Archives for n-Tier Apps
Production Data Copy Options on the Public Cloud
The Use Case Often, a copy of Production data ( in a database) is needed over in a non production environment (in the public cloud). This would entail moving data…
To Domain Join or Not
The risk of domain joining your servers is that if a port scanner (aka hacker) can find an open Netbios port, you would have compromised that server and also the…
Multifactor authentication
Two Factors used in 2FA include : Factor 1 - Something you know (PIN, password, secret questions, etc); Factor 2 - Something you have ( token, key, smartcard, mobile phone)…
Another Chrome FIRST–Privacy through Obscurity…
Not that we needed another reason to use Chrome – but now there’s a Chrome browser extension called Decodelia . Decodelia is a privacy specific plugin which essentially turns your…
Concatenated Queries at the Root of SQL Injection attacks
ORM is supposed to protect against SQL Injection attacks. As are Stored Procedures (due to parametrization of the data in the query). However, both ORMs and Stored Procs will not…
Multiple FROM statements in a LINQ expression
Multiple "from" statements are like nested foreach statements. MSDN example: var scoreQuery = from student in students from score in ; where score > 90 select new {…
FindAsync with non-primary key value
var foos = await (x => == userId).ToListAsync();
Quick way to print out generated sql
If you are working from an EF context, the context has its own LOG. This can be written out to your development console (see example below). = ;DataClassesDataContext context =…
Visualizing EDMX files (entity framework data model)
Ever wanted to reverse engineer a code-first Entity framework model ? Or simply generate a diagram from an existing model? Try the Entity Framework Power Tools. Power Tools
Converting a normal collection to IEnumerable
Suppose you are stuck with a namevaluecollection – it is not of type IQueryable or IEnumerable. So – none of your LINQ queries will work on it. Convert it to…