Senin, 31 Januari 2011

New RSS Feed address

RSS: .Net Info Posted via email from Jasper-net

PS3 firmware 3.56 hacked in less than a day, Sony's lawyers look confused (update)

Sony's taken some strong steps against PS3 cracking in the past week -- not only has it taken to the courts and won a temporary restraining order against Geohot and fail0verflow for cracking the console, but it also released firmware 3.56, which locked things down again. Unfortunately, that restraining order doesn't mean anyone else has to stop a-crackin', and wouldn't you know it: 3.56 was

New Android Exploit Discovered To Steal Data

A researcher at North Carolina State University has discovered yet another Android Browser exploit that affects the new Android 2.3 (Gingerbread) and previous versions. Slashdot recently covered a previous browser exploit that affected all versions of the Android Browser, but was patched in 2.3. Xuxian Jiang writes 'our finding here is that the patch contained in Android 2.3 is not an ultimate

Citadel

Citadel is a turnkey open-source solution for email and collaboration. One simple installation delivers a multitude of powerful features, including:email calendaring/schedulingaddress booksbulletin boardsmailing list serverinstant messagingwikimultiple domain supporta powerful web interfaceRead more: Citadel Posted via email from Jasper-net

Kaspersky Source Code Leaked to BitTorrent

A Russian website CNews claims that the popular Kaspersky Antivirus source code has been leaked to web and available via torrents and file sharing sites that was stolen by a former employee of Kaspersky Lab who sentenced to three years jail for intellectual property theft. According to CNews, the complete source weighing 182MB in a RAR archive uploaded to a free file hosting site by Unknown. The

Open-source Challenge To Exchange Gains Steam

An open-source, cloud-based e-mail alternative to Microsoft Exchange called Open-Xchange has signed up two new service providers and predicts it will have 40 million users by the end of 2011. Based in Germany, Open-Xchange has tripled its user base from 8 million to 24 million paid seats since 2008, with the help of three dozen service providers including 1&1 Internet, among the world's largest

עידן חדש לסטארטאפים בישראל – הכירו את Venturegeeks

בשנתיים האחרונות אנחנו עובדים מאוד קשה בניוזגיק כדי לספק לקהילה הטכנולוגית את כל החידושים, העדכונים וכל מה שקורה בתחום הטכנולוגיה בארץ ובעולם, מזווית ראייה קצת שונה וטכנולוגית יותר. בשנתיים הללו, במהלך הסיקור של סצינת הסטארטאפים הישראלית נפגשנו עם מאות סטארטאפים שונים, שנמצאים כל אחד בשלב שונה ולכל אחד ניסינו לעזור היכן שיכלנו. השלב הטבעי הבא בחיבור שלנו לקהילת הסטארטאפים והיזמים הישראלים היה

Guide to building .NET projects using Hudson

In this guide I'm going to show how to set up a C# project on the Continuous integration server Hudson. I've been using Hudson on .NET projects since september and it works really well. I'm going to use Media Portal as the example project. The below goals will be solved in this guide:Get the source code from the Subversion repositoryLink change logs to the repository browser using ViewVCBuild the

Tutorials for Making Your Website Mobile Friendly

Mobiles have become a necessity in our lives and are being used worldwide. Today’s phone set has the capability to browse the web, listen to songs, watch videos or even download any required information. This is the main reason why many companies have considered rebuilding their sites to make them mobile compatible. With the introduction of iPhone there has been a massive demand of mobile web

Five Must Antivirus Mobile Security Software for Smartphones

Mobile phones have become so important in our lives that sometimes it’s really hard to realize the role a mobile phone plays in our everyday activities. Mobiles have become so popular because of their incredible features like they are mobile, and handy. Moreover the convenience of getting connected with everyone anytime especially in case of any emergency makes this device very special in today’s

Visual Studio Code Metrics PowerTool 10

OverviewThe Code Metrics PowerTool is a command line utility that calculates code metrics for your managed code and saves them to an XML file. This tool enables teams to collect and report code metrics as part of their build process. The code metrics calculated are: Maintainability IndexCyclomatic ComplexityDepth of InheritanceClass CouplingLines Of Code (LOC)Read more: MS Download Posted

.NET Tools that I would never want to part with..

Microsoft is a mammoth company and ever so often the release tools and free things that I would never be without on my system… Here are a list of them in no particular order.. Do you spend your days writing tests?  if so this next one is for you.. Spec ExplorerFeatures & BenefitsSpec Explorer 2010 is a tool that extends Visual Studio for modeling software behavior, analyzing that behavior by

How debuggers work: Part 2 – Breakpoints

This is the second part in a series of articles on how debuggers work. Make sure you read the first part before this one.In this partI’m going to demonstrate how breakpoints are implemented in a debugger. Breakpoints are one of the two main pillars of debugging – the other being able to inspect values in the debugged process’s memory. We’ve already seen a preview of the other pillar in part 1 of

NUXEO

About NuxeoFounded in 2000, Nuxeo is a global software company, serving the Enterprise Content Management needs of companies across a broad range of vertical markets. Paris and Boston are our two major corporate centers. We have grown strategically to serve global enterprises with our strong and ever-expanding network of authorized partners and systems integrators with our award-winning Galaxy

RocketSVN fly's to freedom. RocketSVN Server/RocketSVN for VS now free (as in free) and open sourced too!

I’m excited to announce that we have decided to make both RocketSVN Server (Subversion Server for Windows) and RocketSVN for VS (SVN add-in for VS) 100% free. Indefinitely. For unlimited users While we have been doing great additions to both open source projects (Ankh and Subversion), we decided it was important not to charge for the work we’ve done. We’re also happy to make the RocketSVN Server

How to cancel the closing of your Silverlight application (in-browser and out-of-browser)

It’s almost two years ago when I wrote about the concept of canceling the the closing of a Silverlight application. In that era I was only trying to solve the problems that exist inside the browser. Like someone who accidently closes the tab, or types a new url in the tab of the Silverlight application. These things aren’t always a problem, but in Line of Business applications you would at least

Unit testing in Silverlight

My team is working on a Silverlight project for the last three months. One of the first issues we encountered was unit testing for the Silverlight libraries.Unfortunately, this issue is not trivial. Current dev tools, including the VSTS do not support running tests in the traditional way. In order for a Silverlight test to run, it needed to be hosted inside a web page. This is quite problematic

Прототипы для Smart Cards

О чем речьМногие реальные проекты уже сегодня используют методологию TDD (Test-Driven Development). Вместе с тем количество интересующихся данным вопросом постоянно увеличивается, а это будет способствовать тому, что и в будущем количество таких проектов будет неуклонно расти. Причины этому достаточно очевидны – использование методологии способствует улучшению качества кода на самом раннем этапе

Minggu, 30 Januari 2011

LINQ – Left Join Example in C#

In this post, we will see an example of how to do a Left Outer Join in LINQ and C#.In a previous post, we saw how to do an Inner join in C# and LINQ where each element of the first collection appears one time for every matching element in the second collection. If an element in the first collection has no matching elements, it does not appear in the join result set. However in a Left Outer Join,

Localizing Silverlight applications

Introduction to Globalization and LocalizationA decade or two ago, it was cool to use terms like "global village", "information superhighway" and so forth. Now they're clichés. A few years ago, if a small scale enterprise had clients from across the globe, it was considered to be a step ahead of others. Today it's commonplace to have clients and branch offices scattered across the globe. As a

Top 7 Myths about HTTPS

Myth #7 – HTTPS Never CachesPeople often claim that HTTPS content is never cached by the browser; perhaps because that seems like a sensible idea in terms of security. In reality, HTTPS caching is controllable with response headers just like HTTP. Eric Lawrence explains this succinctly in his IEInternals blog:It comes as a surprise to many that by-default, all versions of Internet Explorer will

Enumerating resources from a native library via WinAPI

This weekend I was thinking about writing a tool that would extract icons from a library or executable. As you know, some system libraries (like shell32.dll or user32.dll) have integrated resources, that can be bitmaps, icons, cursors and whatnot. The reason why I needed those icons is to be able to build consistent UIs with the Windows OS instance I am currently running. It appeared to me a

SQL Server Query Optimization Rules of Thumb

Just came across this very helpful article.  The main highlights are at the bottom as follows…Good candidates for clustered indexes are:Primary keys of the lookup/reference/dimension/master tables Foreign keys of the fact/detail tablesDatetime fields of the tables queried by the date rangeOptimization Rules of ThumbAlways look at the query plan first. It will show you the optimal current

Modeling InnoDB Scalability on Multi-Core Servers

Mtt Keep’s blog post on InnoDB-vs-MyISAM benchmarks that Oracle recently published prompted me to do some mathematical modeling of InnoDB’s scalability as the number of cores in the server increases. Vadim runs lots of benchmarks that measure what happens under increasing concurrency while holding the hardware constant, but not as many with varying numbers of cores, so I decided to use Mat Keep’s

SQL Server Basics: How to Create Different Type of Tables

Most of the time we forget to write for beginners or who occasionally use SQL Server. Possibility its because we just want to pressurize others with our knowledge and resultantly we don't like to write for simple topic targeting beginners. Today we will discuss about different types of tables, which can be created for different purposes.Regular User TablesRegular user table is the actually table

MDbg.exe (.NET Framework Command-Line Debugger)

The NET Framework Command-Line Debugger helps tools vendors and application developers find and fix bugs in programs that target the .NET Framework common language runtime. This tool uses the runtime debugging API to provide debugging services. You can use MDbg.exe to debug only managed code; there is no support for debugging unmanaged code. The .NET Framework Command-Line Debugger is

Technical Note: Proxy Classes Different when using Svcutil.exe and VS Add Service Reference (doubleclick.com edition)

The WSDL url http://advertisersapi.doubleclick.net/v1.12/api/dfa-api/campaign?wsdl was used by a customer with the Svcutil.exe tool to generate a proxy class and associated message and data classes, and it worked fine. But when they tried to use the Add Service Reference... (often shortened to "ASR") wizard in Visual Studio, they had a problem: they could not import the fault contracts. In fact,

Reflection of Images Using Expression Blend 4

Here is an article on reflected images using Microsoft Expression Blend in WPF. 1. Open a new project in Expression Blend and name it "RefImage" or any other name as you like with project type "WPF" and select Language as C#: 2. Select LayoutRootand then setBackground to black from the Properties pane.3. Go to Assets Library and select a StackPanel Control and draw it on top of your LayoutRoot

Heritage Shared

A few days ago, we posted two C++ quizzes based on a question posted in a forum. Let’s review the first question#include  class Foo {public:    virtual void DoStuff()=0; };  class Bar : public Foo {public:    virtual void DoStuff(int a)=0;};  class Baz : public Bar {public:    void DoStuff(int a) override    {        std::cout << "Baz::DoStuff(int)";    }      void DoStuff() override

Interrupt Hooking and retrieving device information on Windows NT/2000/XP

IntroductionHi, this is my first article, and English is not my natural language. So first, please excuse my terrible language. This article is about hooking software/hardware interrupts and will also show you, how to retrieve device resource information from the registry. I ASSUME A LITTLE BIT OF DRIVER CODING KNOWLEDGE FOR THIS ARTICLE! Background/How this worksOk, now I'll explain, how

How Google Tests Software

This is the first in a series of posts on this topic.The one question I get more than any other is "How does Google test?" It's been explained in bits and pieces on this blog but the explanation is due an update. The Google testing strategy has never changed but the tactical ways we execute it has evolved as the company has evolved. We're now a search, apps, ads, mobile, operating system, and so

CloudFFS : Large scale, high performance files storage system

CloudFFSSo we built and deployed this new service not long ago at work, and @stelabouras suggested we document some parts of it for internal consumption. Given that I haven't blogged for months, I thought I 'd just pour those words here instead. CloudFFS (yes, it is a funny name) is a file-system (but not in the traditional sense, it doesn't hook into the kernel VFS layer or anything ) that

Unit Testing ASP.NET MVC Routes

Two things I always encourage customers to do are;Always delete the default route pattern after a File –> New project. This helps you focus on designing your routes throughout your site, and helps reduce SEO-unfriendly routes etc. Always unit test your routing table.For number two, this is because it is so easy to have a route that looks like this;/products/{productname}/{action}… and then a

Some remarks on VirtualAlloc and MEM_LARGE_PAGES

If you try to run the sample program demonstrating how to create a file mapping using large pages, you'll probably run into the error ERROR_NOT_ALL_ASSIGNED (Not all privileges or groups referenced are assigned to the caller) when calling Adjust­Token­Privileges. What is going on? The Adjust­Token­Privileges enables privileges that you already have (but which are masked). Sort of like how a super

Understanding IIS Bindings

Internet Information Services (IIS) uses 4 decision points for the site bindings.  They are the protocol, port, IP and host header.  This video lesson walks through the bindings and shows how each one is used. This is part 5 of a 52 week series on various topics for the Web Administrator.Other weeks include:Week 1 – Ping and Tracert  Week 2 – Understanding DNS zone records Week 3 – Nslookup – the

Debug Analyzer.NET - A debugging utility, written in .Net, for .Net developers, to help debug .Net applications

What is Debug Analyzer.NET?Debug Analyzer.NET is a debugging automation tool to analyze memory dumps using analysis plug-ins written in .NET!  It has several other features to make your debugging life easier and pleasant. It also takes advantage of Wisdom of Crowd to enhance the analysis capabilities.  In other words, if you have used windbg + sos/psscor and ever wondered about automating debug

A Plea to Software Vendors from Sysadmins - 10 Do's and Don'ts

What can software vendors do to make the lives of sysadmins a little easier?A friend of mine is a grease monkey: the kind of auto enthusiast who rebuilds engines for fun on a Saturday night. He explained to me that certain brands of automobiles were designed in ways to make the mechanic's job easier. Others, however, were designed as if the company had a pact with the aspirin industry to make

CLR Profiler for the .NET Framework 4

Brief Description. The CLR Profiler allows developers to see the allocation profile of their managed applications.Read more: MS Download Posted via email from Jasper-net

BitLocker Wrapper Library

Project DescriptionThe BDE Wrapper library allows .NET Developers to quickly use the WMI BitLocker provider without having to learn the complex methods and operation of the WMI classes.Read more: Codeplex Posted via email from Jasper-net

Windows Phone GPS Emulator

All Windows Phone devices have a built-in Assisted GPS (aGPS), which is used by various phone applications including maps, camera, and search (to provide location-based search results). Developers can access location information on Windows Phone by using the System.Device.Location namespace, which is supported in .NET 4 and later. The GeoCoordinateWatcher class supplies location data based on

ASP.Net MVC - Multi Form and Multi Submit Button Handling

IntroductionThis article is inspired by the blog that showed excelled approach for using ActionNameSelector attribute. I have tried to take this approach little further to support multiple forms and multiple submit buttons without providing any hardcoded value to the attribute but just by specifying name of the form and button this action intended to handle. This makes sense when you don’t want

NuGet

NuGet (formerly known as NuPack) is a free, open source developer focused package management system for the .NET platform intent on simplifying the process of incorporating third party libraries into a .NET application during development. NuGet is a member of the ASP.NET Gallery in the Outercurve Foundation (see the press release). There are a large number of useful 3rd party open source

How to Launch Your Startup in 16 Easy Steps (Infographic)

Read more: Software by Rob Posted via email from Jasper-net

DokanDiscUtils Bridge

Project DescriptionThis a a bridge for the Dokan library and the DiscUtils library that allows Any partition/image that discutils can open to be mounted using dokanBuilt using Dokan dokan-dev.net/en and DiscUtils.codeplex.com Currently working: Mounting Partition (Tested NTFS on VHD), Reading file, directory browsing, Deleting, possibly moving.Read more: Codeplex Posted via email from

mac2wepkey Huawei Home Gateway default WEP

Huawei HG520 and HG530 routers are vulnerable to weak cipher attacks. It is possible to generate the default WEP/WPA key of Huawei HG520 routers. The purpose of this document is to explain the process of developing a key generator for these devices. Huawei router models HG520b and HG520c contain a key generator command (mac2wepkey) in their TELNET interface. They also contain a command to change

Sabtu, 29 Januari 2011

Microsoft IIS 6 parsing directory “x.asp” Vulnerability

############################################################# Microsoft IIS 6 parsing directory Vulnerability#############################################################Discovered by:Pouya daneshmand whh_iran[AT]yahoo[DOT]comhttp://securitylab.ir/blog#Introduction:Using this vulnerability you can bypass some Security filters, for example a file with “.jpg” or “.rar” extension can be executed as

Kamis, 27 Januari 2011

Streeme – Open Source & HTML5-Based Personal Music Server

Streeme is a free and open source application, that consists of both the server + frontend, allowing you to listen to your personal music collection anywhere. Its front-end is HTML5-based and works in most modern browsers including smartphones. Read more: WebResources Depot Read more: Streeme [Google code] Posted via email from Jasper-net

HOWTO: Install Android-x86 2.2 in VirtualBox

Since Android-x86 2.2 was officially released a few days ago, I figured I’d provide a quick rundown of how to get it up and running in VirtualBox. All in all, it is pretty straightforward. Download, install, download, install. But if you’ve never installed a Linux based system before, some of the steps will look quite foreign. Plenty of screenshots will help with that! Step 1: Install

who is this

Read more: Geek and Poke Posted via email from Jasper-net

INSTALL KDE SC 4.6 IN UBUNTU 10.10 (WITH REDESIGNED ACTIVITIES SYSTEM, FASTER KWIN)

KDE SC 4.6 was released today, brining polish to existing functionality as well as some cool new features and bug fixes.Probably the biggest change in KDE SC 4.6 is the redesign of the Activities system which makes it easy to associate applications to activities - once you create some new activities, right clicking an window title you'll have an option to make that application part of a certain

The Command Line Desktop

We love the command line, but this desktop takes that love to entirely new levels with detailed, integrated statistics and information all arranged to make one densely packed but beautiful package.Read more: Lifehacker Posted via email from Jasper-net

The Linux boot process, a chart

The Linux boot process, a branching chart. For the most part, the levels do not depend on column. LILO does not require EFI, nor does GRUB require BIOS. EFI and BIOS support are now included in both bootloaders. Yes, there is some simplification here. EFI is very featured, but hasn't been commonly exercised to its full extent. Eventually EFI could possibly replace GRUB/LILO, but that day hasn't

Date/Time Support in NHibernate

In this post, we’ll examine the ways that NHibernate supports the DateTime-related data types, including some new features introduced in NHibernate 2 and 3. Here is a quick summary for the impatient. DbType .NET SQL Type DateTime System.DateTime datetime LocalDateTime System.DateTime datetime UtcDateTime System.DateTime datetime DateTimeOffset System.DateTimeOffset datetimeoffset DateTime2

How to write CV

Read more:  myNoSQL Posted via email from Jasper-net

Plug Hub: The Discrete Powerstrip Organizer

Here's a concept design showcased over at Quirky.com which we think has some commendable ideas for wrangling and organizing power cables that often snake down from our desks. The Plug Hub is an under the desk powerstrip housing which not only conceals most everything away, but also offers three cord anchors to wrap around excess cabling. Read more: Unplggd.com Posted via email from

Italian Scientists Claim To Have Discovered Nickel-Hydrogen Cold Fusion, Create Copper As Byproduct

According to PhysOrg.com, two Italian scientists from the University of Bologna have taken on one of physics' historically most discredited concepts, cold fusion, and have actually succeeded in creating a sustainable reaction. Aside from the major implications of the energy market should this be validated and recreated (an issue that buried the original Cold Fusion discovery by Stanley Pons and

Abusing HTTP Status Codes to Expose Private Information

When you visit my website, I can automatically and silently determine if you're logged into Facebook, Twitter, GMail and Digg. There are almost certainly thousands of other sites with this issue too, but I picked a few vulnerable well known ones to get your attention. You may not care that I can tell you're logged into GMail, but would you care if I could tell you're logged into one or more porn

100 P2P Users Upload 75% of Content

Researchers say that about 100 people (called pirates in the article) are responsible for 75 percent of all downloading on BitTorrent (and the same group does 66 percent of all uploading), and says that the way to shut down the p2p network is simply to disincentive that relatively small number of people. The other large group identified in the study were people (such as from copyright enforcement

Firefox Home Dash experiment offers a radical new UI for your Mozilla browser

It's a little hard to describe what Firefox Home Dash is -- beyond the basics, anyway. It's an experimental add-on born from Mozilla's Prospector project which replaces (or removes) nearly all of the Firefox UI. You're left with a title bar, scrollbar, the big orange button, and not much else. The goal is to get the browser out of the way and just give you the Web. Hover over the Firefox logo in

How to Quickly Add Multiple IP Addresses to Windows Servers

If you have ever added multiple IP addresses to a single Windows server, going through the graphical interface is an incredible pain as each IP must be added manually, each in a new dialog box. Here’s a simple solution. Needless to say, this can be incredibly monotonous and time consuming if you are adding more than a few IP addresses. Thankfully, there is a much easier way which allows you to

Desktop notifications for emails and chat messages

Many of us are guilty of constantly switching back to Gmail to check for new messages. And if you’re like me, you’ve probably missed an important chat message because you weren’t looking at your Gmail window when it came in. If you use Google Chrome, these days can be over since we just launched HTML5 desktop notifications which display pop-ups whenever a chat message or new email arrives. To

Google Begins Soft Censorship Of Arbitrary Piracy-Related Queries

The efforts of media companies to quash online piracy are a bit like someone trying to put out a forest fire with a wet noodle. The latest pathetic flail comes in the form of coercing Google into censoring its results for some search terms. A number of words will no longer be autocompleted or trigger an instant search, among them the interesting and perfectly legal “bittorrent.” It’s a new high

20 cool free downloadable PSD files

If you’re looking to renew your stock of PSD templates, take a good look at the following list of free PSD files.   Read more: Design Daily Posted via email from Jasper-net

'Inheriting' from an Internal WinForms Designer

IntroductionA designer is often the best choice to extend the behavior of an associated component in design mode. While there exist other means like TypeDescriptionProvider, ITypeDescriptorFilterService or overriding the Component.Site property; a designer remains the easiest and most concise way. As most components rely on the public framework ComponentDesigner or ControlDesigner, using a

PE .NET Simple Assemblage Protection

For VS2003, 2005, 2008, 2010 and framework 1.0/1, 2, 3, 3.5, 4 Language: VB, C#, Visual F# ,  & C++ /CLR ONLY/Features include: [*] - Total irreversible obfuscation [old] [*] - code protection /through code primitive concealment method`s body/ [*] - method body decomposition (™) [*] - Control flow obfuscation /Easy/[*] - support dll[*] - Native Image Generator with code cleaner in primary

Microsoft Books Online for SQL Server Code-Named "Denali" CTP1

Microsoft SQL Server Code-Named “Denali” CTP1 is the next release of Microsoft SQL Server. Books Online is the primary documentation for SQL Server.Read more: MS Download Posted via email from Jasper-net

Help wanted: Google hiring in 2011

2010 was a huge year for Google. Many of our big bets—on mobile, display advertising, the cloud and more—really started to pay off. Amazingly, Android now runs on over 100 devices with more than 300,000 activations each day. Chrome has at least 120 million active users and it’s growing quickly. Last year more than 1 million businesses switched to Google Apps and embraced its 100% web approach.

How to make ViewState secure in ASP.NET ?

The ASP.NET ViewState is a client side state management.  ViewState is stored in hidden field with ID named __VIEWSTATE. Typically, stored ViewState information  looks as below: Now let us look at the value. It looks likes an encrypted string. This is nothing but Base64 Encoded string and it is not an encrypted string.  So it can be easily decoded.The main reasons for making it Base64 encoding

How to make all non-virtual members virtual

Using a simple find & replace with a regex in VS2010: Read more: Clarius consulting Posted via email from Jasper-net

GENDARME ♥ CECIL/LIGHT

It's been a while since I published some benchmark numbers on Gendarme. Now with 2.10 there was a huge change by using the shiny new Cecil (aka cecil/light) library from the ever amazing JB Evain. So clearly a revision was in order... Here's a table with some common Mono applications I frequently use:Read more: Poupou's Corner of the Web Posted via email from Jasper-net

XAP File Optimization Techniques for 2011

So you've created something cool in Silverlight but your XAP file is bigger than you would've hoped. What can you do about it?Well there are tips to be found on the internet. Some say that recompressing the XAP file with something like WinRAR on its "best" compression setting will help. But that was in the Visual Studio 2008 / Silverlight 2 days. Now if you're building a Silverlight 4 app in

WCF Binary XML and dictionaries

One of the encodings which come with WCF (since its first version, in .NET Framework 3.0) is a fast and lightweight encoding for XML documents. The WCF Binary XML format (“officially” called .NET Binary Format: XML Data Structure – http://msdn.microsoft.com/en-us/library/cc219210(v=PROT.10).aspx). It is essentially a new way of representing XML, without using the “normal” angle-bracket notation (

TPL (Task Parallel Library) Dataflow CTP Released

TPL Dataflow Community Technology PreviewThis is a Community Technology Preview (CTP) of a new .NET library for building asynchronous and parallel applications. This library, referred to as TPL Dataflow, is available for .NET 4 in the form of the System.Threading.Tasks.Dataflow.dll. Introduction to TPL DataflowTPL Dataflow (TDF) is a new .NET library for building concurrent applications. It

Migrate SVN To TFS 2010

For all the SVN users that likes to migrate to TFS 2010 with all the history of SVN here is the right tool for you:http://svn2tfs.codeplex.com/This tool will help to Migrates a SubVersion 6.x (SVN) repository to Team Foundation Server (TFS) 2010 replaying every action occurred in SubVersion. Read more: Eran Ruso Posted via email from Jasper-net

Protecting Your Information On the Go

OverviewBrochure with guidance on protecting private information on mobile phones and devices, public computers, and public Wi-Fi.Read more: MS Download Posted via email from Jasper-net

Curious about IObservable? Here’s a quick example to get you started!

Have you heard about IObservable/IObserver support in Microsoft StreamInsight 1.1? Then you probably want to try it out. If this is your first incursion into the IObservable/IObserver pattern, this blog post is for you! StreamInsight 1.1 introduced the ability to use IEnumerable and IObservable objects as event sources and sinks. The IEnumerable case is pretty straightforward, since many data

How debuggers work: Part 1 – Basics

This is the first part in a series of articles on how debuggers work. I’m still not sure how many articles the series will contain and what topics it will cover, but I’m going to start with the basics. In this partI’m going to present the main building block of a debugger’s implementation on Linux – the ptrace system call. All the code in this article is developed on a 32-bit Ubuntu machine. Note

Rabu, 26 Januari 2011

Future Photography Contained in a Really Small Lens

The Funamizu is back with another concept. Inspired by the WVIL concept camera shown at this year’s CES, Mac Funamizu envisaged a similar device in a slimmer package. The idea revolves around a lens system that is totally self contained with everything needed to take SLR quality photos. It wirelessly transmits the images to a hub device – in this case, a transparent screen. Designer: Mac Funamizu

Qwiki C++

Invent Your Own Computer Games with Python

Chapter HTML Related ContentChapter 1 - Installing PythonChapter 2 - The Interactive ShellChapter 3 - StringsChapter 4 - Guess the NumberChapter 5 - JokesChapter 6 - Dragon Realm Chapter 7 - Using the Debugger (new!)Chapter 8 - Flow ChartsChapter 9 - HangmanChapter 10 - Tic Tac ToeChapter 11 - BagelsChapter 12 - Cartesian CoordinatesChapter 13 - SonarChapter 14 - Caesar Cipher Chapter 15 -

Top 6 List of Programming Top 10 Lists

Dare Obasanjo: Top 10 Signs Your Software Project is DoomedTrying to do too much in the first version.Taking a major dependency on unproven technology.Competing with an existing internal project that is either a cash cow or has powerful backers. The team is understaffed."Complex problems require complex solutions".Schedule ChickenScope CreepSecond System SyndromeNo Entrance Strategy.Tackling a

Learn Python in 10 minutes

Preliminary fluffSo, you want to learn the Python programming language but can’t find a concise and yet full-featured tutorial. This tutorial will attempt to teach you Python in 10 minutes. It’s probably not so much a tutorial as it is a cross between a tutorial and a cheatsheet, so it will just show you some basic concepts to start you off. Obviously, if you want to really learn a language you

How Duff’s Device Works

I like C, but I have to admit that, sometimes, “The Old Man of Programming” can be a bit of a killjoy. This is one of the most exciting eras in computer history, but lately, C’s acting like he doesn’t even want to have a good time. While the cool kids like Ruby and Haskell are living it up, C’s over in the corner obsessing over bits and bytes and memory alignment and pointers and the stack and

Fedora Infrastructure Compromised

The infrastructure of the Fedora Project was compromised over the weekend and an account belonging to a Fedora contributor was taken over by an attacker. However, Fedora officials said they don't believe that the attacker was able to push any changes to the Fedora package system or make any actual changes to the infrastructure. The attack appears to have targeted one specific user account, which

Git tooling for .NET developers

I’m not getting into holy wars, and I’m not trying to convince anyone that Git is better than any other VCS. Instead I’ll walk you through the tooling I use to interact with Git on Windows, with Visual Studio. Git ExtensionsFirst thing you should be getting is Git Extensions. With that, similar to TortoiseX family of tools you get nice context menu that gives you access to most common operations

Bootstrapping The .NET Framework Without An MSI Installer

I recently needed to test the idea of whether or not I could bootstrap .NET v4.0 onto a WinXP machine, from a USB thumb drive, without an application installer for the target app. The goal was to insert a thumb drive, run the app directly from the root of the thumb drive and have .NET 4 installed onto the system if it wasn't already there, prior to the application starting up. The High Level

Preventing Open Redirection Attacks in ASP.NET MVC

SummaryASP.NET MVC 3 includes a new change in the the Account Controller to prevent open redirection attacks. After explaining how open redirection attacks work, I'll This tutorial explains how you can prevent open redirection attacks in your ASP.NET MVC applications. This tutorial discusses the changes that have been made in the AccountController in ASP.NET MVC 3 and demonstrates how you can

15 Fresh Free PSD Website Layout 2011

1) Sleek: Web Layout Tutorial With PSD FileThis Photoshop Action will show you how to create a professional web layout in seconds. Free PSD included! Only tested in PS CS4, but should work with 6)  How to create an elegant wordpress PSD themeIn this tutorial i will show you how to create an elegant WordPress PSD theme. You can use this web template also for consulting agency templates, services

Napkin PC

  It is the time of CES and the media is currently filled with a lot of very interesting products - but here is one that you will not see (unfortunately).It's a PC the size of a napkin. The best part is that it is based on passive screen technology (epaper), which means that it only needs power when you change it. The result is that whatever you draw on it will stay on the screen forever (or

List of How to Windows 7

This  section contains the best hacks, tips and tricks for your Windows 7 operating system. All the information available here has been divided to different categories to let you identify what are you looking for in a very easy and intuitive way. As you see, majority of the articles shown below have been laid down as How to Windows 7 tutorials which clearly explain to you  the  step-by-step

Router password

Welcome to the internets most comprehensive Default router password database 2010. This is the internets most complete default router password database available. Simply select the Router Make from the dropdown list and click the Find Password button. This database is constantly updated with passwords from visitors like you!! If you know a password that's not listed here, please use the form to

Top 10 Free Ways To Discover New Music Online

Bored with your music and want to discover some new bands or singers? There are two main ways you can do that online. You can use services which create music maps, allowing you to explore artists similar in genre to the artists you already listen to. Or you can use music blogs and websites that showcase independent or up-and-coming artists, whether the music is being reviewed, or posted by the

How to Write an Operating System

OverviewThis semester SigOPS will hold a series of meetings discussing how to build an operating system from scratch. We provide the structure for developing your Very Own OS, you write the code. It's that simple! The PlanWhat follows is an outline of the next eight or so SigOPS meetings this semester. We'll be posting all the critical information on these here web pages, so if you miss one (or

10 (More) Hacking and Security Software Tools for Linux

I noticed that our list of hacking and security software tools for Linux was not enough so I figured out that I should add some more. But before anything else, thank you to those who commented the last time and shared their favorite hacking programs. --I've included some of those that you've mentioned on this new list for others to know about. Now without any more delay, here's our latest

4 free open source network management software

A Network Management System (NMS) is a combination of hardware and software used to monitor and administer a network. NMS systems make use of various protocols for the purpose they serve. For example, SNMP protocol allows them to simply gather the information from the various devices down the network hierarchy. NMS software is responsible for identification of the problem, the exact source of the

2 People, 47 PCs, 46 WoW Accounts, No Life

You've surely heard of World of Warcraft players shunning work, family, responsibility, and drinking water for the love of the game, but if you're not up on your "dual-boxing" as I was, keep reading. Dual-boxing is act of controlling two characters in an MMO simultaneously. Of course, there's multi-boxing, when just two won't do. As seen above, a pair of triple-boxers working in tandem can yield

25 BEST SSH COMMANDS / TRICKS

OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure

Dylin Prestly: Microsoft .NET vs Java Trailer - a Tech &Science video

Read more: DailyMotion video Posted via email from Jasper-net

Simple Guide: How To Get Started With jQuery (Part One)

So, you have heard of this wonderful Javascript library named jQuery. What exactly is jQuery?How can it make my life easier as a developer? How do I get started? Well, jQuery makes writing Javascript fun again and really allows you to take advantage of some of the more difficult aspects of Javascript with relative ease. Today, we will have a look at how to get started with jQuery, and writing

A successful Git branching model

In this post I present the development model that I’ve introduced for all of my projects (both at work and private) about a year ago, and which has turned out to be very successful. I’ve been meaning to write about it for a while now, but I’ve never really found the time to do so thoroughly, until now. I won’t talk about any of the projects’ details, merely about the branching strategy and

Stack Exchange

Stack Exchange is a network of free, community-driven Q&A sites. We highlight and aggregate the best recent content from our entire network here. Log in to create tag sets on questions that interest you. Wish we had Q&A on a different topic? Help us create new Q&A sites through the open, democratic process at Area 51. For more information, check out the blog or read more about us.Read more: Stack

Javascript in Ten Minutes

Basic Typesvar intValue = 1;var floatValue = 3.0;var stringValue = "This is a string\n";var sqString = 'This is also a string';Javascript is a dynamically typed language. Variables are declared with the keyword var. Common simple types are supported. Arraysvar emptyList = [];var homogenousList = [1, 2, 3];var heterogenousList = ["one", 2, 3.0];Javascript has built-in collection objects. The Array

.HTACCESS FILE GENERATOR

Almost all options of .htaccess file on one page with check-boxes, text fields and 'Generate htaccess' button on bottom Read more: Htaccess file generator Posted via email from Jasper-net

Hidden Features of C#?

This came to my mind after I learned the following from this question:where T : structWe, C# developers, all know the basics of C#. I mean declarations, conditionals, loops, operators, etc. Some of us even mastered the stuff like Generics, anonymous types, lambdas, LINQ, ... But what are the most hidden features or tricks of C# that even C# fans, addicts, experts barely know ? Here are the

dlvr.it

Deliver Content to the Social Web - Automatically feed your blog to Twitter, Facebook, LinkedIn, Google Buzz and more. Read more: dlvr.it Posted via email from Jasper-net

Why, oh WHY, do those #?@! nutheads use vi?

Yes, even if you can't believe it, there are a lot fans of the 30-years-old vi editor (or its more recent, just-15-years-old, best clone & great improvement, vim).No, they are not dinosaurs who don't want to catch up with the times - the community of vi users just keeps growing: myself, I only got started 2 years ago (after over 10 years of being a professional programmer). Friends of mine are

Ethiopian multiplication

A method of multiplying integers using only addition, doubling, and halving.Method:Take two numbers to be multiplied and write them down at the top of two columns.In the left-hand column repeatedly halve the last number, discarding any remainders, and write the result below the last in the same column, until you write a value of 1. In the right-hand column repeatedly double the last number and

Jython

Jython, lest you do not know of it, is the most compelling weapon the Java platform has for its survival into the 21st century - SeanMcGrathWhy JythonThere are numerous alternative languages implemented for the Java VM. The following features help to separate Jython from the rest: Dynamic compilation to Java bytecodes - leads to highest possible performance without sacrificing

Snyppets - Python snippets

This page contains a bunch of miscellaneous Python code snippets, recipes, mini-guides, links, examples, tutorials and ideas, ranging from very (very) basic things to advanced. I hope they will be usefull to you. All snippets are kept in a single HTML page so that you can easily ❶save it for offline reading (and keep on a USB key) ❷search in it. Note that scripts that do some web-scraping may not

D Programming Language

D is a systems programming language. Its focus is on combining the power and high performance of C and C++ with the programmer productivity of modern languages like Ruby and Python. Special attention is given to the needs of quality assurance, documentation, management, portability and reliability. The D language is statically typed and compiles directly to machine code. It's multiparadigm,

BareMetal OS

The BareMetal OS - For a lean, mean, processing machineBareMetal is a 64-bit OS for x86-64 based computers. The OS is written entirely in Assembly, while applications can be written in Assembly or C/C++. Development of the Operating System is guided by its 3 target segments: High Performance Computing - Act as the base OS for a HPC cluster node. Running advanced computation workloads is ideal for

The Top 8 Killer Alternatives to Google Analytics

Google Analytics is one of the most well known website analytics around, not to mention being one of the best. Although Google Analytics is a fantastic app to tackle your site’s analytics needs, there are actually several other options available that many would argue are better choices. We’ve pulled together eight of the best alternatives to Google Analytics and some information about each; price

SlideRocket

SlideRocket is a presentation web app that really shows what kind of incredibly powerful apps can be developed for the web. In my opinion, even current desktop powerpoint apps fail to offer the capabilities SlideRocket does. It’s even available on mobile devices such as the iPhone and iPad. SlideRocket is free but many of the more powerful features are reserved for the Pro plan, which will be

Selasa, 25 Januari 2011

Crucible - the ultimate code review tool

I wanted to write this post for a few weeks, but was so busy I simply didn't have time.Code reviews - I don't have to tell you how important is this technique in the context of source code quality, adherence to standards, audits, and mentoring less experienced programmers. Code reviews are essential to software project, and I cannot imagine a project without code reviews. In my current project

Gerrit

Web based code review and project management for Git based projects.ObjectiveGerrit is a web based code review system, facilitating online code reviews for projects using the Git version control system. Gerrit makes reviews easier by showing changes in a side-by-side display, and allowing inline comments to be added by any reviewer.Gerrit simplifies Git based project maintainership by permitting

Displaying error messages with Android and MonoDroid

One of the most annoying things when I build a desktop app in .NET is MessageBox.Show() for displaying images or using a alert() in Javascript is that I have to click on the popup dialog to make it go away.  I love the little messages at the bottom of an Android screen that come up, display some text, and then go away.  Its a Toast.  Here's a simple call to make one display. Toast.MakeText(this,

Comprehensive Overview of Top 14 Content Management Systems

These days many websites (in fact, millions) are implemented by the use of popular open source content management systems (CMS). I would say, for everything you would imagine your site doing, there is one or another CMS which can do that. Thus, the reason for choosing a particular one depends on the tasks you want to accomplish. For blogs there is a common sense of using WordPress blog management

The Java Ecosystem [Infographic]

Java is binding IBM and Oracle more closely than ever before and are forming the core for a new Java oligarchy that also includes Red Hat and other providers.Forrester Research issued a report today called "The Future of Java," that includes an infographic that provides context for the Java ecosystem. It shows how a few companies will control Java's direction and by extension, its rate of

Evolution of Automated Testing

In the Agile world, and increasingly, in software development in general, automated testing is a key ingredient in delivering quality software. It's one of the many reasons why Agile has become so successful and is a component to any long-term, sustainable effort. Automated testing blurs the lines between the QA and the Dev. Both parties need to work together to produce a solid piece of software.

Commonly Used Network Monitoring Commands in Linux – Part I

Flexibility and usability of networking commands is one of the major strengths of UNIX like Operating System. Network administrators can quickly identify and fix the problem using these commands very effectively. In this article I mentioned some of the basic commands available in most of the UNIX like operating systems, also I gave small brief about some of the commonly used options for each

Cyber-crime black market undercovered

The first time I performed a somehow deep research on the black market was back in 2007. At that time, most of it was about selling-buying Trojans, infection kits, and of course stolen data, such as bank and credit card details stolen from users around the world. A few years later I thought it was time to find out how this market had evolved, and today we have released a report with all our

OpenCLI

Project DescriptionOpenCLI brings a linux style CLI written in .NET. It acts as a portal from linux style commands, to their commands on the windows system. It is useful to Sysadmins, who wish to deny their uses to the power of Command Prompt, yet want them to be able to user a CLI. Features:- Allow users to shutdown, logoff, and reboot a machine from the CLI- Brings linux style commands to the

New white paper from Microsoft - Upgrade from Visual SourceSafe to Team Foundation Server

Microsoft as released a white paper with a full details of why and how to migrate from VSS to the latest version of Visual Studio Team Foundation Server 2010.Upgrading from Visual SourceSafe to Team Foundation Server (by Brian Harry).  in this article you can find What are the benefits of Team Foundation Server over Visual SourceSafe?  How VSS and Team Foundation Server Usage Compare. (include

Why does the name of my TEMP directory keep changing?

A customer liaison contacted the shell team with the following request:Subject: Support case: 069314718055994On two of my customer's machines, he's finding that if he opens %TEMP% from the Start menu, it opens C:\Users\username\AppData\Local\Temp\1, C:\Users\username\AppData\Local\Temp\2, and so on. Each time the user logs off and back on, the number increments. The number resets after each

Corrupting Databases for Dummies- Hex Editor Edition

This Post Tells You How To Corrupt a SQL Server Database with a Hex Editor in Gruesome DetailAnd that’s all this post tells you. Not how to fix anything, just how to break it. If you aren’t familiar with corruption, corruption is bad. It is no fun at all on any data, or any server, that you care about. Where You (Possibly) Want To Do ThisYou only want to do this on a test database, in a land far

Manual Memory Management in Objective-C

Objective-C on iOS has no garbage collector, so it is up to the programmer to make sure that memory is properly freed once an object is no longer needed. On the other hand, Objective-C on the Mac does have a garbage collector (in Objective C 2.0). This blog post focuses on how to manage memory in the absence of a garbage collector. When managing memory manually, two major issues to watch out for

Microsoft SQL Server Licensing For Dummies..

Microsoft SQL Server Licensing For Dummies..  Don’t let the above title fool you!  Have you been confused on the Microsoft SQL Server Licensing requirements?  Per Processor, Per CAL, Per Core, Per Socket, Per Node – Per haps (space intended :-), we should revisit the issue again, and try to offer some assistance as you go forward in making your purchasing decisions.  While I would like nothing

Using the Dojo Toolkit with Microsoft’s WCF

For .NET developers, the Microsoft Windows Communication Foundation (WCF) is an excellent resource for creating service-based Web applications. Defining web services is relatively easy using WCF; using Visual Studio .NET, you can set up a solution with the interfaces needed for WCF quickly and easily. Actually doing the communication using Ajax, however, requires a client-side component to make

LibreOffice 3.3 Released Today

Only four months after the formation of the Document Foundation by leading members of the OpenOffice.org community, it has launched LibreOffice 3.3, the first stable release of its alternative Open Source personal productivity suite for Windows, Macintosh and Linux. Since the fork was announced at the end of September the number of developers 'hacking' LibreOffice has gone from fewer than twenty

AcetoneISO – Create, Mount, Convert, Encrypt/Decrypt And Burn CD/DVD Images In Ubuntu

AcetoneISO is a freeware for Linux to create, mount, rip, extract, convert, burn, encrypt and decrypt (WinRAR protected) DVD and CD images. It supports MDF, NRG, BIN, NRG and ISO formats. Acetone ISO provides the option to create disk image from both files and folders. Other than being an excellent disk image management tool, it contains unique features which include the option to download

Yet another semicolon rule in SQL Server Denali

I was telling students this week about the story of the semicolon and SQL Server. And, when going over some Denali demos, it came up again.SQL Server does not mandate semicolons as end-of-statement indicators as some databases do (as well as the ANSI standard). You can use a semicolon (or as many semicolons as you like, really) as end-of-statement, but its most often used as a statement separator

Asynchronous Control Updates In C#/.NET/WinForms

Every .NET WinForms project I've written, since .NET 2.0, has included some form of this code:public static class ControlExtensions{  public static void Do(this TControl control, Action action)    where TControl: Control  {    if (control.InvokeRequired)      control.Invoke(action, control);    else      action(control);  }}It's a simple extension method that allows any UI

Prefixing Input Elements Of Partial Views With ASP.NET MVC

Suppose we have the following set of classes in an ASP.NET MVC project:public class NameModel{  [Display(Name = "First name")]  [Required]  public string FirstName { get; set; }  [Display(Name = "Last name")]  [Required]  public string LastName { get; set; }} public class AddressModel{  [Required]  public string Street { get; set; }  [Required]  public int Number { get; set; }  [Display(Name =

Create a Whimsical Animated Silverlight Background

Silverlight Version of the Tutorial I made a new project in Visual Studio.and set up my main page to host a Canvas at 640x480 and set the background to the same gradient used in the Flash example; from a XAML perspective this is;

Real movable magnifying glass - Silverlight 4

I've developed a sample project for an alternative approach to create an image magnifier. My solution implements a real MagnifyEffect which is combined with a dynamic clipping path.Below you can see an example that uses this technique. Read more: SilverLaw Posted via email from Jasper-net

InMaps from LinkedIn helps you to visualize your professional network

It's often hard to visualize the connections between your plethora of contacts, more so when they're scattered across the globe. LinkedIn, the 'professional' network, is no exception; but InMaps from LinkedIn Labs is hoping to change that. By creating a network of interconnecting nodes representing each of your contacts, InMaps help you visualize clusters of your contacts based on how well

Testing Mobile Phones For Controlling Space Missions

Researchers in the UK are sending an Android handset into space in order to test whether mobile phone chipsets are robust enough to be be used as the basis for controlling future space missions — greatly reducing the cost and weight of spacecraft electronics. 'Once in space, the phone will be bombarded by cosmic and solar radiation, and experience temperatures that veer between extreme heat and

How to Be More Productive in Ubuntu Using Keyboard Shortcuts

We’re always looking for new ways to speed up everyday tasks in Ubuntu. We’ll show you some keyboard shortcuts you might not have known about, and show you how to make your own custom shortcuts.Image by Remko van Dokkum. Shortcuts You Should KnowIf you’re still doing these things the long mouse-driven way, stop!Alt + F2: Open a “Run application” windowCtrl + Alt + L: Lock the screenCtrl + Alt + T

Arista Transcoder Is Easiest Way To Convert Media In Ubuntu Linux

Arista Transcoder is a multimedia conversion software for Linux based operating systems. It has an easy to use interface, which makes transcoding functions easier to execute when converting media from multiple devices. The supported devices include,  Android, iPhone, iPod, iPad, Nokia N Series, DVD, gaming consoles, Web, etc. Just select an input, target device and file to save in order to

Kinect Hack Builds 3D Maps of the Real World

Noted Kinect-tinkerer Martin Szarski has used a car, a laptop, an Android smartphone and the aforementioned Xbox 360 peripheral to make a DIY-equivalent of Google Street View. The Kinect's multi-camera layout can be used to capture some fuzzy, but astonishingly effortless 3D maps of real world locations and objects. As we saw in Oliver Kreylos' early hack, you can take the data from Kinect's

Facebook To Make ‘Facebook Credits’ Mandatory For Game Developers (Confirmed)

Facebook is about to ruffle some feathers. We’re hearing from one source that the social network is reaching out to game developers to inform them that it is making its own, official Facebook Credits currency mandatory. Our understanding is that it will be the exclusive currency as well. Update: Facebook has confirmed that it is indeed making Facebook Credits mandatory for Games, with the rule

Yumm Is A Delicious For Your Favorite Recipes On The Web

There are no shortage of recipe search engines around the web, including Epicurious, Yummly, AllRecipes, FoodNetwork, and more. While each of these sites allows you to curate your own recipe box of recipes within the site, it is difficult to aggregate your favorite recipes from different recipe search engines and online publications. Enter Yumm, a social bookmarking service for recipes, allowing

Minimalist Gmail Chrome extension lets you fully customize your inbox

Gmail interface tweaks tend to be all or nothing: you either keep the standard Gmail interface with all its bells, whistles and distractions, or you hide all the links and sidebar doodads at once. The Minimalist Gmail Chrome extension is different: it gives you control over 40+ individual elements of the Gmail interface, from the top bar all the way down to the footer. Minimalist Gmail is

Video Search Engine Qwiki Is Now Available To The Public

TechCrunch Disrupt winner Qwiki launches publicly at 12pm PST today after a week filled with the news, most notably that of an $8 million funding round led by Facebook co-founder Eduardo Saverin and YouTube founder Jawed Karim. Qwiki, for those of you who haven’t been following the hype, basically reads heavily Wikipedia-sourced articles out loud with photo and video accompaniments. Heralding

Google joins the privacy fray, offers up extension that blacklists tracking cookies

Hot on the heels of Mozilla's proposed Do Not Track solution, Google has launched Keep My Opt-Outs, an extension that blocks tracking cookies from targeted advertising providers.The extension, which is simply a free download from the Chrome Web Store, takes an utterly brute-force approach to the problem. It has a blacklist of known targeted advertisers, and it simply blocks any cookies

How To Load Assemblies from Blob Storage

Dependency Injection and IOC are very common patterns in modern applications.Such patterns are based on dynamically loading an assembly on runtime usually form the file system. When running in the cloud instead of using the file system we will use blob storage. In this post I want to show how to load an assembly from blob storage.Let us say we have a calculator (MyCalc) in the assembly "

חברי קהילה–בואו להתנדב ביום הלאומי לאינטרנט בטוח

בדומה לשנה שעברה, גם השנה אנחנו מזמינים את חברי הקהילה להתנדב ולקחת חלק בפעילות ביום הלאומי לאינטרנט בטוח שיתקיים ב8.2.2011מה צריך לעשות?לדבר עם מקום העבודה ולקבוע הדרכה אותה אתם תעבירו ותעסוק בנושא גלישה בטוחה. מה המשאבים שמקבלים ואיך?כל המתנדבים יקבלו בדואר CD עם מצגות בנושא וחולצה של היום הלאומי. אם אתם מעוניינים לקחת חלק בפעילות שלחו מייל ל v-mgonen@microsoft.com בצירוף כתובת למשלוח דואר ושם

Difference between HashMap and HashTable? Can we make hashmap synchronized?

This question oftenly asked in interview to check whether candidate understand correct usage of collection classes and aware of alternative solutions available.1. The HashMap class is roughly equivalent to Hashtable, except that it is unsynchronized and permits nulls. (HashMap allows null values as key and value whereas Hashtable doesn't allow nulls). 2. HashMap does not guarantee that the order

FreeImage 3.15 out today…

FreeImage is an Open Source library project for developers who would like to support popular graphics image formats like PNG, BMP, JPEG, TIFF and others as needed by today's multimedia applications. FreeImage is easy to use, fast, multithreading safe, compatible with all 32-bit/64-bit versions of Windows, and cross-platform (works both with Linux and Mac OS X). Thanks to it's ANSI C interface,

SSL is not about encryption

t’s about assurance. It’s about establishing a degree of trust in a site’s legitimacy that’s sufficient for you to confidently transmit and receive data with the knowledge that it’s reaching its intended destination without being intercepted or manipulated in the process. Last week I wrote a (slightly) tongue-in-cheek post about the Who’s who of bad password practices. I was critical of a number

Integrating HTML into Silverlight Applications

Looking for a way to display HTML content within a Silverlight application? If you haven’t tried doing that before it can be challenging at first until you know a few tricks of the trade.  Being able to display HTML is especially handy when you’re required to display RSS feeds (with embedded HTML), SQL Server Reporting Services reports, PDF files (not actually HTML – but the techniques discussed

Dissection of a Windows Azure SDK 1.3 based ASP.NET Web Role in Full IIS mode & HWC

Let's start from the point that you have an ASP.NET based WebRole as MainWebRole.DLL which you have created using Windows Azure SDK 1.3. The ServiceConfiguration.CSDEF setting can run your webrole in following two modes: 1. Full IIS Mode2. HWC (Hostable Web Core) ModeFull IIS Mode:Let's Start from Full IIS Mode. In this mode you will have your ServiceConfiguration.CSDEF will have a section name <

3 uses of the @ Symbol in c#

1. You can use one of the reserved words of c# with the @ symbolEg :string @int = "senthil kumar";or something like thisstring @class ="MCA";Although you can use this , avoid using one. 2. Before a string specially when using the file paths .You can usestring filepath = @"D:\SENTHIL-DATA\myprofile.txt";instead ofstring filepath = "D:\\SENTHIL-DATA\\myprofile.txt"; 3. For a Multi lined textstring

Senin, 24 Januari 2011

Introducing the SELinux Sandbox

The other day some of my colleagues and I were discussing a recent request for the Linux Kernel to add "security sandbox" functionality.  We talked about how we could do this with SELinux.  The discussions brought up an old Bug report of my about writing policy for the "little things".  SELinux does a great job of confining System Services, but what about applications executed by users.  The bug

An App That Makes Android Smarter Than Ever

Google's Android operating system may not be as pretty or easy to use as Apple's iOS -- but it is more powerful and customizable. Case in point: the Tasker Android app, which makes your Android phone automatically perform certain tasks based on its environment, its location, even its rotation. Imagine turning off your ringer by just setting your phone on the table face down, automatically texting

Access Any Website Or Forum Without Registering

Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it. Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to

The Linux Alternative Project

Welcome to the Linux Alternative Project(formerly the Linux Equivalent Project). My goal is to provide an informational website available to all linux users. The website is currently in beta form and I will periodically update the database with Windows software and the Linux equivalents and alternatives. Windows Software Linux Equivalent/Alternative 3D Home Architect Sweet Home 3D ( http

Smart Fridge Is Your New Recipe Card

   The Smart Fridge here is for those who have shunted cooking to a hobby and rely more on designer microwave meals. The idea is to give you a fridge that is intelligent enough to come up with a healthy recipe, depending on what you stock in it. Not only that, it guides you with vocal instructions, spoon by spoon, till you dish out the perfect-wholesome meal. A touch interface door glams up the

Award-winning concept phone can turn into a tablet or game display

The Line Phone is a concept phone that hails from China and won the gold award at the 2010 Furong Cup "Digital Product and Service Design Competition." Well, it deserved to win the gold. The phone is so adaptive, we're still stoked after watching this video three times. The iPhone has done wonders in transforming our idea of what a phone should comprise of — it should be a good camera, video

Loquacious Configuration in NHibernate 3

One of the new features in NHibernate 3 is the addition of a fluent API for configuring NHibernate through code. Fluent NHibernate has provided a fluent configuration API for awhile, but now we have an option built into NHibernate itself. (Personally I prefer the new Loquacious API to Fluent NHibernate’s configuration API as I find Loquacious more discoverable. Given that Fluent NHibernate is

Awesome Android concept phone with three displays [video]

There are many interesting concept phones and other devices that never see the light of day, because of lack of funding, or because the design was ahead of current technology, and so forth. But we must dare to dream, right? A designer named Kristian Ulrich Larsen has created an intriguing concept he calls the Flip Phone. It’s an idea for a handset powered by vanilla Android that features three

35 Awesome Typographic Portraits

   Read more: Design Mag Posted via email from Jasper-net

Adult Principles, from JPBarlow

A few days ago, John Perry Barlow twetted a series of Adult Principles, and I enjoyed reading them. When he was asked where they came from, he said:They're from a list I assembled for myself on the eve of my 30th birthday. Many years ago. This is the collected set from his twitter feed:Adult Principle #1: Be patient. No matter what.Adult Principle #2: Don’t badmouth: Assign responsibility, not

New Mega-Leak Reveals Middle East Peace Process

There's been yet another mega-leak, this time of 1,600 papers describing the Israeli/Palestinian peace process negotiations. It's independent of Wikileaks and came to light via al-Jazeera, showing perhaps that the mega-leak meme is here to stay whatever happens to Assange. The papers show a weak Palestinian side offering ever greater concessions to Israel, which flatly rejected this as being

Everything you need to know about Locales

IntroductionA long time ago when I was a senior developer in the Windows group at Microsoft, I was sent to the Far East to help get the F.E. version of Windows 3.1 shipped. That was my introduction to localizing software – basically being pushed in to the deep end of the pool and told to learn how to swim. This is where I learned that localization is a lot more than translation. Note: One

WCF: Streaming Large Data Files

WCF can be used to transfer image files, .pdf files or other large documents.  The most common way to do this is to use streaming. Normally WCF processes messages in buffered mode.  This means incoming messages are not processed until the entire message has been received and buffered in memory.  Likewise, outgoing messages are not sent until the entire message has been buffered in memory.  

NuGet Support in SharpDevelop

SharpDevelop 4.1 now includes support for NuGet. You can now add references to NuGet packages to your projects from SharpDevelop. Please be aware that SharpDevelop 4.1 and the NuGet support is still being developed so what is being shown here is a sneak preview. Adding NuGet PackagesTo add a NuGet package reference select your project in the Projects window, right click and select Add Package

Start with Objective-C on Windows

This tutorial is about installing Objective-C and writing a simple Hello World application on a Windows based machine. I’ve tested the following procedure on a Windows 7 machine.Prerequisites:- Unix like shell (a text based environment like a super Command Prompt ); - Objective-C compiler;- “Real” text editor (God forbid to use Word, WordPad or Notepad).For the first two points we will install

Comparison of SQL Server Compact 4 and SQL Server Express 2008 R2

Now that SQL Server Compact 4 has been released, some developers are curious about the differences between SQL Server Compact 4.0 and SQL Server Express 2008 R2. I have updated the comparison table from the excellent discussion of the differences between Compact 3.5 and Express 2005 here to reflect the changes in the newer versions of each product. FeatureSQL Server Compact 4.0SQL Server 

3-min. Quickie: Compiling C++ Projects using only the Windows SDK and the Command Prompt

I have received a couple questions about "How do you build C++ projects in Windows without installing Visual Studio?".  This video demonstrates the process but to explain it in a couple short steps: Download and Install the Windows SDK*Open the Windows SDK command prompt**Browse to your project folderrun "vcupgrade .vcproj"run "msbuild .vcxproj *Make sure that you check

День первый. Продвинутый MessageBox: MessageBoxEx

ВступлениеВ Silverlight-проектах существует класс MessageBox для вывода системных сообщений. Его возможности существенно ограничены. А в XNA Framework есть похожий класс BeginShowMessageBox, обладающий гораздо большей функциональности. Попробуем взять класс из XNA Framework и внедрить его в свой Silverlight-проект. Стандартный MessageBoxДля начала посмотрим, как работает стандартный MessageBox и

Visualising Garbage Collection in the JVM

Recently, I have been working with a number of customers on JVM tuning exercises.  It seems that there is not widespread knowledge amongst developers and administrators about how garbage collection works, and how the JVM uses memory.  So, I decided to write a very basic introduction and an example that will let you see it happening in real time!  This post does not try to cover everything about

What are TCHAR, WCHAR, LPSTR, LPWSTR, LPCTSTR etc?

Many C++ Windows programmers get confused over what bizarre identifiers like TCHAR, LPCTSTR are. Here, in brief, I would try to clear out the fog.In general, a character can be 1 byte or 2 bytes. Lets say 1-byte character is ANSI, using which English characters are represented. And lets say 2-byte character is Unicode, which can represent ALL languages in the world. VC++ support char and wchar_t

Getting ready for Microsoft Silverlight Exam 70-506 (Part 2)

In the first part of this article series, we focused on learning the skills required for the layout-related questions and topics in the Silverlight exam (70-506). We looked at the layout containers (such as the Grid and the ScrollViewer), the basic controls (such as the TextBlock, CheckBox and the Button), how to create user controls, the navigation framework, displaying collections in controls

Minggu, 23 Januari 2011

The 50 Best Ways to Disable Built-in Windows Features You Don’t Want

Over the years, we’ve written about loads of ways to disable features, tweak things that don’t work the way you want, and remove other things entirely. Here’s the list of the 50 best ways to do just that. Disable Context Menu ItemsHow to Disable Caps Lock Key in Windows 7 or VistaDisabling Irritating Dialogs and PopupsDisabling Icons You Might Not WantDisabling Windows Aero and SuchRead more:

פילוח משתמשים בפייסבוק – המדריך הסודי

מדד TIM האחרון מדווח שפייסבוק מבסס עצמו כאתר הנצפה ביותר בישראל אחרי גוגל. זו לא הפתעה, נראה שיותר ויותר אנשים (ישראלים ובכלל) מגלים את הרשתות החברתיות כשבראשן, כמובן, פייסבוק. אתם בוודאי שואלים את עצמכם "מתי זה יגמר?", אתם בוודאי מעוניינים להפנות את השאלה הזו לגורם מוסמך, אמין ומקצועי. בקיצור – לא אליי. אבל בכל זאת, הרשו לי לענות לכם: אני לא יודע. אני מקווה שבאיזה שהוא שלב אנשים יתחילו קצת להרגע

Soundminder Android Trojan Hears Credit Cards

A team of security researchers has created a proof-of-concept Trojan for Android handsets that is capable of listening out for credit card numbers — typed or spoken — and relaying them back to the application's creator. Once installed, Soundminder sits in the background and waits for a call to be placed — hence the access to the 'Phone calls' category. When triggered by a call, the application

Fake GSM Base Station Trick Targets IPhones

While his Black Hat DC Conference demonstration was not flawless, a University of Luxembourg student on Wednesday did show that it's possible to trick iPhone users into joining a fake GSM network. Ralf-Philipp Weinmann showed how to cobble together a laptop using open-source software OpenBTS and other low-cost gear to create a fake GSM transmitter base station to locate iPhones in order to send

YC-Funded AppHarbor: A Heroku For .NET, Or “Azure Done Right”

You may be noticing a trend: there are a lot of startups looking to mimic the easy-to-use development platform that made Heroku a hit with Ruby developers and offer a similar solution for use with other languages. In the last few weeks alone we’ve written about PHP Fog (which, as you’d guess, focuses on PHP) and dotCloud (which aims to support a variety of languages). And today we’ve got one more

Is This Google’s Groupon Clone? Well The Logo Fits. [Update: Confirmed]

A report on Mashable shows that Google will be imminently launching a Groupon clone, called Google Offers. By the look of the documents they have received from a source this product seems like it would be your run of the mill Groupon clone, “A Google Offer is a daily deal that enables subscribers to pre-purchase products and services at an attractive discount.” Ha. Sean McCann adds another piece

Google adds 35 more Web fonts to Blogger

Web fonts have been available to Blogger users since late last year, when Google introduced 32 ready-to-use typefaces to spice up your blog's design. Now, Google has more than doubled that number -- bringing the total to a whopping 77 fonts, all of which render nicely in just about any Web browser. No, they don't work in IE6. Read more: DownloadSquad Posted via email from Jasper-net

XSS Rays

XSS is a security tool to help pen test large web sites. It's core features include a XSS scanner, XSS Reverser and object inspection. Need to know how a certain page filters output? Don't have the source? No problem. XSS Rays will blackbox reverse a XSS filter without needing the source code. You can also extract/view and edit forms non-destructively that normally can't be edited. For example if

Compromised Government and Military Sites For Sale

Imperva blogged today about the sale of compromised .gov, .mil, and .edu sites, illustrating that cyber-criminals are getting bolder. Krebs on Security has an unredacted view of the site list. Perhaps the biggest threat is yet to come; if an industrious criminal can break into top government and military sites, so too can government-backed teams, proving that GhostNet and Stuxnet are just the

Hackers disguise phone as keyboard, use it to attack PCs via USB

We've seen hackers use keyboards to deliver malicious code to computers, and we've seen smartphones used as remote controls for cars and TV -- but we've never seen a smartphone disguised as a keyboard used to control a computer, until now. A couple folks at this year's Black Hat DC conference have devised a clever bit of code that allows a rooted smartphone -- connected to a PC through USB -- to

Duke Nukem Forever Release Date Announced

Hot on the heels of news that Duke Nukem Forever will be released on May 3 in North America--May 6 worldwide--developer Gearbox has released the long-awaited 'first' trailer for the near-mythical macho shooter Read more: GameGuruRead more: Amazon Posted via email from Jasper-net

Unity3D для начинающих — Туториал 1

ПредисловиеХабралюди проявили некоторый интерес к Unity, поэтому открываю этим постом цикл туториалов, освещающих основные моменты работы с объектом (цикл неопределённой пока длительности — если кому окажется полезным продолжу). Сразу говорю — чтобы снизить порог вхождения, рассказывать буду с рассчетом на людей, которые в жизни никогда ничем подобным не занимались. Так как самым простым в

Unity — бесплатный кроссплатформенный 3D движок (и браузерный тоже)

Преамбула Итак, сегодня я хотел бы рассказать вам о Unity (тем, кто ещё не знаком с ним, по крайней мере). Безусловно, на Хабре есть люди, которые знают, что это такое, но поиск выдаёт катастрофически малое количество топиков с упоминанием сабжа — два из них просто сообщают о новых версиях, один кратко презентует и ещё один посвящен всё-таки его использованию. «Непростительно, надо это исправить!

Get IIS bindings at runtime without being an Administrator

Today there was a question in StackOverflow asking whether it was possible to read the IIS binding information such as Port and Protocols from the ASP.NET application itself to try to handle redirects from HTTP to HTTPS in a way that was reliable without worrying about using different ports than 80/443. Turns out this is possible in the context of the IIS worker process by using

Does your Silverlight application really have to end in .XAP?

IntroductionWe have heard it in books by speakers and even Microsoft. "When hosting a Silverlight application, make sure your file ends in .XAP". But does it really have to end in .XAP?   The Answer The answer is surprisingly no. It is time to end the myth that when hosting a Silverlight application, it has to end in .XAP. Let’s look at a sample Silverlight project first.File-> New Project When

An oldie but a goodie, 101 LINQ Samples (C# and VB)

These sites have been around for a few years, but that doesn’t make them any less cool (nor any less useful… In browsing the samples I just saw a couple I had to learn the hard way… sigh… ;)Read more: Greg's Cool [Insert Clever Name] of the Day Read more: 101 LINQ Samples Posted via email from Jasper-net

Internals of loops (While, For and ForEach)

The InternalsBefore going further with the internals of loop let me clear out one fact which you always remember. Goto is a construct(keyword) in C# that allows you to unconditionally transfer the control from one place to another. The IL equivalent for goto statement is br.s which takes just an instruction line number to transfer the control to a place. Another small instruction brtrue.s which

Debugging, Tracing and Instrumentation in .NET and ASP.NET

ContentsSo, what’s the agenda?What is Instrumentation?What is debugging and tracing?How can we implement debugging and tracing in ASP.NET ? How do we view the results of debug and trace?So can we see a quick sample of how tracing information can be viewed?What if we want to enable tracing in all pages?Is it possible to do silent tracing, rather than displaying on the browser? How do I persist the

10 Tips for Optimizing Your Website’s Speed

Web page speed and performance is very important to the user experience. If your site is too slow, you’ll not only be losing visitors, but also potential customers. Search engines like Google factor a website’s speed into account in search rankings, so when optimizing your site’s speed, you should take everything into consideration. Every millisecond counts. Here are just a few basic and general

The future of SilverSprite, does it have one?

If you’re reading this blog you’ve probably heard of SilverSprite, a set of open source class libraries that enable you to port your XNA 2D games to Silverlight. It provides APIs that mimic the XNA APIs and hides the major differences in the two platforms away from the developer. A few months ago, real life intervened and I was forced to discontinue actively working on the project. I’ve made it

Commonly Used System Monitoring Commands in Linux

Unlike other operating systems Linux is bundled with lot of System monitoring tools, by default which helps us to know the live status of the resources available in the Linux servers. This article briefly explains commonly used system monitoring tools available in most of the Linux flavors. System monitoring tools help us to find bottlenecks in system resources like Hard Disk, Memory, network and

Microsoft JDBC Driver 4.0 for SQL Server CTP

Download the Microsoft JDBC Driver 4.0 for SQL Server CTP, a Type 4 JDBC driver that provides database connectivity through the standard JDBC application program interfaces (APIs) available in Java Platform, Enterprise Edition 5 and above. Read more: MS Download Posted via email from Jasper-net

SQL SERVER- Differences Between Left Join and Left Outer Join

There are a few questions that I had decided not to discuss on this blog because I think they are very simple and many of us know it. Many times, I even receive not-so positive notes from several readers when I am writing something simple. However, assuming that we know all and beginners should know everything is not the right attitude. Since day 1, I have been keeping a small journal regarding

Blend, Visual Studio and compile in x86

I have a WPF project where I need to compile in x86 because it uses the Gecko Browser that works only in x86 mode, and this causes an annoying problem with Blend. I usually keep VS and Blend togheter, in VS I change ViewModels and do everything not related to the UI, when I need to change the UI I simply switch to blend. The problem is, Blend looks only in the binDebug folder, so when I add a

rdp2tcp

Descriptionrdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports forwarding over an already established rdesktop session. Available features:tcp port forwardingreverse tcp port forwardingprocess stdin/out forwardingSOCKS5 minimal supportThe code is splitted into 2 parts:the client running on the rdesktop client

Open source is not just for Linux: 14 apps that are great for Windows users

Recently I had a client that had a need that simply couldn’t be fulfilled with proprietary software. Well, that’s not exactly true. There were plenty of proprietary titles that could do what she needed done, but none that were at her budget. So I did what any advocate of open source software would do - I introduced her to the world of FOSS. She was amazed that so much software existed that was

Porting CSLA 4 to MonoDroid

I’ve started the process of porting CSLA .NET version 4.1 to MonoDroid. I expected this to be relatively easy because I’ve already got a version of CSLA 4 running on WP7, and from everything I know about MonoDroid it should be pretty comparable (excluding anything to do with XAML and UI concepts of course). After a couple hours of trying to get the Android emulator to run on my machine, I

Notepad++ with the C# compiler - you can do it

If you ever decided to to work a bit outside of Visual Studio and configure a plain text editor to work with the C# compiler, you most likely know that it's not so straightforward as it might seem. At first, I thought that it would be a relatively easy task to add a specific compiler reference to Notepad++, but it needed some additionalwork, as Notepad++ has no specific wizard or dialog to

OpenSSH Tips and Tricks: Beyond Secure Shell

OpenSSH is one of the most vital tools on any Linux system, at least if you ever need to connect to another Linux system. But OpenSSH is capable of doing much more than just providing a secure shell into another system. Most Linux users already know the bare basics of using OpenSSH. You use ssh to get a secure shell into a remote system, sftp for Secure FTP, and scp for copying files. All well

NoSQL

Comprehensive list of tutorials, links, articles about NoSQLJAN 2011"NoSQL at Twitter", Ryan Kind (seen by MyNoSQL) »"NoSQL in the Sauna", by Prospectus IT Recrutement, » "NoSQL Tapes" by Tim Anglade, » James Hamilton on "Google Megastore" paper. "The Engine behind GAE", »Oct & Nov & Dec 2010"Cassandra vs MongoDB vs CouchDB vs Redis vs Riak vs HBase comparison", Kristof Kovacs, » "BI at large

How do emulators work and how are they written?

Answer:Emulation is a multi-faceted area. Here are the basic ideas and functional components. I'm going to break it into pieces and then fill in the details via edits. Many of the things I'm going to describe will require knowledge of the inner workings of processors -- assembly knowledge is necessary. If I'm a bit too vague on certain things, please ask questions so I can continue to improve

SPDY: An experimental protocol for a faster web

Executive summaryAs part of the "Let's make the web faster" initiative, we are experimenting with alternative protocols to help reduce the latency of web pages. One of these experiments is SPDY (pronounced "SPeeDY"), an application-layer protocol for transporting content over the web, designed specifically for minimal latency.  In addition to a specification of the protocol, we have developed a

SPDY - 90% of all Gmail Traffic via Chrome/HTTPS

Anyone watching the SPDY-DEV group will have heard something pretty amazing today. SPDY is a proposed alternative to HTTP from Google. It was launched in November 2009 and has been chugging along making progress ever since, but frankly without much further buzz. Today, Google admitted on the mailing list that 90% of all Gmail and other Google services go via SPDYRead more: Web Builder Zone

How to turn off the exception handler that COM "helpfully" wraps around your server

Historically, COM placed a giant try/except around your server's methods. If your server encountered what would normally be an unhandled exception, the giant try/except would catch it and turn it into the error RPC_E_SERVERFAULT. It then marked the exception as handled, so that the server remained running, thereby "improving robustness by keeping the server running even when it encountered a

Video Tutorial: Android Application Development - The Android UI

Class 1, Part 4. This video comes from Marakana's 5-Day Android Bootcamp Training Course that Marko Gargenta taught in San Jose, CA earlier this year.  In this 2-hour tutorial Marko will build an Android app from scratch in-order to illustrate some of the key concepts for Android UI development.  By the end of this tutorial you should have a solid foundation for beginning to work with the Android

Using MFTrace to Trace Your Own Code

Now that you know how to trace Media Foundation and analyze those traces to figure out what Media Foundation is doing, the next step is to figure out what your own code is doing. That means adding traces for MFTrace to your code. The simplest way to add traces is to use the OutputDebugString function. OutputDebugString takes a single string as input:void WINAPI OutputDebugString(  __in_opt  

Sabtu, 22 Januari 2011

Open Source

We have created a Social Networking website for Open Source Professionals, Users, and Believers. The site has the features of Forum, Blog, Videos, Photos and many more. This is a platform where you can interact with thousands of Open Source Believers using Forum, Blog. You can get the Latest News of Open Source. You can start your own groups, participate in the existing groups by joining them and

Kamis, 20 Januari 2011

Python beginner's mistakes

Every Python programmer had to learn the language at one time, and started out as a beginner. Beginners make mistakes. This article highlights a few common mistakes, including some I made myself.Beginner's mistakes are not Python's fault, nor the beginner's. They're merely a result of misunderstanding the language. However, there is a difference between misunderstanding (often subtle) language

Thinking in C++ 2nd Edition by Bruce Eckel

Comments from readersBack to Contents I'd like to congratulate you on your great book "Thinking in C++" 2/e. I first saw it at my campus library and loaned it thinking it was just another C++ book, what a big mistake, it is a great book. When the loan period was over I got the electronic version from your site and finnally after completly zapping through it, I decided to order it and today I

Optimizing C and C++ Code

Embedded software often runs on processors with limited computation power, thus optimizing the code becomes a necessity. In this article we will explore the following optimization techniques for C and C++ code developed for Real-time and Embedded Systems. Adjust structure sizes to power of twoPlace case labels in narrow rangePlace frequent case labels firstBreak big switch statements into nested

The Top 10 Ways to get screwed by the "C" programming language

To get on this list, a bug has to be able to cause at least half a day of futile head scratching, and has to be aggravated by the poor design of the "C" language.  In the interests of equal time, and to see how the world has progressed in the 20-odd years since "C" escaped from its spawning ground, see my Top 10 Ways to be Screwed by the Java programming language, and for more general ways to

Programmer’s Notepad

Programmer’s Notepad 2.2 Released I’m happy to announce Programmer’s Notepad 2.2, a new stable release!Headline Changes in 2.2:There have been too many improvements since 2.0.10 to recount them all here, but these are the headline changes in 2.2 over 2.0.10: Complete Unicode conversion, files, searching, projects, UI, clips…Complete redesign of text clips, with editing built in to new UI view and

Game Programming Wiki

Welcome to The Game Programming Wiki! Here you will find game programming tutorials and source code for a variety of languages and platforms. Also, because this is a wiki, you are encouraged to contribute your knowledge and help the repository grow! If you're lost or confused, please try the help page, or else drop on by the forums and ask for clarification there. Read more: Game Programming Wiki

Fast API search

Search engine in hundreds languages and API defenitions Read more: Fast API search Posted via email from Jasper-net

Upside-Down-Ternet

My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. Split the networkI'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses. /etc/

App Inventor for Android

Create apps for your phone!Creating an App Inventor app begins in your browser, where you design how the app will look. Then, like fitting together puzzle pieces, you set your app's behavior. All the while, through a live connection between your computer and your phone, your app appears on your phone. Read more... App Inventor is a part of Google Labs, a playground for Google Engineers and

50 Kick-Ass Websites You Need to Know About

It's time to update the entries in your browser's links toolbar. But with recent estimates putting the size of the internet at well more than 100 million distinct websites, it's getting harder and harder to get a handle on all the great stuff that's out there. That's why we've compiled this list. And unlike some lists you may have seen, which try to name the very "best" websites, but end up just

WTF Code

"Programming is like sex: one mistake and you’re providing support for a lifetime." - Michael Sinz Read more: WTFCode.com Posted via email from Jasper-net

Random Key Generator

Here you will find a variety of random keys that can be used for passwords, encryption keys, etc. - all randomly generated, just for you! Simply refresh this page for a completly new set of keys.Read more: Random Key Generator Posted via email from Jasper-net

50 UNIX / Linux Sysadmin Tutorials

To wrap this year, I’ve collected 50 UNIX / Linux sysadmin related tutorials that we’ve posted so far. This is lot of reading. Bookmark this article for your future reference and read it whenever you get free time. Disk to disk backup using dd command: dd is a powerful UNIX utility, which is used by the Linux kernel makefiles to make boot images. It can also be used to copy data. This article

51 Free Tools to Stay Informed and Invisible on the Internet

Without a TraceIf you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients. Mozilla Firefox, Portable Edition. This free web browser leaves no

Spritely

Spritely is a simple plugin with only two key methods, sprite() and pan() both of which simply animate the background-image css property of an element. The difference between the two is that a 'sprite' image contains two or more 'frames' of animation, whereas a 'pan' image contains a continuous image which pans left or right and then repeats. Typically, in either case, you would use a png file (

SIW

SIW is an advanced System Information for Windows tool that gathers detailed information about your system properties and settings and displays it in an extremely comprehensible manner. SIW can create a report file (CSV, HTML, TXT or XML), and is able to run in batch mode (for Computer Software and Hardware Inventory, Asset Inventory Tracking, Audit Software Licenses, Software License Compliance)

Default Passwords

437 vendors, 1842 passwords1.  Linksys - ADSL RouterVersion 2700vUser ID (none)Password epicrouterLevel Administrator2.  Linksys - BEFW11S4User ID (none)Password admin Level Administrator3.  Linksys - DSLMethod TelnetPassword adminLevel Admin4.  Linksys - PSUS4User ID adminPassword adminLevel AdministratorNotes Print Server for USB with 4-Port Switch 5.  Linksys - SRW224User ID adminPassword

Kakewalk

Install 'Snow leopard' on a PC. Almost as easy as in Mac. Read more: Kakewalk Posted via email from Jasper-net

What is ophcrack?

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features:» Runs on Windows, Linux/Unix, Mac OS X, ...» Cracks LM and NTLM hashes.» Free tables available for Windows XP and Vista.» Brute-force module for simple

Password Chart

Convert any phrase to password letters/number substitution Read more: Password Chart Posted via email from Jasper-net

Magic SysRq key

The magic SysRq key is a key combination understood by the Linux kernel, which allows the user to perform various low level commands regardless of the system's state. It is often used to recover from freezes, or to reboot a computer without corrupting the filesystem. To be able to use this functionality the CONFIG_MAGIC_SYSRQ option has to be enabled at kernel compile time. PurposeMuch like Sun

HOWTO bypass Internet Censorship

A tutorial on how to bypass Internet Censorship using Proxies, Shells, JAP e.t.c. Different ways to beat the filtering in schools, countries or companies (blocked ports e.t.c). This is the original and so newer than the translations because I'm still working on it. 1. Introduction1.1 About Internet censorship1.2 My reasons for writing this1.3 How to get this file 1.4 License 2. Possible

11 Killer Open Source Projects I Found with NuGet

So maybe I'm late to the party, but I recently started playing with NuGet. It's a killer new way to find, install, maintain, and manage references to open source libraries in Visual Studio 2010. Plenty of people have written about it (Phil Haack and Scott Hanselman for example). Let's just say you should learn about NuGet if you don't know it already. What I want to talk about is all the cool

Open Source More Expensive Says MS Report

Much conventional wisdom about programs written by volunteers is wrong. The authors took money for research from Microsoft, long the arch- enemy of the open-source movement— although they assure readers that the funds came with no strings attached) Free programs are not always cheaper. To be sure, the upfront cost of proprietary software is higher (although open-source programs are not always

How to Pick Your Next Android Phone: The Specs That Matter (and the Ones That Don't)

Manufacturers are constantly popping out new Android phones, and it can all be a bit overwhelming when it comes time to buy a new phone. Here's how to avoid getting overwhelmed and narrow down your buying decisions. The sheer number of Android phones dropping at any given time is both a blessing and a curse. On one hand, you have a large number of phones to choose from; on the other, it's easy to

CHART OF THE DAY: Here's Who Owns Facebook

Below is a colorful illustration of all the people who will cash in on Facebook stock from LearnVest. Read more: Business Insider Posted via email from Jasper-net

How to Install Non-Market Apps on Your Android Device

Although the Android Market offers thousands upon thousands of applications to choose from, sometimes you’ll want to break free and install applications that aren’t available on the Market. Read on to learn how. Android’s Default DefensesYour Android phone is, by default, set to disallow any applications that aren’t from the Android Market. It’s a wise move as the majority of users are more

Internet Explorer 9 to bolster security with ActiveX content filter

Sure, you can wade through Internet Explorer 8's security settings and flip a number of radio buttons to change ActiveX permissions in its many zones, but it's kind of a pain in the butt. It's also not also flexible a system as it could be -- but Microsoft appears ready to change all that in Internet Explorer 9. Read more: DownloadSquad Posted via email from Jasper-net

Hackers Respond To Help Wanted Ads With Malware

The FBI issued a warning Wednesday about a new twist on a long-running computer fraud technique, known as Automated Clearing House fraud. With ACH fraud, criminals install malware on a small business' computer and use it to log into the company's online bank account. In this latest twist on the scam, the criminals are apparently looking for companies that are hiring online and then sending

VirtualBox 4.0.2 is released ! PPA Ubuntu & Debian

Virtualbox 4.0.2 is released, this is an update release that comes with some bug fix and improvements.What`s New in this release:· GUI: don’t crash if a removable host drive referenced from the VM settings vanished · GUI: fixed a crash when using the KDE4 Oxygen theme and clicked on the settings button (4.0 regression; bug #7875)· GUI: properly warn if the machine folder cannot be created (bug

Web Performance Tuning Tips Solutions for Drupal Sites

[] MySQL Innodb storage engine.[] ZFS file system - ZFS is a combined file system and logical volume manager designed by Sun Microsystems. The features of ZFS include data integrity (protection against bit rot, etc), support for high storage capacities, integration of the concepts of filesystem and volume management, snapshots and copy-on-write clones, continuous integrity checking and automatic

Common performance issues on ASP.NET web sites

I spend a lot of my time analysing the performance of web sites and tuning the applications to make the sites run more efficiently and scale better. Over time I’ve pulled together a checklist of some of the more common performance issues that I see and how to resolve them, and I thought it was about time I shared them here. Most of the issues I’ve identified are straightforward to fix (many are

Automatically convert your PSD into HTML!

Our service is for those who are involved in web development industry. We strive for reducing time and cost of site creation. We help to speed up one of the site development phases, namely, creation of HTML markup from a graphic design. Through our service you can automatically convert your PSD design into a valid cross browser XHTML 1.0 Strict/CSS 2.1 markup in a minute! All you need is to

Sql Agent Quick Tip- Deleting History

This is the first in several posts that will discuss quick tips and tricks for managing Sql Agent history.  Today, I'm going to discuss one of the history management options which will let you delete history.  There is an easy way to do this, but it has some limitations to be aware of, which I will point out below. The first thing to do is to find the Sql Server Agent node in Management Studio,

Announcing Portable Library Tools CTP [Justin Van Patten]

Today we're announcing the CTP release of a new add-in for Visual Studio 2010 that makes it easy to create C# and Visual Basic libraries that run on a variety of .NET platforms without recompilation. Download the Portable Library Tools CTP today (install VS 2010 SP1 Beta first).Creating Portable LibrariesThe Portable Library Tools CTP adds a new "Portable Class Library" project template to Visual

SQL Database Mail -- Cleanup of Logging Records

Similar to SQL Agent logging history, Database Mail has own logging history.  When the logging history is grown too big, you can run T-SQL sysmail_delete_log_sp to clean the logging records.  Several examples of using this stored procedure are provided here. The article here is assumed that a SQL Database Mail profile "MailProfile1' has been created.  The MailProfile1 tells Database Mail what

Attack Surface Analyzer

My team here at Microsoft Security Engineering Center just released our latest tool for the SDL, Attack Surface Analyzer.  Dave has already blogged about the tool: http://blogs.msdn.com/b/sdl/archive/2011/01/17/announcing-attack-surface-analyzer.aspx. Read more: Discoveries at Microsoft Posted via email from Jasper-net

מה הפואנטה של MVVM ?

למה אני צריך את זה בכלל?!השאלה איך לממש MVVM זו בפירוש לא השאלה הראשונה שאנו צריכים לשאול את עצמינו לפני שאנו נגשים למימוש של ארכיטקטורה או Design Pattern חדש. השאלה היא למה. התיעוד של פריזם מספקת דוגמא מאוד טובה לבעייתיות שאליה אני מתכוון... - רוב רובו של התיעוד בנוי כך - בשביל לממש A יש לבצע B, בשביל לממש C יש לבצע D.. בהרבה מאוד מקומות שמתמשים בפריזם נופלים ללא מעט טעויות בגלל שאת השאלה

משרות פתוחות בחברת טווינגו

HiWe are looking for:SQL Server DBA (application)At least 2 years of experience. Must know how to write queries and procedures. Optimizing indexes is also needed.Advantage: C# / BI tools / Infrastructure DBA experience BI DevelopersAt least 2 years of experience with any tool, not only MS BI. Reports, ETL and DW.Advantage: OLAP, MicrostrategyJunior DBARead more: ItayBraun Posted via email

Help us test Mono 2.10

Andrew has just released the packages for our first preview of Mono 2.10, we published sources and packages for SLES, OpenSUSE, RHEL, Windows and MacOS X here:http://mono.ximian.com/monobuild/preview/download-preview From our draft release notes, here are some of the highlights in this release:SGen Precise Stack Scanning and many performance improvements.New Profiler engineGoogle Native Client

Announcing Native Extensions 1.0 for Microsoft Silverlight

Native Extensions 1.0 for Microsoft Silverlight (NESL) is a new toolkit that contains a set of Silverlight libraries that enable Silverlight 4 out-of-browser applications to interact with cool Windows 7 features: · Take advantage of sensors like accelerometers, light sensors, compasses, GPS etc.· Access content from connected portable devices like music players and digital cameras.· Capture and

אינטל תגייס ב- 2011 למעלה מ- 1000 עובדים בהכנות לאתגרים של טכנולוגיית 22 ננומטר בפיתוח ובייצור.

אינטל ישראל צופה גיוס של למעלה מ- 1000 עובדים חדשים שישתלבו בשנת 2011 בהכנות לפיתוח וייצור של טכנולוגיית 22 ננומטר.אינטל ישראל ייצאה בשנת 2010  בהיקף כספי של 2.7 מיליארד דולר.  אינטל ישראל הנה היצואן הפרטי הגדול בישראל. אינטל הנה המעסיק הגדול בישראל במגזר הפרטי. בשנת 2010 עמד מספר המועסקים באינטל ישראל על 7,057 עובדים, וההשפעה העקיפה על התעסוקה בישראל נאמדת בכ-20,000 מועסקים. Read more:

Rabu, 19 Januari 2011

Microsoft Re-Adds 'Boot to Disc' on Xbox 360

Xbox LIVE Dashboard update:On Wednesday, January 19th we will issue a mandatory dashboard update that (re) enables the ‘Boot to Disc’ option in the Xbox 360 dashboard. After you accept the update, you’ll be able to set the option to boot to the Xbox 360 dashboard OR directly to the game you have in the tray when you power up your console. This option can be found in the System Settings. Xbox.com

SQLSteps

SQLSteps was started by a group of professional SQL Server Instructors who could not find a decent and affordable online training solution for their own students. Armed with a deep understanding of the process of rapid Step-by-Step skill development, we have developed courses that will engage and challenge you; ultimately giving you the skills you need to move forward with your SQL projects and

Secure Programming for Linux and Unix HOWTO

David A. WheelerCopyright © 1999, 2000, 2001, 2002, 2003 by David A. Wheelerv3.010, 3 March 2003This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. Specific guidelines

Sikuli

What's SIKULI?Sikuli is a visual technology to automate and test graphical user interfaces (GUI) using images (screenshots). Sikuli includes Sikuli Script, a visual scripting API for Jython, and Sikuli IDE, an integrated development environment for writing visual scripts with screenshots easily. Sikuli Script automates anything you see on the screen without internal API's support. You can

An A-Z Index of the Bash command line for Linux.

adduser  Add a user to the system  addgroup Add a group to the system  alias    Create an alias •  apropos  Search Help manual pages (man -k)  apt-get  Search for and install software packages (Debian/Ubuntu)  aptitude Search for and install software packages (Debian/Ubuntu)  aspell   Spell Checker  awk      Find and Replace text, database sort/validate/indexb  basename Strip directory and suffix

10 Must-Play Video Games for 2011

Assembled here are the 10 games that really have me gripped as the ones to watch over the course of the next 12 months. There remains a whole host of other titles that weren’t covered in the list but still represent genuinely exciting or at least interesting prospects. They’re listed at the bottom as honorable mentions. NB: I would have had Diablo 3 right at the top of the list as that is the one

A New Web for .NET

A number of things have been happening these last few years in the .NET community in relation to the Web. Specifically, OpenRasta and FubuMvc demonstrated 1) new approaches to web development in a static-typed world and 2) that other developers were growing tired of the existing options. Since then a host of new micro-frameworks, generally inspired by the Ruby dynamic duo of Rack and Sinatra,

GNOME 3 website now live, tries a bit too hard to be cool, looks like Unity

New, clean-and-simple HTML5 websites are obviously in this week: GNOME, one of the most popular desktop environments for Linux, has just released a new website to celebrate the features of version 3, which will be released in April. With phrases like "SIMPLY BEAUTIFUL" and "DISTRACTION-FREE COMPUTING" plastered all over the site it's obvious that GNOME not only likes capital letters, but that

EQATEC Profiler

Optimize speed, not memory usageThe EQATEC Profiler is a code profiler, not a memory profiler. So it's all about making your app run faster, not about tracking objects and memory. The report will tell you exactly how many times each method was called and how long it took. You can then speedup your application by optimizing just the most expensive methods. Easy to useWe have focused much on making

Xte Profiler

.NET Profiler Xte Profiler is a trace and memory profiler for .NET. Supports .NET CLR v2 and v4 (.NET Frameworks 2.0, 3.0, 3.5 and 4.0)Supports profiling of Azure webroles, IIS Express, Windows executables, ASP.NET Development server applications, IIS applications, Windows services and Silverlight 4 applications. Supports trace and memory profile modes.and more...Read more: Xte Profiler

Wrappers Unwrapped

When you use a COM object in .NET the .NET framework creates a Runtime Callable Wrapper (RCW) which shows up in the debugger as __ComObject. This allows interoperation between managed .NET and native COM code. One of the major differences between C++ COM and .NET is that in C++ you have deterministic destruction while in .NET objects are finalized at the garbage collector’s leisure. Which mode of

Nemerle

Nemerle is a high-level statically-typed programming language for the .NET platform. It offers functional, object-oriented and imperative features. It has a simple C#-like syntax and a powerful meta-programming system. Features that come from the functional land are variants, pattern matching, type inference and parameter polymorphism (aka generics). The meta-programming system allows great

Mole For Visual Studio - With Editing - Visualize All Project Types

IntroductionMole was authored by Karl Shifflett, Josh Smith and Andrew Smith who make up Team Mole. The core development process took the team several weeks. Most of the additional enhancements were implemented by Andrew and Karl, with a lot of testing and feedback provided by Josh. You can visit Team Mole's Home Page here. This article was written by Karl. Mole has been tested on WPF, WCF, WF,

C# VB .NET

Read more: ahover.com Posted via email from Jasper-net

How do you configure Google Chrome to use TOR?

1. Download Vidalia from http://www.torproject.org/easy-download.html.en2. Install Vidalia - a TOR client with GUI.3. Wait until Vidalia tells you that Tor is working. 4. Start Google Chrome.5. Using the Tools menus (it looks like a wrench), choose options, "Under the hood". Scroll down to "Network" and click the "Change Proxy Setting" button.6. Under the "Connections" tab, choose "LAN Setting" -

Why doesn’t this cause an Exception ?

I was trying to run the below code snippet in Visual Studio 2010 .int Number1 = 320000;int Number2 = 320000;int Number3 = Number1  * Number2 ;MessageBox.Show(Number3.ToString());The code resulted in the value – 797966336 without being showing the error or the correct value . Just found that If you want an exception to be raised on this occassion , then use the following 2 options as below .Read