Tag Cloud

CRM 2011 (161) CRM 4.0 (144) C# (116) JScript (109) Plugin (92) Registry (90) Techpedia (77) PyS60 (68) WScript (43) Plugin Message (31) Exploit (27) ShellCode (26) FAQ (22) JavaScript (21) Killer Codes (21) Hax (18) VB 6.0 (17) Commands (16) VBScript (16) Quotes (15) Turbo C++ (13) WMI (13) Security (11) 1337 (10) Tutorials (10) Asp.Net (9) Safe Boot (9) Python (8) Interview Questions (6) video (6) Ajax (5) VC++ (5) WebService (5) Workflow (5) Bat (4) Dorks (4) Sql Server (4) Aptitude (3) Picklist (3) Tweak (3) WCF (3) regex (3) Config (2) LINQ (2) PHP (2) Shell (2) Silverlight (2) TSql (2) flowchart (2) serialize (2) ASHX (1) CRM 4.0 Videos (1) Debug (1) FetchXml (1) GAC (1) General (1) Generics (1) HttpWebRequest (1) InputParameters (1) Lookup (1) Offline Plug-ins (1) OutputParameters (1) Plug-in Constructor (1) Protocol (1) RIA (1) Sharepoint (1) Walkthrough (1) Web.config (1) design patterns (1) generic (1) iframe (1) secure config (1) unsecure config (1) url (1)

Pages

Thursday, November 10, 2011

Quo: Seige of Stalingrad


"Stand Firm.
Die but do not Retreat."


Joseph Stalin on The Seige of Stalingrad 1942-1943

Quo: Seige of Stalingrad


"Stand Firm.
Die but do not Retreat."


Joseph Stalin on The Seige of Stalingrad 1942-1943

Quo: Facebook, Google, Yahoo

"Facebook, Google, Yahoo - all these major U.S. organizations have built-in interfaces for U.S. intelligence. It's not a matter of serving a subpoena - they have an interface that they have developed for U.S. intelligence to use."
- Julian Assange

Quo: Facebook, Google, Yahoo

"Facebook, Google, Yahoo - all these major U.S. organizations have built-in interfaces for U.S. intelligence. It's not a matter of serving a subpoena - they have an interface that they have developed for U.S. intelligence to use."
- Julian Assange

Quo: Facebook database

"Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations, their communications with each other, their relatives, all sitting within the United States, all accessible to U.S. intelligence"
- Julian Assange

Quo: Facebook database

"Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations, their communications with each other, their relatives, all sitting within the United States, all accessible to U.S. intelligence"
- Julian Assange

Quo: Facebook

"Everyone should understand that when add their friends to Facebook, they are doing free work for U.S Intelligence agencies in building this database for them."
- Julian Assange

Quo: Facebook

"Everyone should understand that when add their friends to Facebook, they are doing free work for U.S Intelligence agencies in building this database for them."
- Julian Assange

Quo: Wikileaks

"We don't respond to pressure, we respond to compulsory legal process"
- Julian Assange

Quo: Wikileaks

"We don't respond to pressure, we respond to compulsory legal process"
- Julian Assange

Quo: India

"India Conquered and dominated China culturally for 20 centuries without ever having to send a single soldier across her border."

- Hu Shih 

Quo: India

"India Conquered and dominated China culturally for 20 centuries without ever having to send a single soldier across her border."

- Hu Shih 

Quo: Obstacles

"Obstacles are what you see when you take your eyes off the goal"

Quo: Obstacles

"Obstacles are what you see when you take your eyes off the goal"

.NET Framework


What is it?

It is a virtual machine that includes a large class library.

Why use it?

Reuse code for basic functions
Security
Memory Management
Safe sandboxes for applications.

.NET Framework


What is it?

It is a virtual machine that includes a large class library.

Why use it?

Reuse code for basic functions
Security
Memory Management
Safe sandboxes for applications.

Servers


What is a server?
It is like a servant.
A Server is a socket “Listener” that waits for commands and then performs operations to serve up information.

It is the foundation.

There are many types of servers:

Server Operating System
Web Servers
File Servers
FTP Servers
Network Server

Server Operating Systems reside in the C:\Windows folder

Default install of IIS for each server:
Windows 2000 & XP – IIS 5.0
Windows 2003 & Vista – IIS 6.0
Windows 2008 & Windows 7 – IIS 7.0

Servers


What is a server?
It is like a servant.
A Server is a socket “Listener” that waits for commands and then performs operations to serve up information.

It is the foundation.

There are many types of servers:

Server Operating System
Web Servers
File Servers
FTP Servers
Network Server

Server Operating Systems reside in the C:\Windows folder

Default install of IIS for each server:
Windows 2000 & XP – IIS 5.0
Windows 2003 & Vista – IIS 6.0
Windows 2008 & Windows 7 – IIS 7.0

Expert Systems


Background:
Expert Systems were very popular in the 1980's, but they are still a great idea today.

How Expert Systems Work:
Instead of giving all the information on everything to someone, ask the person about what they are trying to do, and then return the answer to that specific problem.

Example:
Expert System applications are similar to medical diagnosis programs where you describe symptoms, and the computer returns the disease.

Expert Systems


Background:
Expert Systems were very popular in the 1980's, but they are still a great idea today.

How Expert Systems Work:
Instead of giving all the information on everything to someone, ask the person about what they are trying to do, and then return the answer to that specific problem.

Example:
Expert System applications are similar to medical diagnosis programs where you describe symptoms, and the computer returns the disease.

Create strong passwords

Create strong passwords

Create strong passwords

Strong passwords are important protections to help you have safer online transactions.

Keys to password strength: length and complexity

An ideal password is long and has letters, punctuation, symbols, and numbers.
  • Whenever possible, use eight characters or more.
  • Don't use the same password for everything. Cybercriminals steal passwords on websites with very little security, and then they try to use that same password and user name in more secure environments, such as banking websites.
  • Change your passwords often. Set an automatic reminder for yourself to change your passwords on your email, banking, and credit card websites about every three months.
  • The greater the variety of characters in your password, the better. However, password hacking software automatically checks for common letter-to-symbol conversions, such as changing "and" to "&" or "to" to "2."
  • Use the entire keyboard, not just the letters and characters you use or see most often.

Create a strong password you can remember

There are many ways to create a long, complex password. Here are some suggestions that might help you remember it easily:
What to doExample
Start with a sentence or two.Complex passwords are safer.
Remove the spaces between the words in the sentence.Complexpasswordsaresafer.
Turn words into shorthand or intentionally misspell a word.ComplekspasswordsRsafer.
Add length with numbers. Put numbers that are meaningful to you after the sentence.ComplekspasswordsRsafer2011.

Test your password with a password checker

A password checker evaluates your password's strength automatically. Try our secure password checker.

Protect your passwords from prying eyes

The easiest way to "remember" passwords is to write them down. It is okay to write passwords down, but keep the written passwords in a secure place.

Common password pitfalls to avoid

Cyber criminals use sophisticated tools that can rapidly decipher passwords.
Avoid creating passwords that use:
  • Dictionary words in any language.
  • Words spelled backwards, common misspellings, and abbreviations.
  • Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
  • Personal information. Your name, birthday, driver's license, passport number, or similar information.

Create strong passwords

Create strong passwords

Create strong passwords

Strong passwords are important protections to help you have safer online transactions.

Keys to password strength: length and complexity

An ideal password is long and has letters, punctuation, symbols, and numbers.
  • Whenever possible, use eight characters or more.
  • Don't use the same password for everything. Cybercriminals steal passwords on websites with very little security, and then they try to use that same password and user name in more secure environments, such as banking websites.
  • Change your passwords often. Set an automatic reminder for yourself to change your passwords on your email, banking, and credit card websites about every three months.
  • The greater the variety of characters in your password, the better. However, password hacking software automatically checks for common letter-to-symbol conversions, such as changing "and" to "&" or "to" to "2."
  • Use the entire keyboard, not just the letters and characters you use or see most often.

Create a strong password you can remember

There are many ways to create a long, complex password. Here are some suggestions that might help you remember it easily:
What to doExample
Start with a sentence or two.Complex passwords are safer.
Remove the spaces between the words in the sentence.Complexpasswordsaresafer.
Turn words into shorthand or intentionally misspell a word.ComplekspasswordsRsafer.
Add length with numbers. Put numbers that are meaningful to you after the sentence.ComplekspasswordsRsafer2011.

Test your password with a password checker

A password checker evaluates your password's strength automatically. Try our secure password checker.

Protect your passwords from prying eyes

The easiest way to "remember" passwords is to write them down. It is okay to write passwords down, but keep the written passwords in a secure place.

Common password pitfalls to avoid

Cyber criminals use sophisticated tools that can rapidly decipher passwords.
Avoid creating passwords that use:
  • Dictionary words in any language.
  • Words spelled backwards, common misspellings, and abbreviations.
  • Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
  • Personal information. Your name, birthday, driver's license, passport number, or similar information.