This is a mirror of official site: http://jasper-net.blogspot.com/

'Cosmo' — a C#-Based Operating System

| Thursday, September 8, 2011
   A new operating system called Cosmo has been developed, written entirely in C#. It shows the naysayers you can write a full OS kernel without C. So far, you need Visual Studio to compile and run it, as Mono is not supported. However, the source code can be compiled with the Express editions of Visual Studio. The project plans to add VB.NET support soon.

Read more: Slashdot
Read more: Cosmos
QR: index.en.aspx

Posted via email from Jasper-net

Cloud Gaming Service OnLive Unofficially On Linux

|
onlive-disc-sales.jpg

   Through some clever patching, OnLive community members have found a way to run OnLive on Linux using Wine. While the fix isn't perfect, this is a giant leap for Linux users wanting to play the latest games without the need for Windows. Linux users can now play several high quality games like the new Deus Ex with very few performance issues and on lower end hardware.

Read more: Slashdot
QR: Cloud-Gaming-Service-OnLive-Unofficially-On-Linux

Posted via email from Jasper-net

How To Share A Wi-Fi Connection With A System With No Wi-Fi Card [Ubuntu]

|
Edit-Connections.png

Sometimes you may require sharing a wireless internet connection with a computer which has no Wi-Fi adapter. Doing so can become quite tricky as the computer without a Wi-Fi card cannot be connected to a wireless router. In this post we will provide you with a quick tip to explain the procedure to share a wireless internet connection from one Ubuntu system with a Wi-Fi card (e.g. Laptop) to another Ubuntu computer which has no Wi-Fi card (e.g. a desktop PC).

To get started, click on the connection icon from the system tray and select Edit Connections.

Read more: Addictive tips
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.addictivetips.com/ubuntu-linux-tips/how-to-share-a-wi-fi-connection-with-a-system-with-no-wi-fi-card-ubuntu/

Posted via email from Jasper-net

Rent Your Own Botnet

|
New research shows that the TDSS/TDL-4 botnet, widely considered one of the largest and most sophisticated, can be rented via a Web storefront available to all comers. Researchers from Kaspersky found that the latest version of TDSS installs a file that sets the machine up as a proxy for anonymous browsing, and then phones home to awmproxy.net, which rents the proxies for rates from $3 per day to $300 a week. The curators of this service even created a Firefox add-on to help customers. 'Interestingly, AWMproxy says it accepts payment via PayPal, MasterCard, and Visa.


Read more: Slashdot
QR: Rent-Your-Own-Botnet

Posted via email from Jasper-net

TwitTV – Watch Videos Associated With Trending Topics On Twitter

|
TwitTV.png

What trends on Twitter doesn’t always make sense; if you gained a follower every time #whyimsingle trended on Twitter, you might just make it to the top 100 most popular people on Twitter (estimate is based on the level of annoyance with the #whyimsingle trend). While a lot of weird things might trend on the popular micro blogging site, some trends are worth paying attention to, particularly if they might have entertaining or informational content (images or videos) associated with them. TwitTV is a free web service that filters videos from tweets about trending topics and lets you view them easily. You can switch to the next video associated with a trend, switch to viewing videos for another trend and view trending videos for different regions (restricted to regions that Twitter supports Trends for).

The service requires no sign up whatsoever and doesn’t even require you to sign in with your Twitter account. The interface is simple; the left panel shows you what is currently trending on Twitter. When you visit the site, it shows you worldwide trends and starts playing videos associated with the top trend. The video player has two buttons on either side that let you move to the next or previous trend. A speaker like icon lets you turn the volume on or off and a smaller arrow just below it lets you switch to the next video for the current trend.

Read more: Addicitive tips
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.addictivetips.com/internet-tips/twittv-watch-videos-associated-with-trending-topics-on-twitter/

Posted via email from Jasper-net

Transfer MS Access Database Directly To PostgreSQL In 4 Simple Steps

|
1.png

PostgreSQL, casually known as Postgres, is a cross-platform, open source object relational database management system (ORDBMS) which supports a hosts of operating systems, including, Solaris, Linux, Windows, Mac OS X, and FreeBSD. Postgres includes support for all SQL constructs, ranging from subselects, user-defined types, transactions, etc., while containing a variety of native data types such as, Boolean, XML based Xpath queries, Geometric Primitives, Composite and so on. Users who frequently port MS Access database formats,  ACCDB, ACCD, MDB, and ACCDE to PostgreSQL database generally relies on different complex methods which often include exporting and importing database tables manually. If you want a relatively easier way to send selected MS Access database tables to PostgreSQL server or create a compatible SQL dump file for PostgreSQL database, check out MS Access To PostgreSQL.

MS Access To PostgreSQL is a wizard-based Access database porting utility which supports all Access database formats, including, MDB, ACCD, ACCDB, etc. The password-protected databases tables can also be sent directly PostgreSQL server without having to unlock the database. It includes two convenient options to export Access database to PostgreSQL database, including SQL dump and direct transfer. The direct transfer requires specifying Server connection details, including Server path, Port, Maintenance DB, username and password, whereas, SQL Dump needs only target location to be specified.

To get started, launch the application and specify the Access database source path. If database is encrypted, you will need to enter security settings, including username and password.

Read more: Addictive tips
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.addictivetips.com/windows-tips/transfer-ms-access-database-directly-to-postgresql-in-4-simple-steps/

Posted via email from Jasper-net

Samsung and VMWare Bringing Virtualization to Android

|
   VMware's mission to bring virtualization to the mobile market gained a major supporter last week when Samsung pledged to use VMware software to build business-friendly smartphones and tablets. The project known as Horizon Mobile will let Android phones use virtual machine technology to run a second instance of Android, in much the same way virtualization works on servers and desktops. The user essentially has two completely separate phones running on one device, and can switch from the personal one to the corporate one by clicking a 'work phone' icon.

Read more: Slashdot
QR: Samsung-and-VMWare-Bringing-Virtualization-to-Android

Posted via email from Jasper-net

.XXX Domain Registrations Begins

|
Registrar ICM Registry announced that the .XXX sponsored top-level domain for the adult entertainment industry is open for registration. The domain was approved by the board of the Internet Corporation for Assigned Names and Numbers (ICANN) in June last year, and then finalized in March. The domain is made possible thanks to ICANN's rules for 'sponsored' TLDs, through which domains have been created by interest groups. Other examples include dot-coop, for cooperative organizations, and dot-museum.

Read more: Slashdot
QR: XXX-Domain-Registrations-Begins

Posted via email from Jasper-net

#381 – Loading .rtf Files Into a RichTextBox

|
The RichTextBox control supports loading not only Text (.txt) files, but also Rich text (.rtf)  files.

You can load a file using the Load method of the RichTextBox’s Selection property.

        <RichTextBox x:Name="rtfMain" />
            rtfMain.Selection.Load(new FileStream(@"D:\Spade.rtf", FileMode.Open), DataFormats.Rtf);

Read more: 2,000 Things You Should Know About WPF
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://wpf.2000things.com/2011/09/07/381-loading-rtf-files-into-a-richtextbox/

Posted via email from Jasper-net

From Normal Collections to Generic Collections

|
Prior to .NET Version 2.0 if you wanted to hold a collection of string, integers, or objects you had to work with some of the classes in the System.Collections namespace.

This namespace contains classes and interfaces needed to define collections of objects. Some of the classes are listed in Table 1.
Class     Description
ArrayList     An ArrayList is similar to an array, but the ArrayList class allows you to add items without managing the size of the list yourself (much like a VB Collection object).
CollectionBase     This class is the base for a strongly-typed collection, critical for creating collection classes, described below.
DictionaryBase     This class is the base for a strongly-typed collection utilizing associated keys and values. This is similar to the Dictionary object found in VBScript and used by many ASP developers.
SortedList     This class represents a collection of keys and values, and is automatically sorted by the key. You can still access the values with either the key or the index number.

Table 1. System.Collections classes

Assume you create a class called Customer. The Customer class has a number of properties, methods, and events. You then want to create several Customer objects within one structure so you can iterate through the collection, performing some operation on each object. You could just create a variable of type Array, ArrayList, or SortedList, but these standard collections can hold any type of object. In other words, you could add a Customer object as the first item in the collection, but you could then add an Employee object as the second item, a string as the third, and so on. If you try to iterate over this collection and apply the Update method, it might work on the Customer and Employee objects, but when your loop attempts to call the Update method of a String object, it will certainly fail.
To get around this sticky situation, you can create your own class that looks like a generic collection object, but restricts its members to only one data type. This new class will include the standard methods of the collection base type, such as the Add and Remove methods, as well as an Item property, but your class’ Add method will only allow you to add Customer objects.

The .NET Framework 2.0 introduced a new namespace called System.Collections.Generics which provides a series of classes that closely resemble the classes in System.Collections. However, these new classes automatically provide the ability to contain only one type of object.

System.Collections Example

Assume that you need to create a Customer object. The structure of the Customer object is very simple, containing just a CompanyName property. Imagine that you want to create a collection class named Customers (note the “s” on the end) to hold a set of Customer objects. You first need to create the Customer class as follows:

public class Customer
{
  public string CustomerName;
}


Read more: Paul Sheriff's Blog for the Real World
QR: from-normal-collections-to-generic-collections.aspx

Posted via email from Jasper-net

Using BugAid to flatten class hierarchies while debugging

|
While debugging deep class hierarchies in Visual Studio, I was often annoyed by having to constantly expand the “base” nodes to get to see the members I wanted to see. This happens because Visual Studio  only shows fields and properties declared on the given type, and tucks all the members of the base classes under the “base” node. This is helpful in some cases, but more often that not, I found that it gets in my way.

And so, after trying Jared’s solution, I decided to have a go at it and try to fix this problem in BugAid.

The idea is that if you’re interested in a property of the base class, you can star that property, which causes the property to appear at the top of members list, and also in the text of its parent.

So for example, in the following scenario, I had to expand two base nodes to get to see the properties I wanted, “Important” and “Interesting”:

InheritingStars1.png

Read more: BugAid
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.bugaidsoftware.com/2011/09/using-bugaid-to-flatten-class-hierarchies-while-debugging/

Posted via email from Jasper-net

Exceptions and Parallel Loops

|
Unhandled Exceptions

When an exception is thrown from within a sequential loop the normal flow of the program is interrupted. Control passes to the next available catch block or, if no appropriate try / catch statements are present, the unhandled exception is passed to the .NET runtime and the program is aborted. When a try / catch block is present but it not within the loop, no further iterations are executed and the current iteration is terminated early.

Read more: Black Wasp
QR: ParallelLoopExceptions.aspx

Posted via email from Jasper-net

Setting up Policies for Extensible Parts in MEF

|
    Part Lifetime is one of the most important hindrances that we face while working with MEF. It is very important to understand how the parts are going to be shared between plugins such that having been so much open ended, 3rd party plugins remain separated to the objects that you do not want to be shared outside.  In this post I am going to define how Part creation policies can be setup on an object to ensure how the object needs to behave in the CompositionContainer.

It is true that MEF is very well constructed and everything could be defined just in forms of an attribute, Part lifetime can also be set using a special attribute called PartCreationPolicy.

[PartCreationPolicy(CreationPolicy.NonShared)]
public Action MyActionDelegate { get; set; }

This means the container will secure the object Action to be shared to any other import in the container either directly or indirectly. There are three states of CreationPolicy :

    Shared : This means the object will be shared in the container for any other import statement. This is the default settings for any Export and content can associate with any other component.
    Non-Shared : This means the object will not be shared either directly or indirectly. This is used only when you do not want to share your object and risk being exposed to 3rd party libraries.
    Any : This settings will choose either shared or non-shared value.


Read more: Daily .Net Tips
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://dailydotnettips.com/2011/09/07/setting-up-policies-for-extensible-parts-in-mef/

Posted via email from Jasper-net

Second firm stops issuing digital certificates

|
A second company that provides digital certificates used to authenticate Web sites won't be issuing them while it investigates whether it has been compromised as a hacker has claimed.

A hacker who goes by the alias "Ich Sun" has taken responsibility for a recent breach at Dutch certificate authority DigiNotar that resulted in more than 500 SSL (Secure Sockets Layer) certificates being fraudulently issued, including one that was used to spoof Google.com.

The self-proclaimed Iranian patriot, who was behind a hack on certificate authority Comodo this spring, says he has hacked four or more certificate authorities, including GlobalSign.

GlobalSign said in a statement on its Web site yesterday that it is investigating the matter.

"GlobalSign takes this claim very seriously and is currently investigating. As a responsible CA (certificate authority), we have decided to temporarily cease issuance of all Certificates until the investigation is complete. We will post updates as frequently as possible," the statement said.

The company also said it had hired Dutch security experts Fox-IT to help with the investigation as "a precautionary measure as we continue to assess the Comodohacker's claims."

Initially, it was suspected that someone working on behalf of the government of Iran had obtained the fake Google.com certificate to access Gmail accounts of Iranian citizens who believed they were connecting to Google over a secured connection.

However, Ichsun said he was protesting the failure of Dutch U.N. security forces to prevent a massacre in Srebrenica 16 years ago. In the Comodo breach, he claimed he was protesting U.S. foreign policy.

Read more: CNet news
QR: ?part=rss&subj=news&tag=2547-1_3-0-20

Posted via email from Jasper-net

DataBinding to Custom Properties

|
In a recent three part mini-series I showed how to create a Xaml program CalcDisplay from scratch.  In the third part of the series I showed how the values are computed for display, but I glossed over how the display value is bound to the display control itself.  Let’s focus on that for a moment in what I guess is now part 4 of the three part series.

As noted in part 3, we begin by looking at the DisplayNumber property.  When all is said and done, this property will have the value that should be displayed in the output window.  Here’s the Xaml for the output window:

<Border
    Margin="4,14,0,16"
    Grid.Row="1"
    Width="476"
    Height="74"
    Background="#FF9B9B9B"
    d:IsHidden="True">
    <TextBlock
        TextWrapping="Wrap"
        Text="TextBlock" />
</Border>

Notice that the TextBlock is wrapped in a Border. TextBlocks cannot set the background color, but Borders can.  In our case, we’re going to want to adjust some of the properties of the TextBlock. The easiest way to do this is to open the project in Blend and click on the TextBlock to update its properties.

Set the font-size to 30 point, set the font to Segoe WP Semibold and click Bold as well, and use the paragraph tab to align to the right, and VerticalAlignment to center.  Finally, click on the Foreground color and change it from white (255,255,255) to black (0,0,0).


Read more: Jesse Liberty
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://jesseliberty.com/2011/09/06/databinding-to-custom-properties/

Posted via email from Jasper-net

Why is the registry a hierarchical database instead of a relational one?

|
Commenter ton asks why the registry was defined as a hierarchical database instead of a relational database.

Heck, it's not even a hierarchical database!

The original registry was just a dictionary; i.e., a list of name/value pairs, accessed by name. In other words, it was a flat database.

.txt txtfile
txtfile Text Document
txtfile\DefaultIcon notepad.exe,1
txtfile\shell open
txtfile\shell\open\command notepad %1

If you turned your head sideways and treated the backslashes as node separators, you could sort of trick yourself into believing that this resulted in something vaguely approximating a hierarchical database, and a really lame one at that (since each node held only one piece of data).

When you choose your data structures, you necessarily are guided by the intended use pattern and the engineering constraints. One important engineering constraint was that you have to minimize memory consumption. All of the registry code fit in 16KB of memory. (Recall that Windows 3.1 had to run on machines with only 1MB of memory.)


Read more: The old new thing
QR: 10206968.aspx

Posted via email from Jasper-net

Untangling the Linux graphics stack

|
As I tried to explain this a few times in the past to others and had trouble myself, when I started using Linux, I thought I take some time today and write down what parts comprise the Linux graphics stack and how they interact. I'll ignore some parts which aren't too interesting to an average user at the moment, to keep this post as consise as possible. Apart from that, I hope I'm able to put all the relevant data into one spot.

Let us start our little journey in the kernel. There, in a directory named gpu you'll find the drm directory, which contains all DRM drivers. In this post, we'll focus on those. The drivers in that directory are the kernel side of the Direct Rendering Infrastructure (DRI) and are responsible for managing concurrent access to the graphics hardware. They also provide interfaces to pass commands and data to the GPU. The DRI wiki explains the three main purposes of the DRM modules.

The DRM module is also the part that decides whether KMS or UMS is used. Other acronyms you might hear with regard to graphics acceleration on Linux and are referring to the Kernel part are:

    GEM: an Intel-developed memory management system for GPUs.
    TTM: refers to the memory management system used by almost all non-Intel drivers (e.g. AMD's Radeon drivers). The TTM interface is "GEM-ified", meaning it offers the same API as GEM.

Apart from that, every driver has its hardware-specific parts like utilizing power-saving functions of the respective GPUs, loading firmware, if required, etc.

Now we move from Kernel space to user land. We'll ignore any non-X and non-Mesa parts (like acceleration for TTYs). That means, that our next GPU specific part is most likely the DDX. (Please note, that the classic DDX might be replaced by a Gallium3D state tracker, currently that would be the xorg state tracker, but xorg will be replaced by XA. This is only an option if the Gallium driver for your GPU supports one of those state trackers, see the Gallium status page for further details.) The DDX for your GPU offers plain (2D) X acceleration on your hardware. The respective DDX' are generally named xf86-video-[NAME], where [NAME] is replaced by e.g. ati or intel. The DDX decides which X acceleration paths are available. Acronyms you might hear, referring to the DDX part of the graphics stack, are:

    EXA: even though it looks like an acronym, the X.Org wiki Glossary defines it as:

        acceleration architecture with no well-defined acronym

    EXA superseded the older XAA and offers 2D acceleration, often in conjunction with XRender.
    UXA: more or less EXA for Intel GPUs.
    GLX: actually not a part of the DDX, but an extension for X. It provides a way to draw with OpenGL into an window managed by X.
    XRandR: An extension for X which needs to be supported by the DDX to work. It offers a standardized way to set up (multiple) heads (e.g. resolution, position, rotation, etc.).

Read more: Cùran's life
QR: Untangling_the_Linux_graphics_stack.html

Posted via email from Jasper-net

Kinect'уальный мир

|
В этой подборке представлены примеры использования Kinect в совершенно разных областях. Иногда эти применения настолько необычные, что даже не верится, что каждый из нас может создать что-либо подобное. Итак, смотрим.


Kinect Powered Building Projection

В этом видео можно увидеть как с помощью Kinect можно проецировать движения людей на здания. Технология была разработана компанией PO-MO Inc. Основатель компании в видео делится деталями о своей разработки. Больше делатей на сайте miguelcarrasco.com.

Kinect виртуальная примерочная для Topshop

Компания AR Door разработала примерочную для Topshop для показа коллекции платьев.

Read more: Microsoft UserGroup
QR: 4490

Posted via email from Jasper-net

How to convert Octal Number to Decimal , HexaDecimal and Binary Number using C# ?

|
This is my third post of the series of the Number Converter for Windows Phone 7 sourcecode . In my previous posts i talked about

    Number Converter for WP7 – How to convert Decimal Number to Binary , HexaDecimal and Octal Number using C# ?
    How to convert Binary Number to Decimal , HexaDecimal and Octal Number using C# ?

In this blog post , i describe or share the code  that converts a Octal Number to Decimal , HexaDecimal and Binary Number using C# in Windows Phone 7 .

public static class OctalConverter
{
   /// <summary>
   /// Octals to binary.
   /// </summary>
   /// <param name="OctalNumber">The octal number.</param>
   /// <returns></returns>
   public static string OctalToBinary(string OctalNumber)
   {
     Int64 DecimalNumber = OctalToDecimal(OctalNumber);
     string retVal = "";
     retVal = DecimalConverter.DecimalToBinary(DecimalNumber);
     return retVal;
   }


   /// <summary>
   /// Octals to decimal.
   /// </summary>
   /// <param name="OctalNumber">The octal number.</param>
   /// <returns></returns>
   public static Int64 OctalToDecimal(string OctalNumber)
   {
     return Convert.ToInt64(Convert.ToString(Convert.ToInt64(OctalNumber,8), 10));
   }


Read more: Ginktage
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.ginktage.com/2011/09/how-to-convert-octal-number-to-decimal-hexadecimal-and-binary-number-using-c/

Posted via email from Jasper-net

What is this thing you call a "type"? Part Two

|
Well that was entirely predictable; as I said last time, if you ask ten developers for a definition of "type", you get ten different answers. The comments to the previous article make for fascinating reading!

Here's my attempt at describing what "type" means to me as a compiler writer. I want to start by considering just the question of what a type is and not confuse that with how it is used.

Fundamentally, a type in C# is a mathematical entity that obeys certain algebraic rules, just as natural numbers, complex numbers, quaternions, matrices, sets, sequences, and so on, are mathematical entities that obey certain algebraic rules.

By way of analogy, I want to digress for a moment and ask the question "what is a natural number?" That is, what fundamentally characterizes the numbers 0, 1, 2, 3, ... that we use to describe the positions of items in a sequence and the sizes of everyday collections of things?

This question has received a lot of attention over the centuries; the definitive answer that we still use today was created by Giuseppe Peano in the 19th century. Peano said that a natural number is defined as follows:

    Zero is a natural number.
    Every natural number has a "successor" natural number associated with it.
    No natural number has zero as its successor.
    Unequal natural numbers always have unequal successors.
    If you start from zero, take its successor, and then take the successor of that, and so on, you will eventually encounter every natural number. (*)

Surprisingly, that's all you need. Any mathematical entity that satisfies those postulates is usable as a natural number. (**) Notice that there's nothing in there whatsoever about adding natural numbers together, or subtracting, multiplying, dividing, taking exponents, and so on. All of those things can be bolted on as necessary. For example, we can say that addition is defined as follows:

    (n + 0) = n
    (n + (successor of m)) = ((successor of n) + m)


Read more: Fabulous Adventures In Coding
QR: what-is-this-thing-you-call-a-quot-type-quot-part-two.aspx

Posted via email from Jasper-net

Paladin

|
Paladin is an initiative by the Mozilla community to provide open source gaming technology for the web.

Paladin sits at the intersection of 3D gaming, JavaScript framework and library development, and the browser. We're tied into the bits of the web that are up-and-coming, and are working to weaponize them for gaming. Where the web is missing critical gaming support, we aim to fill those gaps by adding new browser APIs, enhancing existing ones, and building technologies on top of the web..

Read more: Mozilla
QR: Paladin

Posted via email from Jasper-net

MonoDevelop 2.6 is out

|
=md26-ChangesView.png

Lluis just released the final version of MonoDevelop 2.6.

This release packs a lot of new features, some of my favorite features in this release are:

    Git support.
        It not only provides the regular source code control commands, it adds full support for the various Git idioms not available in our Subversion addin.
        Based on Java's JGit engine
        Ported to C# using db4Object's sharpen tool. Which Lluis updated significantly
        Logging and Blaming are built into the editor.


Read more: Personal blog of Miguel de Icaza
QR: Sep-07.html

Posted via email from Jasper-net

WPF Tutorial Published [HEB]

|

Source Control Done Right

| Wednesday, September 7, 2011
Your introduction to source control probably was a lot like mine: “here’s how you open SourceSafe, here’s your login, and here’s how you get your files... now get to work.”

For the most part, that works just fine. We’re already familiar with the nature of files and directories, so introducing the concepts of checking-in and checking-out aren’t a huge leap. Repositories, merging, and committing become second-nature just as easily.

But there’s a whole lot more to source control than just that. And, as someone in a fairly unique position of working with virtually every source control system out there (a hazard of the day job: BuildMaster needs to integrate with them all), I’ve learned that there are far more similarities than differences.

This especially holds true with the latest breed of distributed version control systems. Sure, certain operations may be easier to do – but if they’re the wrong thing to do, then it’s that much easier to make mistakes.
Back to Basics

If we’re going to take a good, hard look at source control, let’s do something we should have all done a long time ago, before even touching a source control client. Let’s go back to the basics. The very basics.

dim1.png


It all starts with bits: an unfathomably large and virtually endless stream of 1’s and 0’s. Whether it’s the 16,000,000 on a 3.5”floppy disk or the 4,000,000,000,000 on a desktop hard drive, bits represent a line – the first dimension – and, in and of themselves, bits are entirely meaningless.

That’s where the second dimension – the file system – comes in.

dim2.png

Read more: The daily WTF
QR: Source-Control-Done-Right.aspx

Posted via email from Jasper-net

20 Famous websites vulnerable to Cross Site Scripting (XSS) Attack

|
Most of the biggest and Famous sites are found to be Vulnerable to XSS attack . Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Recently, vulnerabilities of this kind have been exploited to craft powerful phishing attacks and browser exploits. Cross-site scripting was originally referred to as CSS, although this usage has been largely discontinued.

Hacker with code name "Invectus" list some such famous sites with XSS vulnerability as listed below :

1.) http://video.state.gov/en/search/img-srchttp-i55tinypiccom-witu7dpng-height650-width1000/Ij48aW1nIHNyYz0iaHR0cDovL2k1NS50aW55cGljLmNvbS93aXR1N2QucG5nIiBoZWlnaHQ9IjY1MCIgd2lkdGg9IjEwMDAiPg%3D%3D

2.) http://www.telegraph.co.uk/search/?queryText=%22%3E%3Cimg%20src=%22http://i55.tinypic.com/witu7d.png%22%20height=%22650%22%20width=%221000%22%3E

Read more: Hacker news
QR: 20-famous-websites-vulnerable-to-cross.html

Posted via email from Jasper-net

netsniff-ng

|
logo.pnglogo2.png

Abstract

netsniff-ng is a free, performant Linux network analyzer and networking toolkit.

The gain of performance is reached by zero-copy mechanisms, so that the kernel does not need to copy packets from kernelspace to userspace and vice versa.

For this purpose, the netsniff-ng toolkit is libpcap independent, but nevertheless supports the pcap file format for capturing, replaying and performing offline-analysis of pcap dumps. Furthermore, we are focussing on building a robust, clean and secure analyzer and utilities that complete netsniff-ng as a support for network development, debugging or network reconnaissance.

netsniff-ng consists of much more than only a network analyzer. The following utilities of the toolkit are in development for 0.5.6.0:

    netsniff-ng, the zero-copy analyzer, (pcap) capturing and replayer itself
    trafgen, a zero-copy traffic generator
    bpfc, a Berkeley Packet Filter (BPF) compiler
    ifpps, a top-like kernel networking statistics tool
    curvetun, a lightweight multiuser IP tunnel based on elliptic curve cryptography (ECC)
    ashunt, an Autonomous System (AS) trace route utility


Read more: netsniff-ng
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.netsniff-ng.org/

Posted via email from Jasper-net

What I learned raising $1 million for my startup

|
Jessica Mah is the founder and CEO of InDinero, a San Francisco startup that makes Web-based financial tracking tools for small businesses. A version of this article first appeared in her blog, Jessica Mah Meets World.

Over the past few weeks, I've noticed that companies known for raising absurd amounts of money are often founded by entrepreneurs who have succeeded multiple times before.

Off the top of my head, there's Color ($41 million), Flipboard (a $10 series A round and a $50 million follow-on) and AdKeeper (an $8 million first round and $35 million more four months later). Plenty of others raised $5 million or more before even launching.

At first I thought this was crazy, but now I finally understand. Building a good software firm is far more expensive than people think. Sure, you can start with five guys sitting in a living room coding, and that costs virtually nothing. That's how my company, InDinero, was just a year ago. We figured that everyone raising more than $1 million pre-launch was crazy.

Boy were we wrong. Turns out it costs a lot of money to build a real business. You have office expenses, server costs, and employees who would rather not live off ramen-level salaries. Building features takes 3X longer when you're no longer incubating -- because you care about testing and reliability, you're dividing your time between building features and assisting existing customers, and you now care about writing maintainable code.

When I first went out to raise InDinero's angel round, we were looking for $250,000 to $500,000. But since we got a lot of competition from investors for our deal, we decided we'd raise more. Before we knew it, we were up to $1 million in commitments -- more cash than we knew what to do with.


Read more: CNNMoney
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://money.cnn.com/2011/08/22/technology/startups/raising_money/

Posted via email from Jasper-net

Writing Metadata in Contracts of MEF

|
Tweet

MEF Supports metadata to be passed in addition to Contracts. As we have already discussed some of the interesting catalogs present in MEF base class library, lets take a look how metadata can be transferred in the MEF system. We generally use MetaData to determine something regarding the type. Probably when the actual object is unavailable.  Lazy implementation is the ideal scenario when use of MetaData is often required.

MEF shares metadata in terms of a special attribute named ExportMetadataAttribute. This attribute supports a Key value collection where the key is specified as string and the value is an object.  While dealing with UserInterface we often use Metadata to determine where exactly the plugin interface needs to be loaded.

The Caveats of Metadata is such that the Exporter exports the metadata information about the type from it, and the importer can look into the metadata even though the actual object does not exists or created (using Lazy).

Lets look how to work with Metadata:

[Export]
[ExportMetadata("Name", "Plugin from Plugin2")]
public string GetName()
{
this.ExportName = "Plugin from Plugin2";

if (this.MyActionDelegate != null)
this.MyActionDelegate(this.ExportName);

return this.ExportName;
}

Thus you can see the Plugin is exporting a string value called Name as Metadata. Now when the object is imported, you can get the Metadata information from ImportDefinations.

DirectoryCatalog dcatalog = new DirectoryCatalog("plugins", "*.dll");

AssemblyCatalog acatalog = new AssemblyCatalog(Assembly.GetExecutingAssembly());

AggregateCatalog catalog = new AggregateCatalog(dcatalog, acatalog);


Read more: Daily .Net Tips
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://dailydotnettips.com/2011/09/05/writing-metadata-in-contracts-of-mef/

Posted via email from Jasper-net

Snoop

|
This is the CodePlex project for Snoop ... the WPF utility by Pete Blois and now maintained by Cory Plotts that allows you to spy/browse the visual tree and change properties ... amongst other things.
Announcing Snoop v2.7.0!

Important Note: If you were one of the first 100 people to download the new Snoop 2.7 update, you will need to download it again, uninstall, & then reinstall. We found and fixed a crash with delving collections!

It's been a while since the last release, but hopefully, you're going to love this one.

Most notably, Anvaka (Andrei Kashcha) has added support for dragging and dropping some crosshairs onto the application that you want to Snoop or Magnify. This means that you no longer have to wait for that combo box to refresh! In fact, I have removed the automatic refresh of the combo box on startup.

Another major improvement is that Snoop can now handle applications with multiple dispatchers.

Go to the release page for more info. A blog post will be forthcoming.
Documentation on How to Use Snoop

I just copied the documentation from Pete Blois’ Snoop page to Documentation area here on CodePlex. I will be soon updating it with current screen shots and information.

I have also started a blog series on Snoop Tips & Tricks. Here is a link to the first one (from where you can get to the others as they appear).


Read more: Codeplex
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://snoopwpf.codeplex.com/

Posted via email from Jasper-net

Use of ImportConstructor to inject Constructor code in MEF

|
Just like what I have talked for so long in my blog entries about Import, ImportConstructor is another attribute that you can annotate only for a constructor. Sometimes it is needed to have some kind of Dependency that needs to be injected while constructing the object.  In case of a normal Import, the Property is set using Default Constructor, and will be Composed when it is being used, but what if, you need certain kind of rules while creating the object?

ImportConstructor allows you to annotate a constructor in such a way that the Composer will call it when it creates an object of that class.


 Lets see the code how it works :

public class ExportContainer
{

   [ImportingConstructor]
   public ExportContainer([Import(AllowDefault=true)]Action specialDelegate)
   {
      this.MyActionDelegate = specialDelegate;
    }

   public string ExportName { get; set; }

   [Export]
   [ExportMetadata("Name", "Plugin from Plugin1")]
   public string GetName()
   {
      this.ExportName = "Plugin from Plugin1";

    if (this.MyActionDelegate != null)
       this.MyActionDelegate(this.ExportName);

Read more: Daily .Net Tips
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://dailydotnettips.com/2011/09/06/importconstructor-to-inject-constructor-mef/

Posted via email from Jasper-net

Structs in C#

|
Defining a struct is very similar to defining a class. The following video clip (hebrew) explains how to define a new struct and overviews the differences between structs and classes.

Read more: Life Michael
QR: structs-in-c.aspx

Posted via email from Jasper-net

Comodo hacker: I hacked DigiNotar too; other CAs breached

|
The hack of Dutch certificate authority DigiNotar already bore many similarities to the break-in earlier this year that occurred at a reseller for CA Comodo. Bogus certificates were issued for webmail systems, which were in turn used to intercept Web traffic in Iran. Another similiarity has since emerged: the perpetrator of the earlier attacks is claiming responsibility for the DigiNotar break-in.

Calling himself ComodoHacker, the hacker claims that DigiNotar is not the only certificate authority he has broken into. He says that he has broken into GlobalSign, and a further four more CAs that he won't name. He also claimed that at one time he had access to StartCom.

The statement did not provide any specific details about how the hack was performed, offering only a high-level description of some of the things he did: he found passwords, used 0-day exploits, penetrated firewalls, and bypassed the cryptographic hardware that DigiNotar was using to gain remote access to machines. He said that a more detailed explanation would follow, when he had the time, and that it would serve as useful guidance for Anonymous and LulzSec. While lacking in detail, the hacker did include an Administrator-level username and password apparently used on DigiNotar's network. DigiNotar has not confirmed the authenticity of this information.

As with the statements issued after the Comodo hack, the DigiNotar statement was clear about one thing: the sophistication of the hack and the great skill it took.

ComodoHacker also justifed his attack on the Dutch certificate authority by blaming the Dutch for the murder of 8,000 muslims at Serbian hands in Srebrenica; "It's enough for Dutch government for now, to understand that 1 Muslim soldier worth 10000 Dutch government."

Meanwhile, the fallout from the hack continues. DigiNotar has, in effect, lost its status as a trusted root certificate authority. Its certificates have been blacklisted by Microsoft, Google, Mozilla, and Apple.

Read more: ArsTechnica
QR: comodo-hacker-i-hacked-diginotar-too-other-cas-breached.ars

Posted via email from Jasper-net

Used to be addicted to Command and Conquer and C&C:Red Alert? What if I was to tell you about a free, open source clone? And that it was written in C#?

|
image%25255B8%25255D.png?imgmax=800

Welcome Back, Commander

OpenRA is a Libre/Free Real Time Strategy game engine supporting early Westwood games like Command & Conquer and Command & Conquer: Red Alert.

News

Release 20110906, 05/09/2011 1:43pm
We have just unleashed release-20110906, based on playtest-20110904
This release includes a totally reworked UI for C&C, many new maps, and many bugfixes.
Stay tuned for our next release which will add some really great new features!
The full user-friendly changelog can be found on GitHub.


Read more: Greg's Cool [Insert Clever Name] of the Day
Read more: OpenRA
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://openra.res0l.net/

Posted via email from Jasper-net

#380 – The Frame Control Can Host Web Content

| Tuesday, September 6, 2011
001-snoopyvs.png?w=630&h=463

You can use the Frame control to host web content by setting its Source property to a valid URL.  Note that the control can also display standard web navigation controls.

    <Grid>
        <Grid.ColumnDefinitions>
            <ColumnDefinition/>
            <ColumnDefinition/>
        </Grid.ColumnDefinitions>

        <Frame Grid.Column="0" Source="http://en.wikipedia.org/wiki/Snoopy"
               NavigationUIVisibility="Visible"/>

        <Frame Grid.Column="1" Source="http://acepilots.com/wwi/ger_richthofen.html"
               NavigationUIVisibility="Visible"/>
    </Grid>


Read more: 2,000 Things You Should Know About WPF
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://wpf.2000things.com/2011/09/06/380-the-frame-control-can-host-web-content/

Posted via email from Jasper-net

Solving the SSL CA Debacle Using Multi-Signed Certs

|
The recent Comodo and DigiNotar breaches have proven that the HTTPS trust model is broken. Every browser trusts the opinion of hundreds of Certificate Authorities. If a single one of those CA's is breached by a hacker, government, or mischievous employee, then you can't be sure that the HTTPS connection you're making isn't being intercepted. To make the problem worse, if a CA (Comodo for example) has a very large share of the SSL market, the browsers can't just "untrust" them; millions of non-technical users would suddenly start getting HTTPS errors. My proposal addresses both the issues of forgery, and the issues of CAs who are too big to fail.
The concept is quite simple. The implementation, a little more involved. Instead of requiring that a certificate is signed by a single trusted authority, require multiple independent trusted signatures.

Forgeries

If a browser requires that a certificate is signed by at least N trusted authorities (three maybe?), then getting forgeries signed suddenly become much more difficult. There is the problem that some states might be able to compel three different CA's under their own influence to sign a forged certificate. This could be addressed by requiring that a certificate is signed by authorities in different states. Rather than limiting this issue to "states", each CA could be assigned (in the browser) a list of entities under whos influence they fall. Each certificate would then have to be signed by a minimum of N authorities who don't have any overlapping influences.

Too big to fail?

If a browser requires a certificate to be signed by a minimum of three authorities, and people get their certificate signed by four or even five authorities, then no CA is "too big to fail" anymore. Browsers can remove even the largest CA from their trusted root list, and affected certificates will still have enough signatories to be trusted. If forged certificates are found in the wild that are signed by three different CA's, a temporary "influence" relationship could be created between the three CAs to specify that they have all been compromised by the same attacker.


Read more: Grepular
QR: Solving_the_SSL_CA_Debacle_Using_Multi-Signed_Certs

Posted via email from Jasper-net

WCF Exception: Security settings for this service require 'Anonymous' Authentication but it is not enabled for the IIS application that hosts this service

|
Windows authentication is well suited for scenarios in which your users have domain credentials. Using basicHttpBinding with TransportCredentialOnly security mode option, users are authenticated by using Windows authentication.

Here is an article described how to implement this.

How to: Use basicHttpBinding with Windows Authentication and TransportCredentialOnly in WCF from Windows Forms

http://msdn.microsoft.com/en-us/library/ff648505.aspx

These two blogs written by well-known WCF experts described the same scenario as well.

Preventing Anonymous Access

http://blogs.msdn.com/b/drnick/archive/2007/03/23/preventing-anonymous-access.aspx

http://blogs.msdn.com/b/wenlong/archive/2006/05/18/600603.aspx

However, customer got follow error using .Net 4.0 even follow the exactly same steps.

[NotSupportedException: Security settings for this service require 'Anonymous' Authentication but it is not enabled for the IIS application that hosts this service.]

   System.ServiceModel.Activation.HostedAspNetEnvironment.ValidateHttpSettings(String virtualPath, Boolean isMetadataListener, Boolean usingDefaultSpnList, AuthenticationSchemes& supportedSchemes, ExtendedProtectionPolicy& extendedProtectionPolicy, String& realm) +194425

   System.ServiceModel.Channels.HttpChannelListener.ApplyHostedContext(String virtualPath, Boolean isMetadataListener) +104

   System.ServiceModel.Channels.HttpTransportBindingElement.BuildChannelListener(BindingContext context) +156

   System.ServiceModel.Channels.Binding.BuildChannelListener(Uri listenUriBaseAddress, String listenUriRelativeAddress, ListenUriMode listenUriMode, BindingParameterCollection parameters) +166


Read more: AsiaTech: Microsoft APGC Internet Developer Support Team
QR: security-settings-for-wcf-service-requires-anonymous-authentication-but-doesn-t-work-on-iis.aspx

Posted via email from Jasper-net

Android Usb Host Tutorial - AdbTest

|
usbhost_3.jpg

Android 3.1 and above devices support Usb host mode. With this feature you can connect to regular client usb devices. Some devices are automatically recognized by the OS and are simple to work with, such as: keyboard, mouse or storage devices.

Other devices require the developer to implement the specific protocol. Depending on the device and the documentation available this can be a feasible task.

This example which is based on Google's AdbTest example, connects two Android devices with a Usb cable. The host device reads the client device logs. This is done by implementing one feature of Adb debugging, similar to the Usb debugging driver.

Read more: Anywhere software forum
QR: 11289-android-usb-host-tutorial-adbtest.html

Posted via email from Jasper-net