- Debugging Django with Aptana | CodeSmart, Inc. on Running Django in IIS7/IIS8
- iminfense on Silverlight 4 – 070-506 Exam… Passed!
- trade show displays on Leveraging OData end-points in JSON format with JQuery
- Española Lawyers on Leveraging OData end-points in JSON format with JQuery
- death records on Leveraging OData end-points in JSON format with JQuery
TagsAdaptive Design AJAX Android ASP.NET MVC 3 Building Search Filters Certification Django Django in IIS EF Entity Framework Fiddler2 Gotchas Hacking HTML5 INotifyPropertyChanged IPMA JQuery JSON Mobile MONO MONO for Android OData PHP PropertyChanged Python RDLC Responsive Design RIA Services Toolkit Security Setup and Configuration Silverlight Silverlight 4 SQL SQL Injection SQL Server SSRS Table Value Parameters Technology Philosophy Testing Training WAMP WPF XAML
HTML 5 is new set of features that are being recommended by the W3C and several other “standards” governing bodies. I.T. companies that develop browsers for every-day use are taking notice and working overtime to implement most of these new features. The content attached to this article explains with a set of PowerPoint 2010 slides and demo source-code… how to leverage and plan for the new HTML 5 standard.
When attempting to install and configure Apache to run on your Windows 2008 server in order to leverage MySQL and PHP based web-frameworks… you may realize that your normal Windows Integrated Security websites are no-longer running and actually prevent you from accessing them. (This occurs only if you’re using the standard port 80 to access your website.) This is because the WAMP install package and other similar packages that configure Apache to run on a Windows Server, typically modify the “hosts” file burried in your Windows directory.
While presenting at the IPMA, I demonstrated to the 150+ person audience how easy it is to hijack another user’s credentials within an ASP.NET MVC 3 application that hasn’t been vetted for coding-practices. In this article, I will show a video of me re-demonstrating that attack, exactly how to fix it, and post the source-code [...]
Alright, after a long… ok, really long… wait I have finally gotten around to posting the content folks were asking for from the recent IPMA security presentation. The source-code and walk-thrus are below. First up is the SQL-Server injection problem. There are many ways that a hacker can exploit vulnerabilities, and SQL Server injection is [...]