This is a mirror of official site: http://jasper-net.blogspot.com/

coreboot

| Saturday, December 17, 2011
Chip_cb.png

coreboot is a Free Software project aimed at replacing the proprietary BIOS (firmware) found in most computers. coreboot performs a little bit of hardware initialization and then executes additional boot logic, called a payload.
With the separation of hardware initialization and later boot logic, coreboot can scale from specialized applications that run directly from firmware, run operating systems in flash, load custom bootloaders, or implement firmware standards, like PC BIOS services or UEFI. This allows for systems to only include the features necessary in the target application, reducing the amount of code and flash space required.

coreboot currently supports over 230 different mainboards. Check the Support page to see if your system is supported.

Read more: coreboot 
QR: Welcome_to_coreboot

Posted via email from Jasper-net

Bochs

|
lgban.gif

Welcome to the Bochs IA-32 Emulator Project

    Bochs is a highly portable open source IA-32 (x86) PC emulator written in C++, that runs on most popular platforms. It includes emulation of the Intel x86 CPU, common I/O devices, and a custom BIOS. Currently, Bochs can be compiled to emulate a 386, 486, Pentium/PentiumII/PentiumIII/Pentium4 or x86-64 CPU including optional MMX, SSEx and 3DNow! instructions.
Bochs is capable of running most Operating Systems inside the emulation including Linux, DOS, Windows® 95/98 and Windows® NT/2000/XP or Windows Vista. Bochs was written by Kevin Lawton and is currently maintained by this project.

    Bochs can be compiled and used in a variety of modes, some which are still in development. The 'typical' use of bochs is to provide complete x86 PC emulation, including the x86 processor, hardware devices, and memory. This allows you to run OS's and software within the emulator on your workstation, much like you have a machine inside of a machine. For instance, let's say your workstation is a Unix/X11 workstation, but you want to run Win'95 applications. Bochs will allow you to run Win 95 and associated software on your Unix/X11 workstation, displaying a window on your workstation, simulating a monitor on a PC. 

Read more: Bochs 
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://bochs.sourceforge.net/

Posted via email from Jasper-net

Visual Studio(R) 2010 Web Deployment Projects - RTW

| Thursday, December 15, 2011
Overview

Visual Studio 2010 Web Deployment Projects is an add-in to Visual Studio 2010 which provides compatibility with both Visual Studio 2008 Web Deployment Projects and Visual Studio 2005 Web Deployment Projects. Web Deployment Projects provides developers with advanced compilation options. A Web Deployment Project is an extensible msbuild script, enabling web developers to create pre-build and post-build actions.

Web Deployment projects do not change the way Visual Studio 2010 Web Sites or Web Application Projects build. Instead, they take an existing Visual Studio Web project as input and generate a precompiled Web as an output. A Web Deployment Project does not change the files in the source Web site project in any way.

Visual Studio 2010 Web Deployment Projects has all the functionality that Visual Studio 2008 Web Deployment Projects had. Developers can read more about this core functionality at Using Web Deployment Projects with Visual Studio 2005.

Read more: MS Download
QR: details.aspx?displaylang=en&id=24509

Posted via email from Jasper-net

NME

|
Header.jpg

NME provides an API that is similar to Flash's API, written for a language called Haxe.

Haxe is an easy language to learn, especially if you are familiar with ECMAscript languages like Actionscript or Javascript. In addition to language basics like functions and classes, Haxe supports advanced features like generics, inlining, macros, templates, iterators, conditional compilation and more.

It is simple to get started, so feel free to try one of the beginner tutorials to learn how you can display a bitmap, play sound or trigger animations in your own project.

Read more: NME
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=www.haxenme.org/

Posted via email from Jasper-net

T-SQL Tuesday #25 : T-SQL Tips 'n' Tricks

|
This month's T-SQL Tuesday is being hosted by Allen White (@SQLRunr) and is about sharing your T-SQL tips and tricks. Since I know many people will share their T-SQL magic and wizardry, I thought I would share a couple of productivity tips - so still T-SQL related, but more how to take advantage of some features in SSMS.

Drag column list onto your query window

Whenever I give my Bad Habits to Kick presentation, I remind people that - even if they're not using 3rd party code completion tools (many of which offer SELECT * expansion) - there's little excuse to use SELECT *. This is because Management Studio makes it very easy to list out all of your columns in one motion. I'm always amazed when I ask how many people didn't already know about this - and most times it's more than half the room.
The process is quite simple - expand your table, click on the Columns node, drag it onto your query window and let go:

tst-1.png

Now, it's probably not in the exact format you want, it won't properly delimit any [keyword] or [reserved word] you use for a column name, and you'll have to do this multiple times when you're performing a join (and you'll have to add your own table/alias prefixes to each column as well). But I'd rather spend time using TAB and ENTER to correct formatting than to try and type out all the column names individually.
 

Use snippets
 
If you find yourself writing the same type of code over and over again, the new snippets feature in SQL Server 2012 will likely be very useful for you. What does this have over templates? For one, I find it much easier to use once you have your snippets created. There is no hokey VB6-style dialog to perform token replacements, and you can actually store all your custom snippets in a network location - so if you want to enforce coding standards you have a fighting chance by pointing everyone's SSMS at the same snippet location. I'll be honest, though, setting up the template is a bit of a pain - you need to hand-massage XML manually because as of yet there is no easy way to generate these from within Management Studio. But once they're in place, they're very easy to work with. Just right-click within the query window, choose "Insert Snippet", and follow the rabbit:


Read more: THE SQL Server Blog Spot on the Web
QR: t-sql-tuesday-25-t-sql-tips-n-tricks.aspx

Posted via email from Jasper-net

13 million MapleStory players at risk after hack - casting a shadow over Nexon's IPO

|
13.2 million players of Maple Story had their names, usernames, and encrypted resident registration numbers and passwords acquired by hacker

Read more: DATALOSSdb
QR: 5091-13-2-million-players-of-maple-story-had-their-names-usernames-and-encrypted-resident-registration-numbers-and-passwords-acquired-by-hacker

Posted via email from Jasper-net

Reddit, I just came across a list of about 47k emails and passwords.

|
47,000 working MSN and Hotmail e-mail addresses and passwords found in phishing attempt attachment

Read more: DATALOSSdb
QR: 4998-47-000-working-msn-and-hotmail-e-mail-addresses-and-passwords-found-in-phishing-attempt-attachment

Posted via email from Jasper-net

Social Network site FindFriendz.com Hacked by sn3Ak3r , 57K+ Users Info Leaked

|
57,721 usernames and clear-text passwords acquired by hacker and posted on Internet

Read more: DATALOSSdb
QR: 4985-57-721-usernames-and-clear-text-passwords-acquired-by-hacker-and-posted-on-internet

Posted via email from Jasper-net

Ultimate Bet Player Data Leaked

|
3.5 million Ultimate Bet player records (name, address, e-mail address, phone number, DOB, account balance, IP address, deposit method, Ultimate Bet account number, affiliate information, blacklist status, encrypted password) obtained and leaked online

Read more: DATALOSSdb
QR: 5159-3-5-million-ultimate-bet-player-records-name-address-e-mail-address-phone-number-dob-account-balance-ip-address-deposit-method-ultimate-bet-account-number-affiliate-information-blacklist-status-encrypted-password-obtained-and-leaked-online

Posted via email from Jasper-net

FREE: 5 Professional WPF Themes

| Wednesday, December 14, 2011
ThemeMultipleWeb.png

Everyone loves free things! With the recent release of WPF Elements 5 we decided to beef up the free WPF control pack even more. Now in addition to the already free WPF controls you will find 5 professionally built themes to bring your applications to life.

5 superbly crafted themes
We have poured months of effort into creating pixel perfect themes both for the standard WPF controls and the WPF Elements controls. There’s Office Blue, Office Black, Office Silver, Expression (Alloy) and Expression Light (Alloy Light). You’ll be impressed by how easy these themes are to add to your project and your users will be really impressed at how great the application looks.

Read more: Mindscape blog
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.mindscapehq.com/blog/index.php/2011/12/13/free-5-professional-wpf-themes/

Posted via email from Jasper-net

Silverlight 5 Available for Download Today

|
Today, we’re happy to announce the release of Silverlight 5. Silverlight is part of a rich offering of technologies from Microsoft helping developers deliver applications for the web, desktop and mobile devices. Download Silverlight 5, a free plug-in less than 7 MB in size that can be installed in less than 10 seconds.

New features in Silverlight 5 include Hardware Decode of H.264 media, which provides a significant performance improvement with decoding of unprotected content using the GPU; Postscript Vector Printing to improve output quality and file size; and an improved graphics stack with 3D support that uses the XNA API on the Windows platform to gain low-level access to the GPU for drawing vertex shaders and low-level 3D primitives.

In addition, Silverlight 5 extends the ‘Trusted Application’ model to the browser for the first time. These features, when enabled via a group policy registry key and an application certificate, mean users won’t need to leave the browser to perform complex tasks such as multiple window support, full trust support in browser including COM and file system access, in browser HTML hosting within Silverlight, and P/Invoke support for existing native code to be run directly from Silverlight.


Read more: The Silverlight Blog
Read more: MS Downloads
QR: ?LinkId=149156

Posted via email from Jasper-net

Open Source Licenses

|
First some general points. These points either directly relate to the following table or are necessary to understand the whole Open Source philosophy. So, in no particular order:

    When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library.

    The “Proprietary Software linking” refers to linking or closed sourced applications/libraries with applications/libraries licensed under one of the following Open Source licenses.

    By “the Work” in the “Distribution of 'the Work''” I mean a combination of a software with the library or application licensed under one of the following licenses

    “Redistributing of the code with changes” refers to the act of redistributing a modified app/library based on the app/library licensed under the given license


License

Proprietary Software linking

Distribution of “the Work”

Redistributing of the code with changes

Compatible with GNU GPL

GPL

Not allowed (since the linked software is considered a whole)

Not allowed with software whose license is not GNU GPL compatible.

Only if the derivative is GNU GPL.

Yes

LGPL

Allowed (since the software that links to the library is not considered a derivative work)

Allowed with some restrictions: You have to provide source code of the distributed LGPL library with (if any) modifications, changes to the LGPL library should be allowed to third parties and if BC your app/lib should still work with the modified LGPL lib/app.

Only if the derivative is GNU LGPL or GNU GPL.

Yes

Apple Public

Allowed (the requirements of Apple License apply only to the Covered Code)

Allowed.

Only under Apple Public license.

No

Apache Public

Allowed.

Allowed.

Allowed (as long as the name “Apache” isn't used in the name of the derivative work)

No

Artistic 2.0

Allowed.

Allowed (as long as C or perl subroutines supplied by you and linked into the Covered Code are not considered a part of the Covered Code)

Allowed if one of the following is true:

a) modifications are freely available,

b) one uses the modified package only within corporation or organization,

c) rename any non-standard executables,

d) make other distribution arrangements with the Copyright Holder

And the name of the Copyright Holder may not be used to promote derived products without his/hes written permission.

Yes [1]

BSD

Allowed.

Allowed.

Allowed.

Only the modified BSD license is compatible with GPL. The original BSD license is not compatible because it includes a weird advertising clause. [2]

(more...)

Read more: KDE.org
QR: licenses_summary.html

Posted via email from Jasper-net

NHibernate Mapping Generator

|
Download?ProjectName=nmg&DownloadId=158295

Project Description

A simple utility to generate NHibernate mapping files and corresponding domain classes from existing DB tables.
Features:
1. Supports SqlServer and Oracle and Postgres.
2. Can generate both .hbm.xml and Fluent style of mapping files.
3. Has lots of preferences to control the property naming conventions.
4. Generates both Domain Entity and NHibernate mapping files.
5. Can generate one table at a time or script entire DB in one go. (It can generate mapping for around 800 tables in under 3 minutes on my moderately powered laptop)
6. Its super fast and free. No licensing restrictions.

Please raise any feature requests and bugs in the Issue Tracker.

Read more: Codeplex
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://nmg.codeplex.com/

Posted via email from Jasper-net

NHibernate Mapping Generator with SQLite

|
Project Description
The project is based on the NHibernate Mapping Generator change set 70604 (http://nmg.codeplex.com/). The only difference is that SQLite is added as a database choice.

No bug fixes or other enhancements were made.

Let me know if the "HasMany" is assigning the wrong key column

Read more: Codeplex
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://nmgs.codeplex.com/

Posted via email from Jasper-net

December 2011 Security Release ISO Image

|
This DVD5 ISO image file contains the security updates for Windows released on Windows Update on December 13, 2011.

Read more: MS Download
QR: details.aspx?id=28485&

Posted via email from Jasper-net

4klang

|
Brief

4klang is a modular software synthesizer package intended to easily produce music for 4k intros. It consists of a VSTi plugin + example songs/instruments as well as an example C++ project showing how to include it in your code. 4klang was developed by Dominik ´Gopher´ Ries and Paul ´pOWL´ Kraus of Alcatraz.
General information and usage

You may freely use 4klang in your productions, but before starting to use 4klang please refer to the readme.txt in the package for some general usage advices. For some in depth information on how 4klang works and its history up to the first public release please refer to Zine#14.


Read more: 4klang
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://4klang.untergrund.net/

Posted via email from Jasper-net

Crinkler

|
Introduction
Crinkler is an executable file compressor (or rather, a compressing linker) for Windows specifically targeted towards executables with a size of just a few kilobytes. As of 2011, it is the most widely used tool for compressing 4k intros.

Crinkler is being developed by Rune L. H. Stubbe (Mentor/TBC) and Aske Simon Christensen (Blueberry/Loonies).

Read more: Crinkler
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.crinkler.net/

Posted via email from Jasper-net

Integrating with COM Components In C#

|
Introduction

The CLR provides support both for exposing C# objects as COM objects and for using COM objects from C#. Additionally, CLR components can make use of COM+ services and can be used as configured components by CLR and classic COM applications.
Binding COM and C# Objects

Interoperating between COM and C# works through either early or late binding. Early binding allows you to program with types known at compile time, while late binding forces you to program with types via dynamic discovery, using reflection on the C# side and IDispatch on the COM side.

When calling COM programs from C#, early binding works by providing metadata in the form of an assembly for the COM object and its interfaces. TlbImp.exe takes a COM type library and generates the equivalent metadata in an assembly. With the generated assembly, it's possible to instantiate and call methods on a COM object just as you would on any other C# object.

When calling C# programs from COM, early binding works via a type library. Both TlbExp.exe and RegAsm.exe allow you to generate a COM type library from your assembly. You can then use this type library with tools that support early binding via type libraries such as Visual Basic 6.
Exposing COM Objects to C#

When you instantiate a COM object, you are actually working with a proxy known as the Runtime Callable Wrapper (RCW). The RCW is responsible for managing the lifetime requirements of the COM object and translating the methods called on it into the appropriate calls on the COM object. When the garbage collector finalizes the RCW, it releases all references to the object it was holding. For situations in which you need to release the COM object without waiting for the garbage collector to finalize the RCW, you can use the static ReleaseComObject method of the System.Runtime.InteropServices.Marshal type.

The following example demonstrates how to change your MSN Instant Messenger friendly name using C# via COM Interop:


// RenameMe.cs - compile with:
// csc RenameMe.cs /r:Messenger.dll
// Run RenameMe.exe "new name" to change your name
// as it is displayed to other users.
// Run TlbImp.exe "C:\Program Files\Messenger\msmsgs.exe"
// to create Messenger.dll
using System;
using Messenger;
class MSNFun {

static void Main(string[ ] args) {
MsgrObject mo = new MsgrObject( );
IMsgrService ims = mo.Services.PrimaryService;
ims.FriendlyName = args[0];
}
}

You can also work with COM objects using the reflection API. This is more cumbersome than using TlbImp.exe, but is handy in cases in which it's impossible or inconvenient to run TlbImp.exe. To use COM through reflection, you have to get a Type from Type.GetTypeFromProgID() for each COM type you want to work with. Then, use Activator.CreateInstance() to create an instance of the type. To invoke methods or set or get properties, use the reflection API:

using System;
using System.Reflection;
public class ComReflect {

public static void Main( ) {
object obj_msword; // Microsoft Word Application
Type wa = Type.GetTypeFromProgID("Word.Application", true);

// Create an instance of Microsoft Word
obj_msword = Activator.CreateInstance(wa);

// Use the reflection API from here on in...

}
}

Exposing C# Objects to COM

Just as an RCW proxy wraps a COM object when you access it from C#, code that accesses a C# object as a COM object must do so through a proxy as well. When your C# object is marshaled out to COM, the runtime creates a COM Callable Wrapper (CCW). The CCW follows the same lifetime rules as other COM objects, and as long as it is alive, a CCW maintains a traceable reference to the object it wraps. This keeps the object alive when the garbage collector is run.

The following example shows how you can export both a class and an interface from C# and control the Global Unique Identifiers (GUIDs) and Dispatch IDs (DISPIDs) assigned. After compiling IRunInfo and StackSnapshot, you can register both using RegAsm.exe.

Read more: Google cache
QR: IntegratingCOMComp_CSharp.aspx

Posted via email from Jasper-net

MonoGame - Write Once, Play Everywhere

| Sunday, December 11, 2011
Download?ProjectName=monogame&DownloadId=236425&Build=18301

Release Notes
MonoGame Takes Tentative Steps into 3D : MonoGame 2.1 Announced

MonoGame is an open source implementation of the XNA APIs that allows developers to build 2D games that run on Android, iPhone, iPad, Mac, Linux and Windows using the same code base, or reusing existing XNA code that runs on Xbox 360 or Windows Phone 7.
The MonoGame 2.1 release is an update to fix bugs, implement optimisations and to add key features. In this release GamePad support was added and so was DrawUserPrimitives. There were also several bug fixes across all platforms.
To show off the DrawUserPrimitives we ported an old XNA 2 demo called VectorRumble to MonoGame () and also created a demo that shows off the first tentative steps into 3D (). The VectorRumble demo also shows off the improvements to the wavebank implementations.
The latest framework sources can be downloaded from : http://github.com/mono/MonoGame.
A group of multi-platform XNA Samples can be downloaded from : http://github.com/CartBlanche/MonoGame-Samples

ROADMAP
The 2.x series will be released frequently to provide bug fixes and performance optimisations.
The 3.x series will extend MonoGame with support for the XNA 3D APIs as well as something we are working on, which we believe the whole MonoGame will love.

Read more: Codeplex
QR: 78301

Posted via email from Jasper-net

What does it mean when my program exits with the message "This application has requested the Runtime to terminate it in an unusual way"?

|
You're running your program, and then it suddenly exits with the message This application has requested the Runtime to terminate it in an unusual way. What happened?

That message is printed by the C runtime function abort, the same function that also causes your program to terminate with exit code 3.

Your program might call abort explicitly, or it might end up being called implicitly by the runtime library itself.

    The assert macro calls abort when an assertion fails.
    By default, the terminate function calls abort.

Read more: The old new thing
QR: 10245330.aspx

Posted via email from Jasper-net

Games, apps and runtimes come to Native Client

|
Since we launched Native Client late last summer, our team has been working hard to make the technology more useful to developers. Yesterday at an event held at Google we shared the progress we’ve made towards this goal and showcased work from some of the early adopters of the technology, including Square Enix, Unity Technologies, and Bungie.

One code base for all OSs
In September, we started supporting a set of core Pepper interfaces, suited for 2D graphics, audio, and compute-intensive applications. Since that release, we’ve shipped additional APIs and capabilities, providing native code with more of the capabilities available from JavaScript. These include hardware-accelerated 3D graphics via OpenGL ES 2.0, a mouse lock API, a full-screen API, and much more. One example of the kind of experience Native Client can currently support is Bastion, an award-winning role-playing game from Supergiant Games. Previously limited to Microsoft Windows® and Xbox® systems, the Native Client port of Bastion allows Supergiant to reach users on all popular desktop operating systems, with the safety and simplicity of the web.

Easy porting of previous work
If you have existing code bases in C, C++, or C#, Native Client now allows you to port your existing apps to the web while maintaining just one code base. This was particularly appealing to Spacetime Studios. They ported their multiplayer online game Star Legends to the web in less than two weeks from an existing code base of more than half a million lines of code. The side benefit of being able to maintain their existing development and testing infrastructure further accelerated their delivery of a shipping title.

More choices of programming languages
The community is actively involved in Native Client, porting some of the most popular application middleware. Ports include Unity and Moai game engines, programming language environments Mono and Lua, audio middleware such as fmod and Wwise, as well as the Bullet physics engine. These Native Client ports make the web more accessible to hundreds of thousands of application developers. At the event, we showcased upcoming applications from Heartwood, Silvertree, Exit Strategy, and Dedalord, who used those tools to bring their apps to the web with very little effort. We’ll continue to work with the community to get even more languages and middleware systems ported to Native Client.

Read more: Google code
QR: games-apps-and-runtimes-come-to-native.html

Posted via email from Jasper-net

Microsoft(R) Silverlight(R) 5 SDK

|
Overview

The Microsoft® Silverlight® 5 SDK contains online documentation, online samples, libraries and tools for developing Silverlight 5 applications.
Usage of the SDK is subject to the SDK License (included in the package).

Read more: MS Download
QR: details.aspx?id=28359&

Posted via email from Jasper-net

Microsoft(R) Silverlight(R) 5 Tools for Visual Studio(R) 2010 SP1

|
Overview

This package is an add-on for Visual Studio® 2010 SP1 to provide tooling for Microsoft® Silverlight® 5 and Microsoft® WCF RIA Services V1.0 SP2 . It can be installed on top of either Visual Studio® 2010 SP1 or Visual Web Developer 2010 Express Service Pack 1. It extends existing Microsoft® Silverlight® 4 features and multitargeting capabilities in Visual Studio® 2010 SP1 to also create applications for Microsoft® Silverlight® 5 using C# or Visual Basic.

This download will install all components necessary for Microsoft® Silverlight® 5 and Microsoft® WCF RIA Services V1.0 SP2 development:

    Silverlight 5 Developer Runtime
    Silverlight 5 SDK (software development kit)
    Update for Visual Studio 2010 Service Pack 1 and Visual Web Developer Express 2010 Service Pack 1 (KB2502836)
    Microsoft WCF RIA Services V1.0 SP2


Read more: MS Downloads
QR: details.aspx?id=28358&

Posted via email from Jasper-net

Investigating Memory Issues

|
Contents
Tools of the Trade
GC Performance Counters
Windows Performance Counters
Verifying an OOM Exception in a Managed Process
Determining What Caused an OOM Exception
Measure Managed Heap Size
What If Objects Survive?
Is Fragmentation a Problem on Your Managed Heap?
Measuring Time Spent on Garbage Collection
Investigating High CPU Usage

Uncovering and correcting memory issues in managed applications can be difficult. Memory issues manifest themselves in different ways. For example, you may observe your application's memory usage growing unboundedly, eventually resulting in an Out Of Memory (OOM) exception. (Your application may even throw out-of-memory exceptions when there is plenty of physical memory available.) But any one of the following may indicate a possible memory issue:

    An OutOfMemoryException is thrown.
    The process is using too much memory for no obvious reason that you can determine.
    It appears that garbage collection is not cleaning up objects fast enough.
    The managed heap is overly fragmented.
    The application is excessively using the CPU.

This column discusses the investigation process and shows you how to collect the data you need to determine what types of memory issues you are dealing with in your applications. This column does not cover how to actually fix problems you find, but it does give some good insights as to where to start.
We'll begin with an overview of the most useful performance counters that can be used to investigate managed memory issues. Then we'll cover the tools that are commonly used for the investigation and will continue with a list of common managed memory issues and how to investigate them.
But before we get started, you should familiarize yourself with some fundamental concepts:

    Garbage collection in the Microsoft® .NET Framework. For more information, see these two blog entries: blogs.msdn.com/156626.aspx and blogs.msdn.com/234273.aspx.
    How virtual memory works in Windows®. This includes the concepts of reserving memory and committing memory.
    Using the Windows Debuggers (WinDbg and CDB).


Tools of the Trade
Before we start, we should spend a moment discussing some tools you will typically use to diagnose memory-related issues.

Read more: MSDN Magazine
QR: cc163528.aspx

Posted via email from Jasper-net

Convert Win32 Console Application to MFC

|
Assuming you have Console based application created with MFC support (i.e., you have not chosen MFC support while using New Project Wizard).
 
In this Tip/Trick, I am not going into detailed steps of how to create a new project and all. I assume you know all these and face a real life problem of adding MFC support to existing applications.
 
Follow these simple steps and your application will have MFC support.
Here I am using project name as MyApp and IDE is Visual Studio 2008.

  • Open your project.
  • In Project Menus --> Select MyApp Properties(MyApp -> name of my project)
  • In Configuration Properties -> General -> Use of MFC, select Use MFC in a Shared DLL option.
  • Add the following line in your stdafx.h file.

#define _ATL_CSTRING_EXPLICIT_CONSTRUCTORS      // some CString constructors will be explicit

#ifndef VC_EXTRALEAN
#define VC_EXTRALEAN            // Exclude rarely-used stuff from Windows headers
#endif
 
#include <afx.h>
#include <afxwin.h>         // MFC core and standard components
#include <afxext.h>         // MFC extensions
#ifndef _AFX_NO_OLE_SUPPORT
#include <afxdtctl.h>           // MFC support for Internet Explorer 4 Common Controls
#endif
#ifndef _AFX_NO_AFXCMN_SUPPORT
#include <afxcmn.h>                     // MFC support for Windows Common Controls
#endif // _AFX_NO_AFXCMN_SUPPORT

#include <iostream>

Read more: Codeproject
QR: Convert-Win32-Console-Application-to-MFC
    

Posted via email from Jasper-net

MySQL: Взламываем черный ящик

|
О чем пойдет речь: забавный и экстравагантный способ «взлома» веб-сайта, у которого «всего-лишь» не экранируются кавычки одного из параметров. При этом пропустим рассуждения о том, почему все не экранируется на стороне самого языка программирования или ORM.

Вводная: веб-сайт, у которого не экранируется один из параметров в простом SELECT запросе. При этом все ошибки перехватываются, обрабатываются и выводится скромное «Нет данных» или «Произошла ошибка».

Казалось бы: не велика беда. Обновление или изменение данных в него втереть, данные наружу не открываются, все сводится к «Извините, нет данных» — черный ящик.

Но, что на самом деле можно сделать в данной ситуации?

Сразу соль: техника базируется на функции sleep(N) которую мы будем использовать как лакмус. Замеряем сколько «отдается» страница в обычной жизни. И сколько времени она «отдается» если мы введем ' OR sleep(10) вместо всех параметров которые присутствую в форме. Если время отдачи страницы выросло — дело в шляпе и дальше только дело техники.

Например, подбираем имя таблицы, основываясь на мета-базе INFORMATION_SCHEMA, которая всегда присутствует и доступна всем:

' OR 1 = if((select count(*) from INFORMATION_SCHEMA.tables where TABLE_SCHEMA=database() and TABLE_NAME='users') = 1, sleep(10), null)

Если время «отдачи» страницы существенно увеличилось — угадали, если нет — пробуем еще варианты, обычно их до 10. Дальше «угадываем» имена полей:

' OR 1 = if((select count(*) from INFORMATION_SCHEMA.columns where TABLE_SCHEMA=database() and TABLE_NAME='users' and COLUMN_NAME='login') = 1, sleep(5), null)

Зная имена таблицы и полей, можно «подобрать» длину логина, пароля а так же посимвольно вытащить сами логин и пароль.

if((select count(*) from users where login='admin') = 1, sleep(5), null)
if((select length(password) from users where login='admin') = 1, sleep(5), null)
select if((select mid(password, 5,1) from users where login='admin') = 'a', sleep(5), null)


При двоичном поиске пароля посимвольно потребуется всего 8 запросов на каждый символ.

Read more: Habrahabr.ru
QR: https://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=habrahabr.ru/blogs/infosecurity/134372/

Posted via email from Jasper-net