Archives for Software Dev - Page 29
Reverse Proxy USES
The most common use-case is a corporate internal web server that is hidden from the internet and an external facing webserver accessible from the ; If the internal web server…
Azure Notes from the Field
Some key cloud services offered by Microsoft: Domain services Identity Federation services Azure Active Directory Azure Information Protection (AIP) Azure Information Protection (AIP) - Classifying sensitive Data Azure Information Protection…
Ctrl alt del – where you are is exactly where you are supposed to be
We are often 'in a rush' to get home. The universe - and every place in it - IS ; The next time you find yourself rushed by anyone, your…
Finding family purchases in iTunes
Trust apple to hide things to where nobody can find them. All I wanted to do was download all the music that was part of my family sharing plan (…
Using Asynchronous methods in .NET–Quick Notes
I developed these notes just as a way to keep myself sane while writing Async methods in C#. Quick Recap - Two types of threads for an programmer 1. Regular…
Browser plugins and security
The Problem – PlugIns are far behind Browsers Browsers nowadays, will automatically update themselves (with security updates) by default. Plugins are far behind browsers when it comes to security updates…
Fiddler–for tweaking the HTTP Referrer field
Fiddler can be used to quickly modify the parts of an HTTP request (both GET and POST) Fiddler provides a window below the URL textbox – which can be used…
NoSQL and data integrity
Redundant Data Storage NoSQL stores many to many relationships in the same way that de-normalized tables do – by storing them redundantly. Since you do not base your NoSQL design…
Recursion versus Iteration ( Looping )
Overview In general, whatever problem you can solve with Recursion can also be solved with Looping (iteration). It turns out, that for most use cases, Iteration (looping) performs better than…
Types of Security Scans
Port scanner ( Nmap) Network vulnerability scanner ( Nessus, SAINT, OpenVAS) Web application security scanner ( Nikto, w3af) Database security scanner Host based vulnerability scanner (Lynis)