Pages Menu
TwitterRssFacebook
Categories Menu

Posted by on 13th November, 2003

NoSpamEmailHyperlink

If you have any e-mail addresses in the generated source of your site, especially in href=mailto: type links, there is a good chance that those addresses will later start receiving spam e-mails from any number of servers. Here are some good tricks to fool spammer spiders. written by Paul Riley. There is a simple Javascript trick and the rest is pretty much .NET, but if you develop in another language, you can still extract the concept and rewrite it to suit your platform. Fighting back against the e-mail...

Read More

Posted by on 12th November, 2003

The standalone programmer

Here are some excellent articles, offering advice, tips and project related events some of us are well familiar with. All articles written by Matt Gullett: The Standalone Programmer: A question of quality Can a standalone developer develop high quality software and compete with teams of developers? The Standalone Programmer: Communicating with Users Communicating with users requires alot of experience and effort but can be easier by following some simple rules. The Standalone Programmer: Delivering high quality results Simple steps that can be taken to insure that high quality results are the norm, not the exception. The Standalone Programmer: Innovative Software Development Sometimes rules interfere with talent, skills and experience when innovation is needed The Standalone Programmer: Real Time Software Development Coping with the challenges of the real-time enterprise requires new skills, a commitment to change and some new approaches. The Standalone Programmer: Simple Performance Testing A simple framework for creating customized performance tests The Standalone Programmer: Tips from the trenches Being a standalone programmer can be as good or...

Read More

Posted by on 11th November, 2003

Recalling Voyager

By now should have heard the news that Voyager has reached the edge of the solar system, although many scientist dispute that statement. In any case, you may also know about the golden records that are onboard each one of the Voyagers (I and II). I had known about the records and their purpose, but never really researched the actual content…..untill now. The Jet Propulsion Laboratory in California has this Flash presentation displaying the contents of the records. I will keep the details of my opinion to myself but I think the Voyager needs to be recalled immediately, before anyone out there happens to find it… I am from this world, and believe have half a brain and I am not sure I would be able to figure out, by looking solely at the engravings, that the needle placed on the spinning disk would produce some sort of visible images. And then the images they picked….! But then again, I am just a sofware developer…what do I know?. Check...

Read More

Posted by on 9th November, 2003

Visual Studio .NET Documentation Update

Microsoft has updated the Visual Studio .NET 2003 documentation to include over 5,000 additional code examples for C++, C# and VB.NET, bug fixes, improved content and additional clarifications. You will need Windows 2000 or XP, VS.NET 2003 and MSDN Library for Visual Studio .NET 2003. Plus a fairly decent connection since it's an 80Mb download. Grab the files here:...

Read More

Posted by on 5th November, 2003

Simple noise encryption

A simple explanation by Adrien and Peter Stuff on how to encrypt information in noise images using simple tools you already have. Quite interesting…...

Read More

Posted by on 5th November, 2003

Google it right

Google can return a ton of hits for any query you make. To make the search really efficient, the trick is to tell Google how to scope the search so that instead of getting a billion results, you get the 100 best. In order to scope things better, Google has set up special search groups for specific topics, including information for Microsoft, Apple Macintosh, BSD, Linux, and the U.S. Government. For instance, when you search from http://www.google.com/microsoft.html, your query will be run only on sites that have predominantly Microsoft content. To use the specific sites, point your browser at...

Read More

Posted by on 20th October, 2003

Cross Site Scripting with Java applets exploit

Article by Marc Schoenefeld on cross site through Java applets. Unsigned applets coming from different sites may share data areas via undocumented static variables of the jdk. While altering these variables JDK internal states may become corrupt and functionality is no longer. This especially concerns XML processing which depends on the org.apache.xalan.processor.XSLProcessorVersion class. This behavior violates the isolation restriction of the sandbox....

Read More

Posted by on 19th October, 2003

Protecting database connectionstrings

Protecting application secrets, such as database connection strings and passwords, requires careful consideration of a number of pertinent factors. This article explains the fundamentals of data protection and compares a variety of techniques that can be used to protect application settings. Check it out here:...

Read More

Posted by on 1st October, 2003

Web Services through Flash Remoting experiment

With all the buzz about a the new Flash 7 Player having cross domain restrictions for the built-in webservices component, it is a good thing that webservice accessibility in Flash MX is still available through Flash Remoting. This experiment shows 4 simple webservices in action with Flash Remoting in Flash MX Experiment here: Web Services through Flash Remoting...

Read More