(Tom Archer) I recently designed and coded a popular anti-malware (spyware) application that, among other tasks, searched for known malware “fingerprints” in memory, on disk, and in the Windows Registry. To search for the files on disk, I wrote a recursive function that searches a given file startin
Other News
Multiple Column Sorting and Paging in a DataGrid
(souri challa) This article demonstrates a comprehensive solution for implementing multiple column sorting in an ASP.NET DataGrid, with support for paging.
Inside Network Perimeter Security: Proxy Firewalls (Sample Chapter)
(Lenny Zeltser, Karen Kent, Stephen Northcutt, Ronald Ritchey and Scott Winters) This chapter describes the basics of proxy firewalls and how they may fit into your security architecture. Although proxies are not as popular as they once were, they can still offer value when deployed appropriately. T
Speed Transaction Processing in .NET 2.0
(Thiru Thangarathinam) Version 1.x of the .NET Framework gave developers some capable tools for controlling transactions, but the .NET Framework 2.0 expands the original capabilities significantly. Version 2 builds on the foundation of .NET 1.x’s transaction features, providing new classes and m
AJAX and scripting Web services with E4X, Part 2
(Paul Fremantle and Anthony Elder) Get a further introduction to E4X in the second part of this two-part article. E4X, ECMAScript for XML, a simple extension to JavaScript that makes XML scripting very simple. In Part 1, we demonstrated a Web programming model called AJAX, Asynchronous JavaScrip
Constraints In Microsoft SQL Server 2000
(Gayathri Gokul) Moving the responsibility for data integrity into the database has been revolutionary to database management. Constraints in Microsoft SQL Server 2000 allow us to define the ways in which we can automatically enforce the integrity of a database. Constraints define rules regardin
Permissions, Visibility, UDTs and User-Defined Aggregates
(Bob Beauchemin) A user-defined type must be defined in the SQL Server catalog to be visible to SQL Server stored procedures and other T-SQL procedural code, just as an assembly is. Once a UDT is defined in the SQL Server catalog, users need the appropriate permission to invoke it, just as they do f
Trust comes first in XML security
(Mark O’Neill) “Trust then verify” was Ronald Reagan’s maxim for international arms control. A similar maxim can be applied to security architectures in cross-firewall XML projects: “Trust then validate”.
Examples of how to Calculate Different VB.NET Dates
(jitender thakur) In this article, I will be showing how to use just the DATEADD and DATEDIFF function to calculate a number of different dates you might need to use in your applications.
How To Troubleshoot an ASP-to-Oracle Connectivity Problem
This article outlines some of the common steps to take when you troubleshoot a problem with a connection to an Oracle Database from an Active Server Pages (ASP) application. Some of the more common error messages are: Microsoft OLE DB Provider for ODBC Drivers error ‘80004005’ [Oracle][ODBC][Ora
