does. Read more: chrysocome.net Posted via email from .NET Info

Rootkit In a Network Card Demonstrated

Guillaume Delugré, a reverse engineer at French security firm Sogeti ESEC, was able to develop proof-of-concept code after studying the firmware from Broadcom Ethernet NetExtreme PCI Ethernet cards... Using the knowledge gained from this process, Delugré was able to develop custom firmware code and flash the device so that his proof-of-concept code ran on the CPU of the network card. Read more:

One Giant Cargo Ship Pollutes As Much As 50M Cars

One giant container ship pollutes the air as much as 50 million cars. Which means that just 15 of the huge ships emit as much as today's entire global 'car park' of roughly 750 million vehicles. Among the bad stuff: sulfur, soot, and other particulate matter that embeds itself in human lungs to cause a variety of cardiopulmonary illnesses. Since the mid-1970s, developed countries have imposed

Seagate To Pay Former Worker $1.9M For Phantom Job

The jury in a Minnesota-based wrongful employment case delivered a verdict ordering disk-drive manufacturer Seagate to pay $1.9 million to a former employee who uprooted his family and career at Texas Instruments in Dallas to move to Minnesota for a job that did not exist. The man was supposed to be developing solid state drive technology for Seagate but was laid off months later. 'The reason

$1.3 Billion Oracle-SAP Verdict Is Biggest Ever For Software Piracy

After an 11 day trial whose highlights included the hilarious “Where In The World Is HP CEO Leo Apotheker?“ the Oracle vs. SAP intellectual property case has finally ended today in a whopping $1.3 billion dollar verdict, “The largest amount ever awarded for software piracy” according to Oracle co-president Safra Catz. Before the trial, SAP admitted that its 2005 acquisition TomorrowNow pirated

AJAX 2: What is coming with XMLHttpRequest Level 2? - JS Classes blog

XMLHttpRequest, often referred as AJAX, is going to get a new and improved specification version named Level 2. This article gives an overview of what is planned for XMLHttpRequest Level 2 and how it can be used to improve Web applications usability. ContentsIntroductionBrief history of XMLHttpRequestXMLHttpRequest limitationsAJAX 2: What is XMLHttpRequest Level 2?ConclusionsIntroductionFor those

Open-Source Social Network Diaspora Goes Live

Diaspora, a widely anticipated social network site built on open-source code, has cracked open its doors for business, at least for a handful of invited participants. 'Every week, we'll invite more people,' stated the developers behind the project, in a blog item posted Tuesday announcing the alpha release of the service. 'By taking these baby steps, we'll be able to quickly identify performance

Visual Studio 2010 Slowdown: VMDebugger is the Culprit

I recently wrote how Visual Studio 2010 is very slow on my fast PC, taking 25-30 seconds to start up.  Thanks to a Microsoft employee who helped me but wishes to remain anonymous, my problem is solved. The VMWare add-in, VMDebugger, causes Visual Studio 2010 to load very slowly on my fast PC.Note that your mileage may vary, and VMDebugger may not ultimately be responsible.  Software is so complex

11 Things to Do When a Client Files Bankruptcy

Bankruptcy filings are up considerably. So, don't be surprised if you open your mail and find a letter from an attorney telling you that one of your clients or customers is seeking relief from the courts to solve his or her financial troubles. The bankruptcy process is full of rules that the debtor and creditor must follow. However, bankruptcy is not as formal as say civil court, says Victoria

Grid, Cloud, HPC … What’s the Diff?

It’s always nice when another piece of the puzzle comes into focus.  In this case, my time speaking at the first ever International Super Computer (ISC) Cloud Conference the week before last was well spent.  The conference was heavily attended by those out of the grid computing space and I learned a lot about both cloud and grid.  In particular, I think I finally understand what causes some to

HTTP Post Denial Of Service: more dangerous than initially thought

What’s special about this denial of service attack is that it’s very hard to fix because it relies on a generic problem in the way HTTP protocol works. Therefore, to properly fix it would mean to break the protocol, and that’s certainly not desirable. The authors are listing some possible workarounds but in my opinion none of them really fixes the problem. The attack explainedAn attacker

10 Essential Tools for building ASP.NET Websites

I recently put together a simple public website created with ASP.NET for my company at Superexpert.com. I was surprised by the number of free tools that I ended up using to put together the website. Therefore, I thought it would be interesting to create a list of essential tools for building ASP.NET websites. These tools work equally well with both ASP.NET Web Forms and ASP.NET MVC. Performance

Passing Configuration Data to the Master Page in ASP.NET MVC

One of the common activities that I have found myself doing lately whenever I create a new project is to identify a way of loading configuration information and customizing the behavior of the Master Page. The way I initially went about solving this problem was to create a base class and have all of my Page ViewModel’s inherit from it. This caused two different things that I had to constantly

Ice Meteorite Found with Extraterrestrial Life-Forms

Duane P. Snyder will announce the discovery of the first and only known ICE METEORITE containing EXTRATERRESTRIAL LIFE-FORMS on November 30, 2010 at 10:00am at the Ramada Inn Conference Center, 1555 Phoenix Road, South Haven, MI 49090. SOUTH HAVEN, Mich., Nov. 21, 2010 /PRNewswire/ -- Duane P. Snyder will announce the discovery of the first and only known ICE METEORITE containing

Common WinDbg Commands (Thematically Grouped)

Common WinDbg Commands (Thematically Grouped) 1) Built-in help commands 9) Exceptions, events, and crash analysis 17) Information about variables   Collapse all examples 2) General WinDbg's commands (clear screen, ..) 10) Loaded modules and image information 18) Memory  PDF 3) Debugging sessions (attach, detach, ..) 11) Process related information 19) Manipulating memory ranges 4) 

Setting up kernel mode debugger in windows

IntroductionWhen ever there is a bug in your program you usually open a debugger(GDB,visual studio debugger etc) to fix it, but how do you debug a bug in the operating system? Do you load the running OS in to debugger? Is it possible? The simple answer is no, Because even the debugger works with the help of OS. Its a catch22 situation History Earlier developers used two machines one is the

Installing QT 4.7.x for VS2010

had some issues installing QT on windows with vs2010 so I thought I'll share the solution that worked for me. I'm using win7 64 bit , vs2010, qt 4.7.1 What do I need ? qt add on for visual studio (qt-vs-addin-1.1.7.exe) qt open source distribution (qt-everywhere-opensource-src-4.7.1.zip) Installation Process download and install qt add on for visual studio download qt open source distribution

Build a Pandora clone with Silverlight 4

For the uninitiated, Pandora is a popular Flash-based internet radio service: users create their own radio stations by seeding an artist or song, and by giving a thumb-up or thumb-down to played songs. The software responds by playing more of what the user likes based off these inputs. In this article, I'm going to show you how to build a Pandora-like music service using Silverlight 4, WCF, and

Why does machine.config contain invalid Xml content after installing .Net 3.5 patches?

For quite a few times, I heard customers would hit this issue after installing .Net 3.5 patches or repair 3.5 on Windows Vista or Windows 2008 Server. Basically the machine.config file contains some invalid Xml content and applications using configuration do not work, especially for IIS-hosted applications. The main problem is that the WCF 3.5 installer (WFServiceReg.exe) did not handle the

zlibnet - c# zlib wrapper library

Project Descriptionzlibnet - c# zlib wrapper libraryFeatures:-zip-unzip-compression/decompression stream-fast, since using the unmanaged zlib library-64bit support Not supported:-encryption/password protection-multi volume archives-UTF8 filenames/comments (can be added if needed, but not added yet since not supported by Windows Compressed Folders)-ZIP64 (can be added if needed, but not added yet

David Reveman lands GPU acceleration for Moonlight…

David Reveman had a great birhtday present for me today. He just completed the hardware accelerated support for Moonlight.You can watch two quick videos I made today with David: Hardware acceleration with Moonlight and Moonlight 3D Perspective Support. In Moonlight hardware acceleration is used for a number of features:Applying 3D transforms to any Silverlight objects (drawings, images, videos).

Top picks from a honkin’ big list of Windows Phone 7 tips

I don’t have a Windows Phone 7 handset yet but I am really hoping for one in the new year so I’ll be bookmarking this list of 72 tips from Pocket-lint for future reference.In the meantime though here’s my top picks of their tips. 5. Removing apps from the Start screenYou like the app, but you don’t really want it on your Start screen anymore. No worries. Hold your finger on the tile in question

Debugging: Failed to Enable Constraints

I have a DataSet that has had a new field added to it recently. When my console application runs, it was throwing a “Failed to enable constraints” exception. I needed to find out which column in the DataSet was causing the error, so a co-worker suggested I create a temporary data adapter/set, so I can examine the GetErrors() method. Once the exception occurs, access the GetErrors() property using

Damn You, Coding

Read more: Twisted Cynic Posted via email from .NET Info

Debugging SQL Queries, Functions, & Stored Procedures with SQL Management Studio’s Integrated Debugger

Working with Stored Procedures and functions on a database tier can be time consuming, hard to debug and sometimes just difficult to get clarity on what is “happening”. A rarely discussed feature of Microsoft SQL Management Studio is its inbuilt debugging features. These allow you to see exactly what is going on, and step through your logic in a similar fashion to working in Visual Studio. I

Hexa.xText

Project DescriptionHexa.xText is a .Net command line tool to extract text from source files for later translation, just like the GNU xgettext does.Extracted text are placed inside po files that must be compiled into satellite assemblies through the included PO2Assembly MSBuild task. Hexa.xText will extract any string contained in a method call like the following:t("String to extract");where t is

Selasa, 23 November 2010

Palm Top Theater

YoutubeThe International Film Festival Rotterdam has brought cinema to the large screen. We think that the intimacy of small mobile screens are giving new impulses to the cinematic experience. V2_ will present a series of films and animations small enough to watch in the palm of your hand. Acquaint yourself with a new 3D film experience on your iPhone or iPad at the Palm Top Theater exhibition.

Design barter

We design, you pay whatever and whenever you like.Submit a job now »Read more: Design Barter Posted via email from .NET Info

RHEL 6 released

Red Hat is pleased to announce the world-wide availability of Red Hat Enterprise Linux 6. This is a milestone event for Red Hat as we once again push forward and upward our leadership position in the market. Red Hat Enterprise Linux 6 delivers dramatic improvements in reliability, security, performance, scalability and infrastructure flexibility. Red Hat Enterprise Linux 6 has been specifically

Nessus 4.4.0 Released!

Tenable is excited to announce a new release of the Nessus vulnerability scanner! This is a major release (moving from 4.2.2 to 4.4.0) and includes several new features and enhancements, including the addition of scan scheduling and enhanced reporting. The GUI and web server have both been updated and will be released through the plugin feed. The enhancements included in the plugin feed will be

The Placebo Effect Not Just On Drugs

It seems the placebo effect isn't just valid on drugs. It's also a fact on elevators, offices and traffic lights. An article by Greg Ross says: 'In most elevators installed since the early 1990s, the 'close door' button has no effect. Otis Elevator engineers confirmed the fact to the Wall Street Journal in 2003. Similarly, many office thermostats are dummies, designed to give workers the illusion

Game Design Evolution – Yeah, That’s About The Size of It…

I don’t know who is originally responsible for this image, but it pretty much sums everything up nicely, and not just for first-person shooters or map design: Read more: Tales of the Rampant Coyote Posted via email from .NET Info

Forget 200 lines, Red Hat speeds up Linux with 4 lines of code

Speeding up Linux, doesn't necessarily have to be a gargantuan task and it doesn't have to be done by Linus Torvalds either.On Monday, Torvalds praised a new 200 line Linux kernel patch that was going to make Linux faster for all. Inside of the same week, a new userspace patch has emerged that can likely do the same thing, but with less code and even better performance. "I really wonder why logic

Create jQuery Loading Animation to make your website Attractive

A loading animation is important to signal the user that the application is still doing something and the user should wait for an action to complete. This gets even more important when you use Ajax in your webapp. Using the Ajax library jQuery it is very easy to create a loading animation that will be shown whenever an Ajax request is running.First of all, you need an animated gif with a loading

Attachmate To Acquire Novell For $2.2B Cash

Novell has agreed to be acquired by Attachmate Corporation for $6.10 per share in cash, in a transaction valued at approximately $2.2 billion. The Boston Globe reports that the deal also includes the sale of some intellectual assets to a consortium organized by Microsoft. Attachmate plans to operate Novell and SUSE as separate business units. Here is the press release. Read more: SlashdotRead

How to Quickly Create New Google Documents with a Shortcut or Hotkey

If you’ve switched over from Microsoft Office to Google Docs, you’ve probably noticed there’s just one problem: creating a new document takes far too many steps. Here’s how to create new documents with single click—or even a shortcut key. Note: you can use these shortcuts to create Documents, Spreadsheets, and Presentations, but we’ve not yet figured out how to make a shortcut for a new Drawing.

lxc Linux Containers

The  container  technology  is actively being pushed into the mainstream linux kernel. It provides the resource management through the control groups aka process containers and resource isolation through the namespaces. The linux containers, lxc, aims to use these new functionalities to provide an userspace  container  object  which  provides  full resource isolation and resource control for an

Beta Version of Nevercookie Released

Anonymizer has released a beta version of Nevercookie, the recently announced Firefox plugin designed to protect against the Evercookie, a JavaScript API built and made available to prove that the more you store and the more places you store it, the harder it is for users to control a Web site's ability to uniquely identify their computer. Evercookie is a more persistent form of cookie that

Lamebook

Funny Facebook Statuses, Fails, LOLs and More Read more: Lamebook Posted via email from .NET Info

Privoxy

Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Privoxy is Free

Direct3D 10/11 Is Now Natively Implemented On Linux!

It's a pity Luca Barbieri or any Mesa / Gallium3D developers are not at Oktoberfest as they are deserving of more than a few Maß of Augustiner. In fact, today a new Gallium3D state tracker was pushed into Mesa and it's perhaps the most interesting state tracker for this open-source graphics driver architecture yet. It's a state tracker that exposes Microsoft's DirectX 10/11 API on Linux! And it's

12 Ubuntu Derivatives You Should Consider

It's no secret that Ubuntu 10.10, or Maverick Meerkat, is one of the most user-friendly Linux distributions of all time for business and home users.What many people don't realize, however, is that there are several other Linux distributions out there that are also based on Ubuntu and offer many of the same advantages. Some are focused on a specific niche; others are simply variations on the same

.Net Memory. Problem with uncontrolled LOH size & possible solution

Introduction Managed memory in .Net is separated on “Stack” memory and some kind of “heaps”.  The most important types of “heaps” is SOH (Small Object Heap) and LOH(Large Object Heap). From the names of memory types becomes clear that SOH - stores only small objects & LOH stores large objects. In this article I will consider only possible problem with LOH memory. Other memory types are out of

CUDA-Multiforcer – GPU Powered High Performance Multihash Brute Forcer

The Cryptohaze Multiforcer is a high performance multihash brute forcer with support for per-position character sets, and very good performance scaling when dealing with large hash lists. As an example, on a list of 10 hashes, the Cryptohaze Multiforcer achieves 390M steps per second on a GTX260/216SP@1.24ghz card. On a list of 1.4 million hashes with the same card, performance drops to 380M

HowTo: MSDeploy & MSBuild

Big Picture from MSDeployWe start with the big picture of MSDeploy. The aim is to build a Deployment Package to make the delivery of software easier. Therefore we have several providers which are used to, for example, pack the data bank or the main ASP.NET Files into one package. Now you are able to publish this package quit easy with MSDeploy. MSDeploy should be installed on the Server too. At

Consequences of using variables declared __declspec(thread)

As a prerequisite, I am going to assume that you understand how TLS works, and in particular how __declspec(thread) variables work. There's a quite thorough treatise on the subject by Ken Johnson (better known as Skywing), who comments quite frequently on this site. The series starts here and continues for a total of 8 installments, ending here. That last page also has a table of contents so you

Agile versus Waterfall Videos

The Rise and Fall of Waterfall is a cute video (although with a somewhat annoying soundtrack.. watch with the sound off). YoutubeMy favorite part of it is the screenshot (seen above) showing the waterfall stages and their respective impacts.  The poor Operations folks at the bottom remind me of Ken Johnston’s quote: Ops beware; unpleasant matter tends to roll downhill and you are near the

Thread Local Storage

Windows, like practically any other mainstream multithreading operating system, provides a mechanism to allow programmers to efficiently store state on a per-thread basis. This capability is typically known as Thread Local Storage, and it’s quite handy in a number of circumstances where global variables might need to be instanced on a per-thread basis. Although the usage of TLS on Windows is

WAITFOR what ?

I raised a feedback to sqldocfb@microsoft.com regarding the documentation for the WAITFOR statement in BOL. It has been the same ever since SQL 2000 and I think it is wrong WAITFOR {    DELAY 'time_to_pass'  | TIME 'time_to_execute'  | [ ( receive_statement ) | ( get_conversation_group_statement ) ]      [ , TIMEOUT timeout ] } But if it was consistent with other items in BOL such as RAISERROR

XQuery for the Non-Expert

It’s time for a new series to blog posts – XQuery for the Non-Expert.  The purpose for these posts will be to provide a foundation for using XQuery against XML.Myself, I am not an XQuery expert.  These posts are summarizing what I know and understand.  Some of this knowledge and understanding is changing on a regular basis.  Please correct me if something incorrect is posted here. To prepare for

Part 1 of 4 : Tips/Tricks for Silverlight Developers.

I wanted to create a series of blog post that gets right to the point and is aimed specifically at Silverlight Developers. The most important things I want this series to answer is :What is it? Why do I care? How do I do it?I hope that you enjoy this series. Let’s get started:Tip/Trick #1)What is it? You can easily enable a visual Framerate counter inside your Silverlight Application. The end

MonoDevelop 2.4.1 is out

MonoDevelop 2.4.1 has been released. This release is focused mostly on bug fixes, but we still managed to add a few nice features:we now support .NET 4.0 projects;the Gtk# designer now works on OSX; better native OS integration on Mac and Windows.Improved support for XBuild projectsRead more: Miguel de Icaza's web log Posted via email from .NET Info

Thumbnail Previews in the IDE Navigator

n vstipTool0023 (http://blogs.msdn.com/b/zainnab/archive/2010/05/17/using-the-ide-navigator-vstiptool0023.aspx)I showed you how to use the IDE Navigator.  This next tip comes from Paul Harrington on the Visual Studio Team.  In Visual Studio 2008 when you used the IDE Navigator you also were able to see thumbnail previews of the documents in the list.  However, this feature was removed from Visual

Coded UI Editor – Guide

Feature Pack 2 is Available! and it’s Awesome!The feature pack comes with some great features and the one I want to talk about in this post is – Coded UI Test Editor.I’ve recorded a simple CUIT on Windows Calculator that adds to numbers and show the result. Getting StartedAfter you install the Feature Pack 2 you will notice that Double Click or Right click on “UIMap.uitest” file will open a new

Senin, 22 November 2010

Геолокация в Windows 7 без GPS

Много ли вы видели ноутбуков, которые оснащены GPS датчиком? Примерные оценки можно посмотреть тут, 58 штук из 4380, то есть 1.3%. Прямо скажем — не много. Трудно назвать все причины, по которым производители не оснащают портативные компьютеры, в общем-то, недорогим чипом, но наша заметка как раз о том, как ваш ноутбук снабдить функциональностью геолокации, даже если GPS датчика у вас нет. А

25 Fresh inspiration website design

Web designers always stay up to date on current trends, with seeing how to structure web layout, choose color palettes, work with usability, and understand the overall design process.  It’s important to frequently check out other inspirational designs to see how you can apply new trends to your own project and continue to go forward as a designer. There are plenty of creative and beautiful

"Save To My Skydrive" Come True

More than two years ago, I wrote a blog post of my view on Cloud Computing, titled "Save To My Skydrive". Back then both OfficeLive and Google Docs provided online Office applications and collaboration tools. But one thing missing in both offerings was the feature that allows one to easily save local docs to the cloud, by simply clicking "File"-->"Save To Skydrive" in MS Office software. Today,

uClibc

uClibc (aka µClibc/pronounced yew-see-lib-see) is a C library for developing embedded Linux systems. It is much smaller than the GNU C Library, but nearly all applications supported by glibc also work perfectly with uClibc. Porting applications from glibc to uClibc typically involves just recompiling the source code. uClibc even supports shared libraries and threading. It currently runs on

Kinect hack creates world's greatest shadow puppet (video)

Hey Xbox 360 Kinect owners, want to spice up those family shadow puppet shows? Then check out the installation prototype created by Emily Gobeille and Theo Watson using an Xbox Kinect connected to a laptop using the libfreenect Kinect drivers and ofxKinect. The openFrameworks system tracks the elbow, wrist, thumb, and tips of the fingers to map a skeleton onto the movement and posture of an

Google Offered To Buy Twitter For $2.5-$4 Billion – Sources

Earlier this year, as part of an on-going dialogue between Google's corporate development team and Twitter, Google floated the idea of an acquisition with a price around $2.5 billion, we've heard from a source close to an executive involved in the talks. We'd caution that this was not a formal offer – more of a casual offer to offer. The overture was refused – even characterized as "insulting." A

Razer Nostromo gaming keypad supplants Belkin's n52te Speedpad, does it proud

Think you've been gaming on the PC for awhile? If you can't vividly remember gushing over this thing (and scrounging up pennies from under the couch in order to finance one), move along. If, however, you're still the proud owner of an attic-bound Belkin Nostromo n52, you can definitely prepare yourself for a healthy dose of nostalgia here. After co-developing Belkin's n52te Speedpad a few years

zButterfly torrent client focuses on current movie releases

new Windows BitTorrent client called zButterfly has a twist that sets it apart from the competition: a menu of current movie releases, including the hottest flicks that are still running in theaters. zButterfly has an easy-to-use interface for searching and browsing the releases, and operates entirely on torrentless downloading via magnet links. Even the most clueless downloader can use

Intel Talks 1000-Core Processors

An experimental Intel chip shows the feasibility of building processors with 1,000 cores, an Intel researcher has asserted. The architecture for the Intel 48-core Single Chip Cloud Computer (SCC) processor is 'arbitrarily scalable,' According to Timothy Mattson 'This is an architecture that could, in principle, scale to 1,000 cores,' he said. 'I can just keep adding, adding, adding cores Read

Microsoft Lync: Ushering in a new generation of communications

Today, with our customers and partners in New York City, we are celebrating the launch of Microsoft Lync -- the next generation of Office Communications Server.  Earlier this year, Exchange 2010, SharePoint 2010 and Office 2010 launched, delivering the best productivity experience across the PC, phone and browser. Together, these products provide the productivity backbone of modern businesses and

Useful SQL Server System Stored Procedures You Should Know

System Stored Procedures are useful in performing administrative and informational activities in SQL Server. Here’s a bunch of System Stored Procedures that are used on a frequent basis (in no particular order): System Stored Procedure Descriptionsp_help Reports information about a database object, a user-defined data type, or a data typesp_helpdb Reports information about a specified database

One possible reason why ShellExecute returns SE_ERR_ACCESSDENIED and ShellExecuteEx returns ERROR_ACCESS_DENIED

(The strangely-phrased subject line is for search engine optimization.)A customer reported that when they called ShellExecute, the function sometimes fails with SE_ERR_ACCESSDENIED, depending on what they are trying to execute. (If they had tried ShellExecuteEx they would have gotten the error ERROR_ACCESS_DENIED.) After a good amount of back-and-forth examing file type registrations, a member of

MySQL Database Backup Utility

IntroductionOne of the most frequent questions on forums is how to back up MySql databases directly from a .NET application. Unfortunately, unlike Access, SqlLite etc., it is not really a case of just copying a file and renaming it, you really have to get down and dirty and basically recreate the SQL that creates all tables and inserts all data back into tables from scratch. There are

Why do I recommend switching over from MyISAM to Innodb!

MyISAM has been the default storage engine for MySQL for years now. But that is soon going to change. With MySQL 5.5, Innodb is going to be the default storage engine (and I am pretty pleased about that, no more new users complaining about MySQL not being ACID compliant). But why do I recommend Innodb over MyISAM. Following are the reasons:I will start of with reasons not so obviously discussed

IIS Smooth Streaming HD Sample Content

OverviewThe following high-definition (HD) Smooth Streaming video presentations are encoded with Microsoft Expression Encoder 4 into multiple bit rates that allow you to experience on-demand Smooth Streaming in action: Big Buck Bunny H.264 720p.zip. A sample Smooth Streaming video presentation encoded with H.264 video and AAC audio codecs in 8 standard bit rates.Elephants Dream H.264 720p.zip. A

How to Detect if a Method is Overridden

Suppose you want to know if (the class of) a particular object overrides a virtual method. For an example of this see OpenJDK's Thread.isCCLOverriden() (line 1573).In Java the obvious way to do this would be to use reflection. On the CLR there is another way that is both more accurate1 and more efficient. Here's the MSIL method from IKVM's java.lang.Thread.isCCLOverridden() implementation:.method

Visual Studio Add-In For creating Vista Gadget

Project Description The absence of tools in Visual Studio that can help developers to create Vista gadgets is strange and disappointing, in my opinion. I hope it's a temporary state, but now, I want to show you some tools that can help you to develop Vista gadgets using only Visual Studio 2008 or 2010 IDE. These tools include Visual Studio template for creating Vista gadgets and Visual Studio

MSI Explorer - A quick and simple means to spelunk MSI’s

Most of us are quite familiar in creating MSI or Setup for our applications. By using a MSI, we can make sure all dependencies for running the application will be placed properly. MSI is the best option available on Windows OS for packaging and distributing our application. For .NET developers, Visual Studio presents lot of features in creating setup and deployment projects for our application.

OpenID Starter Kit for ASP.NET MVC

OpenID Starter Kit for ASP.NET MVCOverviewOpenID Starter Kit for ASP.NET MVC is first and foremost it is a learning tool. I've learned a lot about OpenID while developing this and commented the code a lot. If you want to use it in this way I running the application and stepping through the code. Apart from it's education value you can also use it as a starter kit for your ASP.NET MVC based web

.NET LwVCL (visual components library)

IntroductionLwVCL (http://www.lwvcl.com) is fast, flexible, small visual components library that provides rich set of various UI components (~30) and is thrifty to system resources usage. We have been developing the project for more than two years. It grows fast, keeping its best features. The next generation of the library is not just a components set - it's a solid GUI toolkit that adds

Minggu, 21 November 2010

WPF & Silverlight: Интерфейс ICommand и его назначение

"Для чего нужен интерфейс icommand wpf" – подобные запросы зачастили в последнее время, решил написать небольшую статью на эту тему.Интерфейс ICommand представляет основу для команд в паттерне MVVM. Он реализует известный паттерн – Команда. Более подробно об паттерне MVVM есть здесь: http://msdn.microsoft.com/ru-ru/magazine/dd419663.aspx, да и я писал несколько раз на эту тему, воспользуйтесь

Fxcop ASP.NET Security Rules

Project DescriptionFxcop ASP.NET security rulesThis is a set of code analysis rules aiming at analyzing ASP.NET and ASP.NET MVC security against best practices. The rules can be used by Visual Studio 10 Ultimate or FxCop v10 standalone. InstallationSimply run the installer and specifiy the rules folder of your FxCop installation. For Visual Studio it's normally C:\Program Files (x86)\Microsoft

Code-Signing Best Practices

This paper provides information about code signing for the Microsoft Windows family of operating systems. It provides guidelines for:• Chief technology officers (CTOs) or chief security officers (CSOs) who deploy the code signing infrastructure. • Test lab managers who manage the process of test signing and verifying applications.• Build engineers who sign and verify applications for use with

Building and Using Expression Blend Behaviors

Behaviors are a cool way of adding functionality to XAML design elements in Expression Blend. The idea is that some rich functionality that would be hard for a designer to do can be wrapped in a way that can then be used as a drag-and-drop feature to add that functionality to a XAML element in Expression Blend. A Behavior then is an ‘object’ that implements a certain base class and member(s) so

Goodbye Google App Engine (GAE)

Choosing GAE as the platform four our project is a mistake which cost I estimate in about 15000€. Considering it's been my money, it is a "bit" painful.GAE is not exactly comparable to Amazon, Rackspace or any of this hosting services, because it is a PaaS (Platform as a Service) rather than just a cluster of machines. This means that you just use the platform and gain scalability, high

Build Interactive Content Slider using Accordion Control in Silverlight 4

The Accordion is a web control that allows you to provide multiple panes and display them one at a time. It is like having several CollapsiblePanels where only one can be expanded at a time. The Accordion is implemented as a web control that contains AccordionPane web controls. Each AccordionPane control has a template for its Header and its Content. We keep track of the selected pane so it stays

Facebook Removing Gmail From List Of Third Party Email Providers

Something is up on the Facebook vs. Google data reciprocity front. It looks like Facebook is removing Gmail from the list of third party email providers on  “Find Friends”, whereas we were seeing direct link downloads to Gmail contacts still offered as an option just a couple of days ago. It gets stranger. Some new users who sign up with their Gmail accounts can still see the option to add

Whoa, Google, That’s A Pretty Big Security Hole

Facebook would probably just consider this a feature, but the rest of us will definitely consider this a big security hole. The creator of http://guntada.blogspot.com (don’t visit that site just yet) emailed us this morning to explain. If you’re already logged in to any Google account (Gmail, etc.), and visit that site, he’s harvested your Google email. And proves it by emailing you immediately.

Interacting with javascript in Silverlight

ometimes you need to interact with javascript from your Silverlight application.  Sometimes you even need to have javascript manipulate the state of your Silverlight objects.  In this post I’m going to show you how you can pass an object created in Silverlight to a javascript prototype, which changes a value on that object, and then have the Silverlight application request that object back with

How many times did my database auto grow?

Today as I entered the Office, I came know that we were receiving alerts stating that the transaction log files of tempdb on one of the instances was almost full. This instance was running SQL Server 2000. I quickly looked at the transaction log file of tempdb and shocked to see that the initial size was set at 250 MB and auto growth of 100 MB! Also there were a lot of 833 errors in the Event Log

NHibernate: Complex relationships

I got an interesting question today (I am teaching my NHibernate course now).The tabular structure is similar to this: But the desired object structure is: Read more: Ayende @ Rahien Posted via email from .NET Info

How do I : Use Sql File Stream

IntroductionSql Server 2008 has a file stream data type. This data type allows users to store content on the disk instead of the database as a real file.There are many articles on this topic on the net however they are not all from a perspective of a developer. This article will just tell us enough on how to get started removing all the extra noise. I will try to link more advanced concepts as

Mono 2.8.1 is out

We have just released Mono 2.8.1. Mono 2.8.1 is a bug fix release for Mono 2.8 that contains the major fixes for bugs that were identified in Mono 2.8, it also contains a few security fixes.You can download this version from our Download page Fix DateTime's from binary representation #648252 (gonzalo)Fixed Nullable's serialization in Remoting's binary serializer #646556 (gonzalo)Logging profiler

Miracle patch out-performed by four lines of bash

Well it’s nothing if not interesting. The ~200 line “miracle” patch promises a huge improvement in desktop responsiveness, but Lennart Poettering (from Red Hat) has replied to Linus’ praising comments with 4 lines of bash which out-perform it, on the current vanilla kernel. (And by the way, Lennart seems to agree with Con Kolivas about this patch, in that make -j is not a valid desktop use case.)

HTML5 – Netscape/IE 3 all over again?

I attended two in-depth sessions on HTML5 at Oredev 2010 last week, which completely changed my perspective at it. After watching Giorgio Sardo present Microsoft’s plans for HTML5 and Robert Nyman present different HTML5 APIs, I feel that we’re moving ahead in technology but fear that we’re going back to the browser incompatibility horrors of a decade ago. Microsoft is committed to HTML5Giorgio

The Linux Programming Interface

The Linux Programming Interface (published in October 2010, No Starch Press, ISBN 978-1-59327-220-3) is a detailed guide and reference for system programming on Linux and UNIX systems. With 1552 pages, 115 diagrams, 88 tables, nearly 200 example programs, and over 200 exercises, TLPI is the most comprehensive description of Linux and UNIX system programming available. The author, Michael Kerrisk,

Simple Apache Proxying

I was recently working with Apache and a service running on Kris Zyp's Persevere project (which is beyond awesome).  Persevere was pushing messages to my application which was running on Apache; the problem was that Persevere and Apache were running on different ports which technically made them cross-domain.  In order to make the server believe the web service was on the same domain/port, I

Black Duck KnowledgeBase

Black Duck continuously searches the internet for open source and downloadable code. The result is the industry’s most comprehensive database of open source software and associated license and other information, the Black Duck KnowledgeBase. KnowledgeBase ContentsThe Black Duck KnowledgeBase includes over 230,000 projects from more than 4,500 sites and is updated with thousands of new projects on

Making an Apple-style Splash Screen

The Beatles are on iTunes! Or, if you are like me and don’t care that much about it, you’ve probably noticed the awesome splash screen that Apple used to promote the event. Risking to start a trend, in this tutorial we are going to create a simple jQuery plugin that will display fancy Apple-style splash screens for us. The HTMLEncapsulating the splash screen functionality into a jQuery plugin

Stanford Engineering Courses online

SEE programming includes one of Stanford’s most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seven more advanced courses in artificial intelligence and electrical engineering. Read more: Stanford Engineering Courses online Posted via email from .NET Info

25 BEST SSH COMMANDS / TRICKS

OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure

INTEGRATE HTML5 FORM IN ASP.NET MVC

This article is divided into three parts. In the first, part I will show you how you can add Html5 forms in your ASP.NET MVC application with very minimum effort. In the second part, I will show you how to implement client side validation which will trigger automatically even when the browser does not have the html5 client side validation support and in the last part I will show widgetify the

Prism v4 - VB Style and Training Kit too

Prism provides guidance designed to help you more easily design and build rich, flexible, and easy to maintain WPF desktop applications and Silverlight Rich Internet Applications (RIAs).File Name: PrismV4_VB.Exe Size: 30.4MBVersion: 4.0Date Published: 11/19/2010Language: English…Prism provides guidance designed to help you more easily design and build rich, flexible, and easy to maintain Windows

Want to Make Your SQL Server Run Faster for Free?

I know I do!The trick is to properly manage your VLFs.What are VLFs? The short anser is that VLF stands for virtual log file. SQL Server database log files are made up of many smaller virtual log files that make it easier for SQL Server to manage the log files. For a much more in-depth answer see the Transaction Log section Paul Randal’s (Blog|Twitter) TechNet article. The problem with virtual

Taking Baby Steps with Node.js – Threads vs. Events

In a previous blog post, I provided a shallow introduction to Node.js. I also mentioned where you can find more information on how to get it installed on Windows as well as how to install a seemingly popular package manager in the JavaScript community called Npm. In the mean time, I’ve started to get a more clearer view on the general concepts on which Node.js is based on, as well as the kind of

VirtualPathProvider

In .Net 3.5, WF services were introduced making it easier to host workflows as services.  With the send and receive activities, a workflow can be used instead of coding a service by hand.  The common way to expose workflows as services is to place the .svc/.xoml or .xamlx files and supporting libraries in the host path.  This works well if you have the workflow definitions stored in files.  If

TSQL Challenge 43 – Identifying incomplete segments and missing elements

The problem presented in this challenge is related to a validation requirement needed as part of an electronic data exchange process. There are two applications involved in this process. The “Sender” sends a ASCII file in a predefined format to the “Receiver”. The “Receiver” application accepts the files and inserts the data into a staging table. The following illustration shows how the data

Introduction to SQL Server 2008

I have recently completed the development of a new fundamental course about SQL Server 2008. If you are doing your first steps this is the course you want to take. You will learn the basic SQL commands and you will learn how to execute them when using the SQL Server 2008. The course is available for free personal usage at www.abelski.com and it includes slides, video clips, forums and assignments

Kamis, 18 November 2010

Xbox 360 Kinect GTA 4 Review - WTF?

Read more: Youtube Posted via email from .NET Info

Virtual Disk Service

PurposeThe Virtual Disk Service (VDS) manages a wide range of storage configurations, from single-disk desktops to external storage arrays. The service exposes an application programming interface (API). Where ApplicableApplication developers who use the interfaces described in this guide can query and configure a heterogeneous set of vendor-supplied and internally managed storage. VDS hides from

Caching of, in, and around your Silverlight application

This is the first in a 3-part series of articles about caching & Silverlight.Part 1: The client: XAP & Assembly CachingPart 2: The Silverlight application: Isolated StoragePart 3: The server: caching your result sets You can download the source code here.A lot can be written about this subject, and because of that, quite a few misunderstandings about Silverlight and caching exist.Let’s start with

Step-by-Step Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit

Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent DropperPart 2: Reverse Engineering the Kernel-Mode Device Driver Stealth RootkitPart 3: Reverse Engineering the Kernel-Mode Device Driver Process Injection Rootkit Part 4: Tracing the Crimeware Origins by Reversing the Injected CodeSUMMARYThis four part article series is a complete step-by-step tutorial on how to reverse

The Black Art of P/Invoke and Marshaling in .NET

Last week I finally managed to hunt down and resolve a bug that I had been chasing for quite some time. A couple of years ago I built an ASP.NET web service that makes use of a native library to provide most of its functionality. This native DLL exposes a C API, much like the Win32 API, that we’ve been using for integrating a highly-expensive product from a certain vendor into our system. I didn’

Obfuscating JavaScript with Closure Compiler Advanced Optimizations

While working on our upcoming game, Onslaught! Arena, we wanted to obfuscate the JavaScript code as much as possible. Using tools like YUICompressor and Google Closure Compiler (with Standard Optimizations) just weren’t enough. Luckily, Closure Complier has an “Advanced Optimizations” mode. This mode will really make your JavaScript gross and unreadable! Here are some cases to watch out for along

Android Theme For GMail And 4 More New Themes

Google has been bringing the Android branding to pretty much every web product they own. Earlier we told you about an  Android Theme for Google Chrome Browser. Now, Google has released an Android theme for GMail which has the GMail logo turned into a Bot! Four more new theme have been released in addition to the Android theme for GMail. Apart from the Android theme for GMail, there are four more

Hacked Kinect Brings Futuristic User Interface

The video above is a picture browsing application running in Ubuntu controlled using Microsoft’s Kinect. It allows for a multi-touch like control without touching the surface – like the stuffs we see in Sci-Fi movies. Read more: digitizor Posted via email from .NET Info

Did Internet Explorer 9 Cheat In The SunSpider Benchmark?

A Mozilla engineer has uncovered something embarrassing for Microsoft – Internet Explorer might be cheating in the SunSpider Benchmark. The SunSpider, although developed by Apple, has nowadays become a very popular choice of benchmark for the JavaScript engines of browsers. While Mozilla engineer Rob Sayre was benchmarking Firefox 4 with different browsers, he noticed something with Internet

Google Refine lets you fix and handle huge, messy sets of data

Google has just introduced a new product, and this time it's a PC application (with a browser-based UI). It's called Google Refine, and it solves a problem that is enormous for some people: it lets you take massive sets of "messy data" and massage them into shape so that they're uniform, make sense, and can be statistically analyzed. The video after the jump shows a very good example, which is

Gravity attempts to be the Pandora of the Web

Gravity, a new company set up by three former MySpace executives, has just had its public launch at the Web 2.0 Summit in San Francisco. The company's rather ambitious goal is to become the "Pandora of the Web," able to bring you the content it thinks you might be interested in based on your interests. To gauge what you might like to view, Gravity proposes to use your public social network feeds

Hacked iRobot Uses XBox Kinect To See World

A student at MIT's Personal Robotics Group is going to put Microsoft's Kinect to a good use: controlling robots. Philipp Robbel has hacked together the Kinect 3D sensor with an iRobot Create platform and assembled a battery-powered bot that can see its environment and obey your gestured commands. Tentatively named KinectBot, Robbel's creation can generate some beautifully detailed 3D maps of its

UIControlSuite .NET

V13.6 has now been released: What's new?Docking control for SilverlightDocking control for WPFMulti-column combobox for WPF and SilverlightRibbon control for SilverlightAdvanced Grid control for the WPFAdvanced Grid control for Silverlight Advanced Grid control for ASP.NET MVC 2.0Scheduler for WPF, with Hour, Day, Month and Year viewsScheduler for Silverlight, with Hour, Day, Month and Year

Web Deploy: How to see the command executed in Visual Studio during publish

I just saw a post on Twitter asking the question    Is there any easy way to see the underlying MSBuild command when building in VS2010? Want to see the MSDeploy params. @wdeploy?One thing to know is that when you publish from Visual Studio, by default we use the MSDeploy (AKA Web Deployment Tool) Object Model in order to perform the deployment. We do this for performance and other reasons.

GeckoFX

GeckoFX is a Windows Forms control written in clean, commented C# that embeds the Mozilla Gecko browser control in any Windows Forms Application. It also contains a simple class model providing access to the HTML and CSS DOM. GeckoFX was originally created by Andrew Young for the fast-growing visual CSS editor, Stylizer. It is now released as open-source under the Mozilla Public License.Visit the

OpenWrap

Any .NET project beyond "hello world" is going to require external libraries and tools. There's an abundance of free, open source libraries out there, but how do you get what you need? Manually searching, downloading (and in some cases building from source) is not a productive use of your time. It's even worse when one library depends on another and you have to manage dependency chains! The

Browser Information In Silverlight

In this post I will show you how to get the browser information.To get the browser information the namespace used for this is System.Windows.Browser. The BrowserInformation object contains properties such as the name, product name, product version , browser version etc. Let us start with the example which will use to get this information and display on the screen which I will share with you at

How to: create a nonrectangular ChildWindow - part 1

This article describes step by step how to create a non rectangular child window. A ring-shaped child window is created. Step 1 - preparations In expression blend 4 a new Silverlight 4 project is created. A button is added to the surface of MainPage.xaml. This button is later used to call the ChildWindow. Then--add new item… is the Silverlight project by right-clicking on the project->

Changing the viewport of a listbox in WPF

One of the nice thing about the WPF controls is the ability for them to mimic almost anything….In my case I wanted to recreate an old Winform sample of a NASDAQ sales status board…Which required a grid to draw different colors, show new items being added – but do it with out scrollbars…Turns out the WPF Listbox does all this with no or very little code at all – in most cases just a little mark up

Creating a ASP.NET MVC HTML Helper for Silverlight

Over the last few weeks I have started investing some time in learning ASP.NET MVC (specifically ASP.NET MVC 2).  This has nothing with the ongoing "Silverlight is dead" debate and I actually started a deep dive into the technology back in August 2010.  I think that ASP.NET MVC is very important for Silverlight developers to learn (more on this in another blog post), because of its obvious

Decoding clr20r3 .NET exception – using mono cecil

I have often seen Devs trying to figure out the cause of the app crash without a memory dump. The only information that is available to analyze is the Windows Error Reporting message in the event viewer which would have “Event Name: CLR20r3″ along with Watson bucket information like this. Fault bucket , type 0Event Name: CLR20r3Response: Not availableCab Id: 0Problem signature:P1:

Word2CHM, convert a word document to a CHM file.

Word2CHM is a open source C# program which can convert MS Word document(in 2000/2003 format) to a CHM document. It require HTML Help Workshop and MS Word 2003.BackgroundMany people write customer help document with MS Word, because MS Word is very fit to write document include text, images and tables. But many customers did not want read help document in MS Word format, but they like CHM format.

Gaikai beta opens

Notable developer Dave Perry has announced that Gaikai entered open beta on Sunday.The game-streaming service is being launched gradually, with 1,000 invites sent out to consumers at the weekend, and more being issued in waves of 10,000. “Everyone will be getting invited in batches and if you are too far from our servers, don’t worry you’ve actually helped as you’ve shown us where we need to

GFS the Google File System in 199 Lines of Python

GFS, the Google File System, sits as the backbone of the entire Google infrastructure. However, for many it is a mystery, especially for those lucky enough to be more acquainted with high-level python code than low-level C operating system sources. But have no fear, we shall break through the veil and describe an implementation of GFS in 199 lines of python. Naturally, you may want to read about

No More Magic Strings! Presenting: @string.of

The ProblemHow many times have you seen the following code snippets?1. Checking method parametersif (executeMethod == null){    throw new ArgumentNullException("executeMethod"); }2. Implementing a property in a WPF / SL view-modelpublic double Size{    get { return _size; }    set    {        _size = value;        RaisePropertyChanged("Size");    }}The first time I had to wrote code like this I

CppUnit

What is CppUnit?   CppUnit is a C++ unit testing framework. It started its life as a port of JUnit to C++ by Michael Feathers. For a quick tour of unit testing with CppUnit, see the Cookbook in the latest documentation. For an introduction to unit testing, see [UnitTest], [ProgrammerTest], and [CodeUnitTestFirst] at the [wiki:Wiki:FrontPage C2.com wiki]. Features:XML output with hooks for

Rabu, 17 November 2010

Missing INTERNET_STATUS_REQUEST_COMPLETE callback after calling Wininet’s FtpOpenFile() in asynchronous mode

Symptom: To reproduce the issue:1.       Put a zero byte file on a FTP site.2.       Call InternetOpen() with flag INTERNET_FLAG_ASYNC3.       FtpOpenFile() to download the file. Wininet will send out a FTP request. After receiving the response, the registered callback procedure will receive an INTERNET_STATUS_REQUEST_COMPLETE event.4.       Call FtpOpenFile() again.This time Wininet will not

30 Fresh Inspirational Web Designs

       Web design inspiration can help you stay up to date on current trends, as well as seeing how to structure designs, control color palettes, work with usability, and understand the overall design process.  It’s important to continually check out other inspirational designs to see how you can apply new concepts to your own designs and continue to evolve as a designer. Here you’ll find some

Web.config Transformation Syntax for Web Application Project Deployment

Web.config files typically include settings that have to be different depending on which environment the application is running in. For example, you might have to change a database connection string or disable debugging when you deploy a Web.config file. For Web application projects, ASP.NET provides tools that automate the process of changing (transforming) Web.config files when they are

Y PPA Manager: Easily Search, Add, Remove Or Purge PPAs In Ubuntu

Y PPA Manager is a project I've been working on for a couple of weeks for easily managing and finding Launchpad PPAs in Ubuntu. Y PPA Manager is a tool for easily managing Launchpad PPAs that uses YAD for a graphical user interface (a Zenity fork which comes with a lot of improvements) and comes as a .deb and with a Launchpad PPA for easy updates. Please note that this is a pre-alpha release as

Google Translation bots

Google Talk can help you with quick translations, or even translate your chats in real-time! All you need to do is chat with one of our Translation Bots. The bots are named using two-letter language abbreviations formatted as '[from language]2[to language]@bot.talk.google.com,' and all available combinations are listed in the table below. To use a bot, add it to your Friends list and send it the

The ~200 Line Linux Kernel Patch That Does Wonders

There is a relatively miniscule patch to the Linux kernel scheduler being queued up for Linux 2.6.38 that is proving to have dramatic results for those multi-tasking on the desktop. Phoronix is reporting the ~200 line Linux kernel patch that does wonders with before and after videos demonstrating the much-improved responsiveness and interactivity of the Linux desktop. While compiling the Linux

How to rescue your friends' email addresses from Facebook and export them to Gmail

With Google calling out Facebook last week for trapping your contacts, it seems like a perfect time to offer a solution for rescuing those Facebook contacts and their email addresses -- sorry, still no phone numbers -- and exporting them to Gmail or your other address book of choice. To do this, you'll need a Yahoo! account (Mozilla's Asa Dotzler says a Windows Live account works, too). It's

Cracking Passwords With Amazon EC2 GPU Instances

As of Nov. 15, 2010, Amazon EC2 is providing what they call 'Cluster GPU Instances': An instance in the Amazon cloud that provides you with the power of two NVIDIA Tesla 'Fermi' M2050 GPUs... Using the CUDA-Multiforce, I was able to crack all hashes from this file with a password length from 1-6 in only 49 Minutes (1 hour costs $2.10 by the way.). This is just another demonstration of the

How To Use Your Wii Remote as a Gyroscopic Mouse

If you have a spare Nintendo Wii remote with the Motion Plus add-on, you can use it to control your Windows PC from across the room. Here’s how to get it working in a couple of easy steps.Using the Wii’s Motion Plus add-on and some software, you can easily control presentations or your home theater PC.  You will need: A Wii remote (obviously)The Motion Plus add-onWindows XP, Vista, or 7A

TDL4 Rootkit Bypasses Windows Code-Signing Protection

In recent versions of Windows, specifically Vista and Windows 7, Microsoft has introduced a number of new security features designed to prevent malicious code from running. But attackers are continually finding new ways around those protections, and the latest example is a rootkit that can bypass the Windows driver-signing protection. The functionality is contained in TDL4, which is the latest

DIY Kinect Hacking

Introduction!Everyone has seen the Xbox 360 Kinect hacked in a matter of days after our "open source driver" bounty - here's how we helped the winner and here's how you can reverse engineer USB devices as well! USB is a very complex protocol, must more complicated than Serial or Parallel, SPI and even I2C. USB uses only two wires but they are not used as 'receive' and 'transmit' like serial.

jQuery 1.4.4 API Cheat Sheet

Read more: jQuery 1.4.4 API Cheat Sheet Posted via email from .NET Info

101 Great Computer Programming Quotes

“Most software today is very much like an Egyptian pyramid with millions of bricks piled on top of each other, with no structural integrity, but just done by brute force and thousands of slaves.”(Alan Kay) Read more: Dev Topics Posted via email from .NET Info

What every developer should know about fonts

I originally thought using fonts would be pretty simple. However, proper handling of fonts has ended up being a significant effort in Windward Reports (our XML and SQL Reporting system). If you're going to do much more than place a line of text in a form, then the details start to matter. Fonts & GlyphsSo what is a font? Fundamentally a font is a series of glyphs. What you think of as a character

Tenacious C

Tenacious C presents pointers and memory in a visual format that makes the hard parts of C ridiculously easy. Read more: Tenacious C Posted via email from .NET Info

Difference between InnoDB and MyISAM in MySQL

MyISAM and InnoDB are two most commonly used storage engines of MySQL database. However, MyISAM is the default storage engine chosen by MySQL database, when creating a new table. The major differences between these two storage engines are : InnoDB supports transactions which is not supported by tables which use MyISAM storage engine.InnoDB has row-level locking, relational integrity i.e. supports

HTTP Error 404.3: WCF Hostes in IIS. Add a MIME type

Normally when we host a WCF  Service in IIS and while browsing we get the following frustrating screen. The error message in the above screen is very clear. We need to add MIME type for .SVC extension. To solve above problem Open command prompt as Administrator Navigate to  C:Windows\Microsoft.Net\Framework\v3.0 Read more: C# Corner Posted via email from .NET Info

How to Setup Your Java Development Environment in Ubuntu

In this post, I’m going to explain how you can setup a Java development environment (JDK + Eclipse) in Ubuntu. I’m using Ubuntu 10.10, but these steps should be applicable to majority of Ubuntu versions. Let’s start with JDK first.Install Sun JDK:Download the Linux version of latest JDK binary from the Oracle website. For Java 6, the file name would be: jdk-6u22-linux-i586.binCopy the downloaded

List all Default Values in a SQL Server Database

I had earlier written a query to Find a Column Default value using T-SQL. Here’s how to find the default value of all columns in all tables of a databaseSELECT obj.name as 'Table', col.name as 'Column', object_definition(default_object_id) AS [DefaultValue]FROM   sys.objects obj INNER JOIN sys.columns colON obj.object_id = col.object_idwhere obj.type = 'U'The sys.objects and sys.columns provides

Why does Coded UI Test playback fail to scroll the Silverlight control into view?

Bringing the control into view is an essential part of the UITestAction during Playback since Coded UI Test performs actual Mouse/Keyboard actions on the control instead of programmatic action on the control. In case of failure to bring the control into view, the playback will throw a FailedToPerformActionOnBlockedControl exception or a PlaybackFailure exception. The Coded UI Test playback engine

Top 7 Coding Standards & Guideline Documents For C#/.NET Developers

Some time back, I collated a list of 7 Must Read, Free EBooks for .NET Developers, and a lot of people found it useful. So, I thought about putting together a list of Coding Standard guidelines/checklists for .NET /C# developers as well. As you may already know, it is easy to come up with a document - the key is in implementing these standards in your organization, through methods like internal

10 Dirty Internet Explorer CSS Hacks You Might Not know

IntroductionDisclaimer: The intention of this article is not to encourage to apply this hack to your web projects but to understand what have been using by other web designers/developers. The best way to solve Internet Explorer's CSS layout issue is - create different style sheets for different versions of Internet explorers. Alright, have ever found yourself in this situation, you were trying to

Reversing the source of the ZeroAccess crimeware rootkit

We recently undertook a project to update the hands-on labs in our Reverse Engineering Malware course, and one of our InfoSec Resources Authors, Giuseppe "Evilcry" Bonfa, defeated all of the anti-debugging and anti-forensics features of ZeroAccess and traced the source of this crimeware rootkit: Part 1InfoSec Institute would classify ZeroAccess as a sophisticated, advanced rootkit. It has 4 main

Visual Guide to NoSQL Systems

There are so many NoSQL systems these days that it's hard to get a quick overview of the major trade-offs involved when evaluating relational and non-relational systems in non-single-server environments. I've developed this visual primer with quite a lot of help (see credits at the end), and it's still a work in progress, so let me know if you see anything misplaced or missing, and I'll fix it.

How to make sharing code between .NET and Silverlight (a little) less painful

Windsor ships for both .NET and Silverlight. However working with the codebase in such a way that we can target both runtimes at the same  time with the least amount of friction possible proved to be quite a challenge. ProblemWe’re using single .sln and .csproj files to target both runtimes (actually 5 of them, as we ship for 3 versions of .NET and 2 versions of Silverlight, but I digress) with

Automating Windows Applications Using the WCF Equipped Injected Component

IntroductionThis article discusses a way to convert a Windows application that does not export any program interface to an automation server. Many very good publications have presented and discussed in depth various aspects of this problem. Most of these works dealt with techniques for injection of code into process to be automated (target process) and API hooking. This article demonstrates the

Extended WPF Toolkit–Updated ColorPicker control

If you are using the Extended WPF Toolkit you have probably noticed the ColorPicker control.  If you are not familiar with the Color Picker control, it is simply a WPF editor control that allows a user to select a color.  If you are using release version 1.2 or less the color picker will look something like this: Read more: Posted via email from .NET Info

בלעדי! כל הפרטים על התקנת DENALI!

עלק בלעדי.בנקודה הזאת אני בטוח שכל אחד מכם כבר הוריד את Denali, התקין, ויודע בעל פה את הסינטקס של יצירת Availability groups. לא?אז לכל מי שהיה לו יותר חשוב להתעסק בלחפש כורסת טלוויזיה טובה עם מסז’ ולא לכלך את הידיים עם המוצר שבסך הכל הולך לקבוע את עתידו המקצועי ובעקבות כך הכלכלי, האישי והחברתי בשנים הקרובות, קבלו את ההתקנה בתמונות: מסך ההתקנה הראשי, זה שאף ישראלי מעולם לא קרא: Read more: אם הייתי

Adobe Acrobat X

Adobe Acrobat X has just been released! And continuing in our tradition of providing the direct download links for major Adobe software such as CS5, Lightroom 3, and Elements 9, below you’ll find the direct links for the brand new Acrobat X (10)… We also have added the direct links (DDL) for the previous version Acrobat 9 as well, in case you need them for any reason. The links given below go to

Pure virtual destructors in C++

To work correctly, classes with virtual methods must also have virtual destructors. Interestingly, virtual destructors can be declared pure, which can be useful in some cases.Imagine you have a base class you want to make abstract. In this base class all methods have meaningful default implementations, and you want to allow the derived classes to inherit them as-is. However, to make a class

WPF - DoEvents like Windows Forms

בגלל ארכיטקטורה שונה אין ב WPF את הפונקציה DOEVENTלהלן הקוד ל WPF: public static void DoEvents(){// Create new nested message pump. DispatcherFrame nestedFrame = new DispatcherFrame();// Dispatch a callback to the current message queue, when getting called, // this callback will end the nested message loop.// note that the priority of this callback should be lower than the that of UI event

Shared Application Settings in machine.config

BackgroundApplication behavior frequently depends on exogenous parameters, such as a service URI or file paths, that are supplied by a developer or administrator. These inputs must be amenable to quick change without the need to refactor or recompile. A common answer to this requirement is to place such inputs in a configuration file: app.config for Windows applications or web.config for web

10 Best Server Monitoring Tools That Kick Ass

Blogger always prefer front end tools; Although Developers and designers are also worried about handling website. They have to make sure that website script looks fine from backend. Sometimes, it would be difficult to identify the problems. Most of the time physical machine is not optimized and use a lot of resources of website. It would be trouble to take full advantage for working effectively.

Removing Strong-Signing from assemblies at file level (byte patching)

IntroductionThis article describes how Strong Signing works in .NET Framework 1.1 and 2.0. In particular, it is about how Strong Signing is implemented at file level - I mean, bytes in an assembly EXE or DLL. Knowing this allows me to best understand how security should and can be implemented in managed code. Lastly, we must be aware that Strong Signing assemblies is not a definitive way against

Secret Debug registers in AMD processors

  Hidden password-protected debug registers in the Athlon XP is enough to make any hardware-oriented programmer more paranoid about what could be lurking between the registers. If you work with assembler you slowly grow to understand the architecture of the machine and to know its registers and operations as if they were your own. So it comes as a shock to discover that there is something hidden

F# MonoDevelop Add-In Available

Tomas Petricek has announced the availability of the F# MonoDevelop Add-In.The add-in provides intellisense for MonoDevelop, inline documentation and access to the F# interactive shell. Most of the heavy lifting is done by the F# compiler itself which is used directly by the Add-In as a service: Read more: Miguel de Icaza's web log Posted via email from .NET Info

Visual Studio 2010 Feature Pack 2 released–new set of Testing capabilities

I am very happy to announce that we have just released Visual Studio 2010 Feature Pack 2 – which extends the Visual Studio 2010 product with a great set of capabilities – this time in the area of Testing. As you know, we have adopted a concept of feature pack releases which enhance and complement the capabilities we released with the Visual Studio 2010 product earlier in the year. These feature