Creating A System Image With Windows 7
Consider the following, you have just purchased that new computer and spent hours installing all of your software and now you have everything to your taste. I am not sure about you, but I hate setting...
View ArticleAES Encryption Example In C#
In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard. This standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger...
View ArticleEasily Capture Streaming Media
Are you looking to add your favorite television show or movie to your collection? If so, then I have a solution that you may be interested in. Now it is important to say that I do not advocate...
View ArticleCreate A Polaroid Style Photo Gallery With CSS
Creating a simple Polaroid style gallery is much easier than you many think just using CSS and HTML. For the purpose of this example, I must say that the gallery works best with a small number of...
View ArticleHow To Use ScreenFlow To Capture Netflix Streaming Media
First things first, I am not advocating violating copyright laws and you should clearly understand the Digital Millennium Copyright Act surrounding digital media before you try capturing media....
View ArticlePoor Man Backup Using Robocopy, 7Zip and DropBox
Rather than talking about how important data backups are I thought I would take the time to show you how you can use tools that are free or low cost to automate backups using Dropbox. If you don’t have...
View ArticleFree Security Vulnerability Guides From Veracode
Veracode focuses on security for organizations to accurately identify and manage application security risk. They offer a number of resources to include podcast, whitepapers, cheat sheets, and much...
View ArticleMicrosoft Baseline Security Analyzer
If you’re running a Windows platform then you must secure your operating system and the Microsoft Baseline Security Analyzer (MBSA) makes it a breeze. Securing your operating system is absolutely the...
View ArticleLearning BackTrack 5: The Art Of Penetration Testing
BackTrack is an absolutely amazing Linux based penetration testing environment that is entirely dedicated to hacking. I must say that you should use common sense when you begin digging into the...
View ArticleScott Hansleman Provides A Step-By-Step: How To “Upgrade” from Windows XP to...
At The time of this post I have not purchased Windows 7 yet and the only reason I have not is there is rumor that Microsoft may be lowering the price for a limited time. I am simply sitting on the...
View ArticleUnderstanding SMTP Status Codes
Many programmers take processing email as one of those actions that is easily implemented and rarely fails. If you have not read my earlier post How-to: Easily Sent Emails With .NET you want to review...
View ArticleSiteMinder Versus Custom Code
The benefits of using a Single Sign-On system are endless. User-rights are tightly integrated with user and company policies and these policies are all centralized in data center or such within a given...
View ArticleWordPress Tutorials and Tips: Part One
WordPress is an extremely powerful blogging platform and has a wide range of options to make it your own. In this entry I will list a number of resources for both new and seasoned users. Tips and...
View ArticleHow To Create a Virtual Hard Disk (VHD) in Windows 7
What is a virtual hard disk? Virtual hard disk (VHD) is a disk image file format for storing the complete contents of a hard drive. The disk image, sometimes called a virtual machine, replicates an...
View ArticleHow To Create A Bootable Windows 7 Virtual Hard Disk (VHD)
In this article I will cover creating a bootable Windows 7 VHD. If you missed the previous article on creating a VHD titled How To Create a Virtual Hard Disk (VHD) in Windows 7 you may want to take a...
View ArticleHow To Achieve Website Optimization
Why should you care about optimization when it comes to your website? Should it really be a surprise to learn that your visitors are impatient and wants what they want immediately? I think not. We have...
View ArticleBest Practices: Visual Studio .NET Project Naming Standards
If you have not adopted a best practice when it comes to naming your solution and projects within Visual Studio .NET, I urge you to take a moment a think about this subject. As anyone will tell you...
View ArticlePrinter Friendly Web Pages
While I personally do print a great deal of web pages I do find myself from time to time running across an article that I want to to keep and a bookmark is something I do not want to use. Print is...
View Article.NET Performance Counters
Recently while catching up on technical reading I ran across the subject of performance counters. I must admit that I had not looked closely at this subject in the past and thought it was time to do...
View ArticleEight Tips To Help Take Control Of Your Inbox
No matter how you look at it email more often than not can be your nemesis. Don’t believe me? Take the time to track how much of your day is spent inside your inbox spending time that would best be...
View ArticleHow To Process JSON With C# and JQuery
JavaScript Object Notation affectionately known as JSON is a wonderful way to deliver content to the browser in a lightweight method that can both save on bandwidth and reduce page weight. Who doesn’t...
View ArticleHow To Decompile A Java Class Inside A JAR File
Today I am stepping outside what I consider my comfort zone when in comes to programming languages and I will be talking about Java. To tell the truth it has been a number of years since I have even...
View ArticleAre You a Google Dork?
Are you a Google Dork? Do you know what it means to be a Google Dork? The fact is Google is a wonderful search engine and it can very easy point you into the direction of your interest. However the...
View ArticleRip music from YouTube using youtube-dl, ffmpeg, and lame
In a previous post I wrote about how to Rip DEFCON videos from YouTube and this got me to thinking about music. Is it possible to take a video that contains a music track and extract the audio to MP3...
View ArticleSecurity via obfuscation: MAC Address
Every network interface card has a unique 48 bit identifier known as a MAC address. This address is burned into the EEPROM on the card, and often is used by networking equipment to track users as they...
View ArticleCreating a proxy chain in Linux
There obviously are time that you may want to make use of a proxy server in order to provide yourself a level of anonymity that you may otherwise no have. Proxies also provide benefits in terms of...
View Article
More Pages to Explore .....