Friday, October 25, 2013

The three must-haves for C# developers

Tony Patton says these are the basic items a developer will need on a C# project. Let us know if you'd add anything to his list. 




00tools.jpg
All developers have their favorite utilities and tools, but what if you could have only three? As I explained in my article on the top tools for ASP.NET developers, it is not easy to trim it down to just three.

Now I'm listing my top three tools for C# development; these tools encompass everything from developing a console application to a web service. For starters, I choose tools outside of the IDE with my personal preference being Visual Studio. I group my three selections for C# into unit testing, version control, and something to handle building your code.

The three must-have tools for ASP.NET developers

Tony Patton lists the three tools he could give a new ASP.NET developer so she could be productive.


I started developing web applications in the late 1990s. As a consequence, I have a fond attachment to building HTML and related code via a nice text editor. However, I didn't include such an editor when asked to write a post outlining my top three tools for ASP.NET development. (That's right, I only got to choose three, and it was just as hard as I thought.) As I made my list and changed it numerous times, I was amazed at the number of useful tools I use on a regular basis. Anyway, that is enough whining, so let's quickly cover the guidelines (as I see them) before discussing my choices.

Google blacklist blocking php.net

Summary: Claiming the well-known web software site is serving malware, Google's safe browsing API is marking php.net as malicious.

Google's safe browsing API, a security blacklist service which warns of malicious web sites, has marked the php.net site as malicious. As a result, users of Google Chrome and Mozilla Firefox get a dire warning when attempting to visit the site.

Thursday, October 24, 2013

Which iPhone you using now


SQRL: A new method of authentication with QR codes

Will a new authentication method using Secure QR Login (SQRL) for websites finally end the user name and password standard? Here are the pros and cons. 

Privacy2_610x426.jpg
Usernames and passwords are how most of us identify ourselves to almost every website around the net. For a long time now, security researchers have been looking for a better way. Traditional authentication just isn't that safe or intuitive. In particular, passwords can be stolen from a database or by a man-in-the-middle (MitM) attack, a keylogger, or even brute force. Worse still, people end up having to remember a different password for each site they visit if they want to be safe, and often forget them. Various systems have been introduced to help make this process more secure, including two-factor authentication and third-party login services from Facebook, Twitter, Microsoft, and Google, notably. However, these systems also have flaws. Two-factor authentication can be annoying for users to deal with, while third-party login services rely on a third party, so if your Facebook account gets compromised, all of the sites you log in with that username will also be compromised.

The 25 highest paying U.S. companies for software engineers

Glassdoor has just released a report on the 25 highest paying U.S. companies for software engineers and a comparison of major U.S. metros for software engineer salary and number of employers hiring in each region. 

Glassdoor, a jobs community focused on greater workplace transparency, has released its newest report on the 25 Highest Paying Companies for Software Engineers. Glassdoor’s report also includes a comparison of major U.S. metros for software engineer salary and number of employers hiring in each region.

Recover from a dead RAID0 with Bootsect and DiskPart

Recovering from a dead hard drive in a RAID0 configuration may require a little old-fashioned command line knowledge. 

Hard_disk_head_crash.jpg
Quite recently, I was asked by a friend to repair his laptop. The owner of this particular laptop is sufficiently competent to overcome basic issues one would encounter in Windows, so by merit of my being called in, clearly something catastrophic had happened. It is also important to note that the laptop itself, an Alienware M17xR3, while now two or three years old, has particularly impressive specifications, and one feature in particular that - on laptops - is reserved for high-end models: two 2.5" drive bays.
These drive bays are ultimately what caused the problem: normally, you're encouraged to use that feature to run two drives in RAID1 to prevent data loss. In this particular case, the two drives were configured as RAID0, which is a disaster waiting to happen. Attempting to turn on the laptop, I hear a faint repeating click over the hum of the dual fans on the bottom of the unit, and of the one larger fan on the USB-connected laptop cooler. After removing the drive to check it in a different (and less noisy) computer, my suspicions were confirmed - the drive suffered the "click of death".

Top three indicators of compromised web servers

Web servers are a popular target for attackers, and the number of servers, frameworks, and web apps can make it difficult to recognize where the threats are. Here are some common indicators. 

By Lonnie Benavides

security_hacker_hand_on_keyboard-610.jpg
You slowly push open your unusually unlocked door only to find that your home is ransacked. A broken window, missing cash, all signs that someone has broken in and you have been robbed.
In the physical world it is very easy to understand what an indicator of compromise would mean for a robbery. It would simply be all the things that clue you in to the event's occurrence. In the digital world however, things are another story.

Quick Tip: Change to a local account in Windows 8.1

Did you end up with a Microsoft live account after updating to 8.1? Here is how to re-establish a local account. 


i_win81.png
I personally installed the Microsoft Windows 8.1 update to five different personal computers since October 17, 2013. (Five days ago at this writing.) For the most part, the upgrade was smooth for all the computers, as long as you had the time to wait for the download. In general, I am happy with the upgrade and I continue to recommend it to anyone running the original Windows 8.
However, there is one caveat that I discovered during installation that everyone should be aware of before they undertake the process:

Task automation with AutoMate 10

Streamlining server tasks with workflow automation is key to smoothly functioning IT administration. Derek Schauland takes a look at the new AutoMate 10 from Network Automation. 

automatelogo.jpg
Windows has come a long way in terms of the types of tasks that are possible. The task scheduler has been around for a long time and, in Windows 7 and newer, the possibilities include things like on-event task triggers, which executes a task when a particular event happens, in addition to the previous schedule triggers. 
Kicking off tasks is pretty great with the built-in application, but there are still quite a few hoops to go through (like programming or scripting) to get things to happen on remote computers. What if there were a way to automate tasks with little scripting (if any) and if this solution could accomplish things on a remote computer (or computers)? Oh and by the way, I am not talking about PowerShell, but of AutoMate 10 from Network Automation.