What is New in iPhone SDK 3.2 for the iPad (part 2) |
As of iOS 3.2, Apple has changed the way the MPMoviePlayerController class works. In previous versions, videos were always played in a full-screen player interface. The iPad now offers an enhanced movie player that can be displayed in either full-screen mode or embedded within your app's views. |
|
What is New in iPhone SDK 3.2 for the iPad (part 1) |
The new UIBezierPath class may not be one of the most talked about or publicized new features in iPhone SDK 3.2, but if you do any kind of 2D drawing in your app, its inclusion is actually a pretty big deal. |
|
|
|
|
ASP.NET Security : The Membership and Role Management API (part 1) |
In ASP.NET 2.0 and beyond, the core of Forms authentication is the same as in ASP.NET 1.x. Most of the tricks and techniques you have learned remain valid and usable. The most notable change to Forms authentication in ASP.NET 2.0 and newer versions is the introduction of a complementary API—the membership API. |
|
|
ASP.NET Security : Security-Related Controls (part 1) |
In addition to the membership and role management APIs, ASP.NET from version 2.0 onward offers several server controls that make programming security-related aspects of a Web application easier than ever: Login, LoginName, LoginStatus, LoginView, PasswordRecovery, ChangePassword, and CreateUserWizard. |
|
WCF Security Concepts |
One of the .most fundamental concepts of security is knowing who is knocking on your door. Authentication is the process of establishing a clear identity for an entity, for example, by providing evidence such as username and password |
|
Certificate-Based Encryption |
Certificates, and the claims they represent, are a secure, general-purpose method for proving identity. They embody a robust security mechanism that makes them a great option for encryption and authentication. |
|
Encryption Using SSL |
SSL is a convenient, secure way to encrypt communications. It’s well understood by IT organizations, it is firewall friendly, and there are many management and performance tools on the market. Using SSL with BasicHttpBinding enables the broadest reach of a secure Web service. |
|
Security Privileges and Services |
You have to think about a number of things when it comes to services and security. Services themselves have to run in a security context that has permissions to do what you program the service to do. |
|
Client Credentials |
With authentication, it should be no surprise that the client providing credentials to the service is a common scenario. Two questions must be addressed: which credentials should be used and how they should be provided. |
|
User-Level Security : Service Credentials |
There is also a way for the service to present a set of credentials to the client. This is required to support mutual authentication and message protection. Also, when transport security is specified, the service’s credentials might be needed to provide the required functionality.
|
|
User-Level Security : Custom Authentication |
Although the options that WCF offers for authentication are helpful, there are always gaps through which specific requirements will fall. It is not possible to guarantee that all the available choices will cover every possible scenario, so in the typical WCF manner, you can extend the authentication process with your own custom mechanism. |
|
User-Level Security : Authorization and Impersonation (part 4) - Impersonation |
The custom authorization policy (or any authorization policy) is built to add claims to the security context for the request. However, this is not the only place where claims are added. When a request first arrives at the service, the security tokens included with the request are evaluated. These claims are also added to the security context. |
|
|
|
|
Publisher Certificates |
Strong names provide unique identities for assemblies and protect against tampering, but they do not contain any information about the identity of the assembly publisher. The .NET Framework supports the Signcode scheme, which requires a publisher to prove its identity to a trusted third-party authority and obtain a software publisher's certificate (SPC). |
|
Using LINQ To SQL |
There are multiple forms of LINQ when using Microsoft Visual Basic, such as LINQ for DataSets and LINQ To SQL. We will use LINQ To SQL, which is one technology that extends the abilities of Visual Basic 2008. |
|
|
Service Management API (part 1) |
You can access the service management capabilities and perform day-to-day tasks (creating, deleting, and updating stuff) through the Service Management API. This RESTful HTTP API can be accessed from both inside and outside Microsoft data centers |
|
Windows Services : A Service Control Shell |
You can control Windows Services from the Administrative Tools, where there is a Services icon. Alternatively, you can control services from the Windows command sc.exe. |
|
ASP.NET Applications and the Web Server |
ASP.NET applications always work in conjunction with a web server—a specialized piece of software that accepts requests over Hypertext Transport Protocol (HTTP) and serves content. |
|
|
|
|
|
Managing Websites with IIS Manager (part 4) - Configuration |
The ASP.NET group includes ASP.NET-specific settings. Technically, these settings are simply a nice graphical wrapper over various sections in the web.config file. In other words, you use the convenient graphical interface IIS provides, and IIS updates the corresponding configuration elements in your web.config file. |
|