-
Recent Posts
Recent Comments
- Debugging Django with Aptana | CodeSmart, Inc. on Running Django in IIS7/IIS8
- iminfense on Silverlight 4 – 070-506 Exam… Passed!
- trade show displays on Leveraging OData end-points in JSON format with JQuery
- EspaƱola Lawyers on Leveraging OData end-points in JSON format with JQuery
- death records on Leveraging OData end-points in JSON format with JQuery
Archives
Categories
Meta
Tags
Adaptive Design AJAX Android ASP.NET MVC 3 Building Search Filters Certification Django Django in IIS EF Entity Framework Fiddler2 Gotchas Hacking HTML5 INotifyPropertyChanged IPMA JQuery JSON Mobile MONO MONO for Android OData PHP PropertyChanged Python RDLC Responsive Design RIA Services Toolkit Security Setup and Configuration Silverlight Silverlight 4 SQL SQL Injection SQL Server SSRS Table Value Parameters Technology Philosophy Testing Training WAMP WPF XAML
SSRS for ASP.NET MVC3
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 private FileContentResult DownloadPdfReport(string reportPath, string fileName, IEnumerable reportDataSources) { var localReport = new LocalReport [...]
Utilizing JSON Endpoints in WCF Domain Services
These videos (3 in total) will explain how it is done. They will be using a relatively simple T4-template that I’ve implemented specifically for the .NET 4.0 version of Entity Framework. The T4-Template is written to support basic CRUD operations against a single collection of table-related classes. The T4-Template doesn’t do much in the way of supporting the necessary operations to track related entities in JSON that come back from the WCF Domain Service query.
Posted in AJAX, Entity Framework, Training
Tagged ASP.NET MVC 3, Entity Framework, JQuery, JSON, Training
Comments Off
ASP.NET MVC 3 Security Re-Visited
While presenting at the IPMA, I demonstrated to the 150+ person audience how easy it is to hijack another user’s credentials within an ASP.NET MVC 3 application that hasn’t been vetted for coding-practices. In this article, I will show a video of me re-demonstrating that attack, exactly how to fix it, and post the source-code [...]
IPMA Security Training 2011
Today, I delivered a basic 3-hour session on areas to focus on when hardening security in WA State Agencies. I mainly focused the first half of the presentation on common best-practice methods like clear lines of communication between Project Managers and Network, Security, and Database Administrators as well as practicing good coding practices such as peer-programming, code-reviews, and the like. I finished off the first 2 hours be demonstrating the use of Fiddler2 and how it could be used to probe, and then attack an ASP.NET MVC application.