Quantcast
Channel: Radical Development » How To
Browsing latest articles
Browse All 32 View Live

Image may be NSFW.
Clik here to view.

Creating A System Image With Windows 7

Consider the following, you have just purchased that new computer and spent hours installing all of your software and now you have everything to your taste. I am not sure about you, but I hate setting...

View Article



AES Encryption Example In C#

In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard. This standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger...

View Article

Image may be NSFW.
Clik here to view.

Easily Capture Streaming Media

Are you looking to add your favorite television show or movie to your collection? If so, then I have a solution that you may be interested in. Now it is important to say that I do not advocate...

View Article

Image may be NSFW.
Clik here to view.

Create A Polaroid Style Photo Gallery With CSS

Creating a simple Polaroid style gallery is much easier than you many think just using CSS and HTML. For the purpose of this example, I must say that the gallery works best with a small number of...

View Article

Image may be NSFW.
Clik here to view.

How To Use ScreenFlow To Capture Netflix Streaming Media

First things first, I am not advocating violating copyright laws and you should clearly understand the Digital Millennium Copyright Act surrounding digital media before you try capturing media....

View Article


Image may be NSFW.
Clik here to view.

Poor Man Backup Using Robocopy, 7Zip and DropBox

Rather than talking about how important data backups are I thought I would take the time to show you how you can use tools that are free or low cost to automate backups using Dropbox. If you don’t have...

View Article

Free Security Vulnerability Guides From Veracode

Veracode focuses on security for organizations to accurately identify and manage application security risk. They offer a number of resources to include podcast, whitepapers, cheat sheets, and much...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Baseline Security Analyzer

If you’re running a Windows platform then you must secure your operating system and the Microsoft Baseline Security Analyzer (MBSA) makes it a breeze. Securing your operating system is absolutely the...

View Article


Image may be NSFW.
Clik here to view.

Learning BackTrack 5: The Art Of Penetration Testing

BackTrack is an absolutely amazing Linux based penetration testing environment that is entirely dedicated to hacking. I must say that you should use common sense when you begin digging into the...

View Article


Image may be NSFW.
Clik here to view.

Scott Hansleman Provides A Step-By-Step: How To “Upgrade” from Windows XP to...

At The time of this post I have not purchased Windows 7 yet and the only reason I have not is there is rumor that Microsoft may be lowering the price for a limited time. I am simply sitting on the...

View Article

Image may be NSFW.
Clik here to view.

Understanding SMTP Status Codes

Many programmers take processing email as one of those actions that is easily implemented and rarely fails. If you have not read my earlier post How-to: Easily Sent Emails With .NET you want to review...

View Article

Image may be NSFW.
Clik here to view.

SiteMinder Versus Custom Code

The benefits of using a Single Sign-On system are endless. User-rights are tightly integrated with user and company policies and these policies are all centralized in data center or such within a given...

View Article

Image may be NSFW.
Clik here to view.

WordPress Tutorials and Tips: Part One

WordPress is an extremely powerful blogging platform and has a wide range of options to make it your own. In this entry I will list a number of resources for both new and seasoned users. Tips and...

View Article


Image may be NSFW.
Clik here to view.

How To Create a Virtual Hard Disk (VHD) in Windows 7

What is a virtual hard disk? Virtual hard disk (VHD) is a disk image file format for storing the complete contents of a hard drive. The disk image, sometimes called a virtual machine, replicates an...

View Article

Image may be NSFW.
Clik here to view.

How To Create A Bootable Windows 7 Virtual Hard Disk (VHD)

In this article I will cover creating a bootable Windows 7 VHD. If you missed the previous article on creating a VHD titled How To Create a Virtual Hard Disk (VHD) in Windows 7 you may want to take a...

View Article


How To Achieve Website Optimization

Why should you care about optimization when it comes to your website? Should it really be a surprise to learn that your visitors are impatient and wants what they want immediately? I think not. We have...

View Article

Image may be NSFW.
Clik here to view.

Best Practices: Visual Studio .NET Project Naming Standards

If you have not adopted a best practice when it comes to naming your solution and projects within Visual Studio .NET, I urge you to take a moment a think about this subject. As anyone will tell you...

View Article


Image may be NSFW.
Clik here to view.

Printer Friendly Web Pages

While I personally do print a great deal of web pages I do find myself from time to time running across an article that I want to to keep and a bookmark is something I do not want to use. Print is...

View Article

Image may be NSFW.
Clik here to view.

.NET Performance Counters

Recently while catching up on technical reading I ran across the subject of performance counters. I must admit that I had not looked closely at this subject in the past and thought it was time to do...

View Article

Eight Tips To Help Take Control Of Your Inbox

No matter how you look at it email more often than not can be your nemesis. Don’t believe me? Take the time to track how much of your day is spent inside your inbox spending time that would best be...

View Article

Image may be NSFW.
Clik here to view.

How To Process JSON With C# and JQuery

JavaScript Object Notation affectionately known as JSON is a wonderful way to deliver content to the browser in a lightweight method that can both save on bandwidth and reduce page weight. Who doesn’t...

View Article


Image may be NSFW.
Clik here to view.

How To Decompile A Java Class Inside A JAR File

Today I am stepping outside what I consider my comfort zone when in comes to programming languages and I will be talking about Java. To tell the truth it has been a number of years since I have even...

View Article


Image may be NSFW.
Clik here to view.

Are You a Google Dork?

Are you a Google Dork? Do you know what it means to be a Google Dork? The fact is Google is a wonderful search engine and it can very easy point you into the direction of your interest. However the...

View Article

Image may be NSFW.
Clik here to view.

Rip music from YouTube using youtube-dl, ffmpeg, and lame

In a previous post I wrote about how to Rip DEFCON videos from YouTube and this got me to thinking about music. Is it possible to take a video that contains a music track and extract the audio to MP3...

View Article

Image may be NSFW.
Clik here to view.

Security via obfuscation: MAC Address

Every network interface card has a unique 48 bit identifier known as a MAC address. This address is burned into the EEPROM on the card, and often is used by networking equipment to track users as they...

View Article


Image may be NSFW.
Clik here to view.

Creating a proxy chain in Linux

There obviously are time that you may want to make use of a proxy server in order to provide yourself a level of anonymity that you may otherwise no have. Proxies also provide benefits in terms of...

View Article
Browsing latest articles
Browse All 32 View Live




Latest Images