Archives for Software Dev - Page 25
Preventing your next application from becoming obsolete (in a hurry)…
The development landscape has changed rapidly in the past decade. NoSQL databases, Javascript libraries, Mobile Computing and other technologies have changed the traditional development lifecycle including, changing the end-game. The…
image2docker–getting older ASP.NET webforms apps onto newer OSes
Image2Docker may be the simplest path for getting your older .NET apps working on newer ; It works by extracting either an entire VM or specific 'artificats' from a ;…
What’s NEW in MVC 6.0?
These are some of the bigger changes in MVC 6 Dependency injection built in Cloud optimized versions of MVC, Web API, Web Pages, SignalR, and EF MVC, Web API and…
VPN–Tunnel essentials
Types of Tunnels - Site to Site or Network to Network VPNs can be either remote-access (connecting a computer to a network) or site-to-site (connecting two networks). In a corporate…
How the Internet Works
Company A = large communications provider. Has a PoP (Point of Presence) in each major city. Company B = large corporate with multiple buildings - lays out it's own fiberoptic…
Group Policy Preferences Security Hazards
Domain machines periodically reach out and authenticate to the Domain Controller utilizing the Domain credentials of the logged-in user (these can be, and often are, unprivileged accounts) and pull down…
Token based vs. Certificates based authentication
Read this earlier post on Web Services Security. There are a couple of major difference between a token and a certificate. Tokens are essentially a symmetric key. That means that…
Security certifications
CISSP or CCIE SECURITY? CISSP is an internationally recognized and accredited certification for IT security training, CCIE is a CISCO specific training – and though, several employers require CCIE, most…
Multifactor authentication
Two Factors used in 2FA include : Factor 1 - Something you know (PIN, password, secret questions, etc); Factor 2 - Something you have ( token, key, smartcard, mobile phone)…
Static classes versus regular classes
What is a static class? How is it different from an object? A class in which everything (all fields and methods) is static is equivalent to an object. It has…