How to fix: Custom List Forms will not insert or show up on the Design surface of SharePoint Designer
When attempting to insert a custom list form in SharePoint Designer the form never displays in design view There is no error message, and the form never gets inserted into…
Free Web Development Ebooks !!!
ASP ASP ET Web Deployment using Visual Studio ET web application to a Windows Azure Web Site or a third-party hosting provider, by using Visual Studio 2012 or Visual Studio…
Visual Studio Free Ebooks !!
Visual Studio ALM Rangers Applies to: Visual Studio 2012 E-book publication date: March 2013 Applies to: Visual Studio 2012 Applies to: Visual Studio 2012 Applies to: Visual Studio 2010 Applies to: Visual…
A Practical Introduction to Node.js
Watch Rick Garibay’s session on Node.js. He introduces you to: Node.js programming fundamentals on Windows Design considerations for building a URL shortening service Building Node.js services that embrace REST/Hypermedia principles…
Free SQL Server Ebooks !!!
Applies to: SQL Server 2012 SQL Server 2012 Books Online Applies to: SQL Server 2012 SQL Server 2012 Books Online Applies to: SQL Server 2012 SQL Server 2012 Books Online…
SharePoint 2010 – 2013 Free Ebooks – Very Interesting !!!!
Learns what's new in SharePoint Server 2013 and SharePoint Foundation 2013 Applies to: SharePoint 2013 Deployment guide for SharePoint 2013 Applies to: SharePoint 2013 Applies to: SharePoint 2013 Applies to:…
Theory and practice behind full disclosure of security vulnerabilities
The efficiency of software cannot only be determined by the performance and business efficiency, but also the security and bug free characteristics Even after all the software planning and tests,…
SharePoint in Plain English
A short, fun, animated approach, showing you what SharePoint is all about
Open/Closed source software
What is open source software? Open source software is a solution where not only the complied version of the product is provided, but also the source code So advanced users…
Delete all User databases with TSQL
Again, if you want to delete all user databases with a single TSQL script, you can achieve this easily by using this script DECLARE @command nvarchar(max) SET @command = ''…
Micropayments
Internet has opened new market ways and gave a new vision and new methods of selling products PayPal micropayment is an example of many other platforms of micropayment, and the…
Steganography and watermarking
Protecting images is not obvious, considering the wide spread of images especially after the appearance of Internet Images are used in different areas (products, banners, logos …etc.) and sometimes it’s…
DRM Protection
Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken Do you think it is possible to protect the copyright of digital contents The goals of…
Network Security
Since the appearance of ARPANET and the interconnection of networks, security was in most debates for new network design, existing networks audit or systems design Some of the tools are…
Phishing, Pharming, Vishing
Different kind of attacks exist nowadays, such the viruses, spams, phishing, DOS or DDOS …etc. If we think about phishing in another context rather than computing, the first image I…
Basic security recommendations
OS hardening To protect against misconfiguration-based attacks, install the very good hardening utility Bastille (http://sourceforge.net) Bastille essentially closes all the doors left open in a default installation. Network services access…
Physical tamper-resistant devices
0- Introduction to physical tamper-resistant devices Anti-tamper device contains tamper detection, tamper resistance, tamper response and tamper detection (Rannenberg et.al, 2010). Different types of physical tamper-resistant devices exist Physical Tamper…
Identity Based Cryptosystems
Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography If we deploy Identity Based Cryptosystem, do we still need password? Will identity based…