programming4us
         
 
 
Windows
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 >  |  Displaying page 10 of 15, items 271 to 300 of 446.
Windows 7 : Sending and Receiving Secure Email (part 2) - Obtaining Another Person’s Public Key
Before you can send an encrypted message to another person, you must obtain his public key. How you do this depends on whether you have a digitally signed message from that person.
Windows 7 : Sending and Receiving Secure Email (part 1) - Setting Up an Email Account with a Digital ID
When you connect to a website, your browser sets up a direct connection—called a channel—between your machine and the web server. Because the channel is a direct link, it’s relatively easy to implement security because all you have to do is secure the channel.
Windows 7 : Maintaining Your Privacy While Reading Email
You wouldn’t think that the simple act of reading an email message would have privacy implications, but you’d be surprised. Two scenarios can compromise your privacy: read receipts and web bugs.
Windows 7 : Email Phishing Protection
Internet Explorer’s SmartScreen Filter works well if you stumble into a phishing site while surfing the Web. However, most phishing “lures” are email messages that appear to be from legitimate businesses, and they include links that send you to phishing sites where they hope to dupe you into giving up confidential information.
SOA with .NET and Windows Azure : Service Hosting with WCF (part 3) - Managed Windows Services
A self-hosted service can be any managed application or application domain. Managed applications include Windows Forms applications, console applications, or Windows services
SOA with .NET and Windows Azure : Service Hosting with WCF (part 2) - Self-Hosted Services
A self-hosted service can be any managed application or application domain. Managed applications include Windows Forms applications, console applications, or Windows services
SOA with .NET and Windows Azure : Service Hosting with WCF (part 1)
The ServiceHost constructor is provided with the service type and an array of base addresses. Each base address must have a different transport specified in its URI. The actual address of each endpoint is derived relative to the base address
SOA with .NET and Windows Azure : Service Implementation with WCF (part 2)
Various concepts were previously covered, including Data Contracts, Message Contracts, Endpoint Address, Faults, Behaviors, Bindings, Metadata Exchange (MEX) and others.
SOA with .NET and Windows Azure : Service Implementation with WCF (part 1)
Behaviors are used to control the internal workings of a service. They are classes that extend or modify a service type and define the runtime aspect of the service.
Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 2) - Blocking Countries and Languages
Spam—unsolicited commercial messages—has become a plague upon the earth. Unless you’ve done a masterful job at keeping your address secret, you probably receive at least a few spam emails every day, and it’s more likely that you receive a few dozen
Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 1)
Spam—unsolicited commercial messages—has become a plague upon the earth. Unless you’ve done a masterful job at keeping your address secret, you probably receive at least a few spam emails every day, and it’s more likely that you receive a few dozen
Windows 7 : Configuring Windows Defender to Scan Email
The evil known as spyware usually infects a PC by luring an unsuspecting user to a malicious website that either uses a script to infect an unprotected browser, or uses a pop-up window to dupe the user into clicking a button that installs the malware (a so-called drive-by download).
Windows 7 : Protecting Yourself Against Email Viruses
Computing veterans will remember that way back when the primary method that computer viruses used to propagate themselves was the floppy disk. A user with an infected machine would copy some files to a floppy, and the virus would surreptitiously add itself to the disk
Windows 7 : Understand Internet Explorer’s Advanced Security Options
This article takes you through Internet Explorer’s Advanced security options. Select Tools, Internet Options, display the Advanced tab, and then scroll down to the Security section to see the following options.
SOA with .NET and Windows Azure : WCF Services - Overview
WCF is the fundamental platform for developing service-oriented solutions with .NET. This chapter introduces WCF and the unified programming model it represents.
SOA with .NET and Windows Azure : Web Services (ASMX and WSE)
With .NET, Web services were originally developed using ASP.NET together with IIS. ASP.NET provided an extensive framework built on top of the CLR for developing both Web services and general Web sites.
Windows 7 : Enhancing Your Browsing Security (part 6) - Managing Add-Ons
Internet Explorer 8 gives you a much better interface for managing all your browser add-ons, including ActiveX controls, toolbars, helper objects, and more. Select Tools, Manage Add-Ons to display the Manage Add-Ons dialog box shown in Figure 4.
Windows 7 : Enhancing Your Browsing Security (part 5) - Encoding Addresses to Prevent IDN Spoofing
I mentioned earlier that phishers often resort to IDN spoofing to fool users into thinking an address is legitimate. For example, instead of the address ebay.com, a phisher might use εbáy.com (with the Greek letters ε (epsilon) and α (alphá) in place of e and a).
Windows 7 : Enhancing Your Browsing Security (part 4) - Thwarting Phishers with the SmartScreen Filter
Phishing refers to creating a replica of an existing web page to fool a user into submitting personal, financial, or password data. The term comes from the fact that Internet scammers are using increasingly sophisticated lures as they “fish” for users’ financial information and password data.
Windows 7 : Enhancing Your Browsing Security (part 3) - Changing a Zone’s Security Level
To change the security level for a zone, select the zone and then use the Security Level for This Zone slider to set the level. To set up your own security settings, click Custom Level.
Windows 7 : Enhancing Your Browsing Security (part 2) - Adding and Removing Zone Sites
When implementing security for Internet Explorer, Microsoft realized that different sites have different security needs. For example, it makes sense to have stringent security for Internet sites, but you can probably scale the security back a bit when browsing pages on your corporate intranet.
Windows 7 : Enhancing Your Browsing Security (part 1) - Blocking Pop-Up Windows
Among the most annoying things on the Web are those ubiquitous pop-up windows that infest your screen with advertisements when you visit certain sites.
Windows 7 : Configuring Internet Explorer Security - Enhancing Your Browsing Privacy (part 4) - InPrivate Browsing and Filtering
Fortunately, Internet Explorer 8 implements a single new feature that solves both problems: InPrivate browsing. When you activate this feature, Internet Explorer stops storing private data when you visit websites
Windows 7 : Configuring Internet Explorer Security - Enhancing Your Browsing Privacy (part 3) - Enhancing Online Privacy by Managing Cookies
A cookie is a small text file that’s stored on your computer. Websites use them to “remember” information about your session at that site: shopping cart data, page customizations, usernames, passwords, and so on.
Windows 7 : Configuring Internet Explorer Security - Enhancing Your Browsing Privacy (part 2) - Clearing the Address Bar List
Another part of Internet Explorer’s AutoComplete feature involves the web addresses that you type into the address bar. When you start typing a URL into the address bar, Internet Explorer displays a list of addresses that match what you’ve typed
Windows 7 : Configuring Internet Explorer Security - Enhancing Your Browsing Privacy (part 1)
You might think that the biggest online privacy risks are sitting out “there” in cyberspace, but that’s not true. Your biggest risk is actually sitting right under your nose, so to speak: It’s Internet Explorer
Windows 7 : Managing Windows Firewall (part 2)
If you need to open a port on your computer, you can’t do it via the Allowed Programs windows. Instead, you need to work with a Microsoft Management Console snap-in called Windows Firewall with Advanced Security (WFAS).
Windows 7 : Managing Windows Firewall (part 1)
By default, Windows Defender is set up to perform a Quick Scan of your system every morning at 2:00 a.m. To change this, select Tools, Options, Automatic Scanning, and then use the controls to specify the scan frequency time and type.
Windows 7 : Checking Your Computer’s Security Settings (part 2)
By default, Windows Defender is set up to perform a Quick Scan of your system every morning at 2:00 a.m. To change this, select Tools, Options, Automatic Scanning, and then use the controls to specify the scan frequency time and type.
Windows 7 : Checking Your Computer’s Security Settings (part 1)
By far, the most important thing you need to do to thwart crackers is to have a software firewall running on your computer. A firewall is a security feature that blocks unauthorized attempts to send data to your compute
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
Video Tutorail Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Celebrity Style, Fashion Trends, Beauty and Makeup Tips.