Visual studio feeds

All Visual Studio blogs in one place

Subscribe

Enter your email address:

Delivered by FeedBurner

Increase your website traffic with Attracta.com

Google+

Contact

Email:
Subject:
Message:
Anti-spam: How many eyes has a typical person?

Follow us on FB

Search

A couple of notes about .NET Framework 4.6 setup behaviors - Aaron Stebner's WebLog - Site Home - MSDN Blogs

AddThis Social Bookmark Button
A couple of notes about .NET Framework 4.6 setup behaviors - Aaron Stebner's WebLog - Site Home - MSDN Blogs



An in-place upgrade means that if you install the .NET Framework 4.6
when any of the above versions of versions of the .NET Framework are
installed on your PC, .NET Framework 4.6 setup will upgrade them and you
will be left with only the .NET Framework 4.6 installed afterwards. 

You can now customize the dashboard with Fitbit app

AddThis Social Bookmark Button
The official Fitbit app for Windows 10 and Windows Mobile 10 (Universal Windows Platform App) has noe received an update that brings some interesting design updates with new features. One such feature is the one which lets the users to customize the tiles that appear on their dashboard. Below are some of the features of...

Realistic use case of Continuum for Phones by Runner Jamie Ramsay

AddThis Social Bookmark Button
Want to know the use case of the continuum feature for Windows Mobile ?. Here’s an interesting video from Microsoft Lumia channel where Jamie Ramsay shows the true power of his Lumia 950 XL phone where he finds a screen at a hostel and connect the display dock and uploads his picture as well as......(Read whole news on source site)

Readability matters

AddThis Social Bookmark Button
In one of my recent posts about performance, a suggestion was raised: Just spotted a small thing, you could optimise the call to: _buffer[pos++] = (byte)'\'; with a constant as it's always the same. There are two problems with this suggestion. Let us start with the obvious one first. Here is the disassembly of the code:             b[0] = (byte) '/'; 00007FFC9DC84548  mov         rcx,qword ptr [rbp+8]   00007FFC9DC8454C  mov         byte ptr [rcx],2Fh               b[0] = 47; 00007FFC9DC8454F  mov         rcx,qword ptr [rbp+8]   00007FFC9DC84553  mov         byte ptr [rcx],2Fh   As you can see, in both cases, the exact same
instructions are carried out. That is because we are no longer using compilers that had 4KB of memory to work with and required hand holding and intimate familiarity with how the specific compiler version we wrote the code for behaved. The other problem is closely related. I've been working with code for the past 20 years. And while I remember the ASCII codes for some characters, when reading b[0] = 47, I would have to go and look it up. That puts a really high burden on the reader of a parser, where this is pretty much all...(Read whole news on source site)

The Morning Brew #2029

AddThis Social Bookmark Button
Information A (Hitchhiker’s) Guide To The .NET Core Projects on GitHub – Mark Rendle kicks off a series of posts looking at the .NET Core framework Managing My Many Hats on GitHub – Martin Woodward discusses managing your identity with Git Introducing DocNet, a static documentation site generator – Frans Bouma introduces a new project […]

Securing Web Applications, Part 2. SQL (and other) Injection Attacks

AddThis Social Bookmark Button
Robin Sillem, William Ferguson This blog post explores performing SQL and other injection attacks on your own machine, on some pre-made sample web apps. The focus of this post is on securing web apps, rather than the attacks themselves. It is part of an ongoing series of blog posts on web application security, which includes: Securing Web Applications, Part 1. Man In The Middle Attacks An important note before starting: This blog post shows how to perform an attack on a sandboxed sample website. Attacking targets without prior mutual consent is illegal. It is the reader’s responsibility to obey all applicable laws. The
writers of this blog post and Scott Logic assume no liability and are not responsible for any misuse or damage caused from the use of this tutorial. Injection attacks Many (or most?) real-world websites interact with other back-end systems by sending them commands to do things - this can be databases, the OS, the file system, external services, actual physical hardware including large real-world machinery, whatever. This is a normal part of their operations, and is part of the design of the system. Many (or most?) real-world websites also accept input from users. This generally comes from front-end clients, but it can also...(Read whole news on source site)

Home