programming4us
           
 
 
Windows
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 >  |  Displaying page 11 of 15, items 301 to 330 of 446.
Securing Windows 7 : Thwarting Snoops and Crackers (part 2) - Locking Your Computer Manually, Automatically
The locking techniques from the previous section are easy enough to do, but the hard part is remembering to do them. If you’re late for a meeting or a rendezvous, locking up your machine is probably the last thing on your mind as you dash out the door.
Securing Windows 7 : Thwarting Snoops and Crackers (part 1) - First, Some Basic Precautions
Let’s begin with a look at protecting your PC from direct attacks: that is, when an unauthorized cracker (which I define as a hacker who has succumbed to the Dark Side of the Force) sits down at your keyboard and tries to gain access to your system.
Windows 7 : Working with the Command-Line Tools (part 3) - Working with System Management Tools
System management is one of those catch-all terms that encompasses a wide range of tasks, from simple adjustments such as changing the system date and time to more complex tweaks such as modifying the Registry
Windows 7 : Working with the Command-Line Tools (part 2) - Working with File and Folder Management Tools
Windows Explorer is the GUI tool of choice for most file and folder operations. However, Windows 7 comes with an impressive collection of command-line file and folder tools that let you perform all the standard operations such as renaming, copying, moving, and deleting, as well as more interesting chores such as changing file attributes and comparing the contents of two files
Windows 7 : Working with the Command-Line Tools (part 1) - Working with Disk Management Tools
The real power of the command line shines through when you combine the techniques you’ve learned so far with any of Windows 7’s dozens of command-line tools.
SOA with .NET and Windows Azure : System.Transactions
.NET 1.0 and .NET 1.1 equated single resource transactions with ADO.NET and distributed resource transactions with .NET Enterprise Services. .NET 2.0 brought these two models together as the System.Transactions library, which established a simpler and more intuitive programming model with improved performance
Windows 7 : Understanding Batch File Basics (part 2) - Using Batch File Parameters
Most command-line utilities require extra information such as a filename (for example, when you use COPY or DEL) or a folder path (such as when you use CD or MD).
Windows 7 : Understanding Batch File Basics (part 1) - Creating Batch Files
As you’ve seen so far, the command line is still an often useful and occasionally indispensable part of computing life, and most power users will find themselves doing at least a little work in the Command Prompt window.
Discovering the Microsoft Azure Platform
Let's discover the three major components of the Microsoft Azure platform, also called the Azure services: Windows Azure, Windows Azure AppFabric, and SQL Azure.
SOA with .NET and Windows Azure : Microsoft Messaging Queue (MSMQ)
MSMQ was introduced as part of Windows NT 4.0. It established intermediary messaging queues that enabled reliability and scalability. An MSMQ implementation was typically comprised of three major components
Windows 7 : Working at the Command Line (part 3)
A device called CON (console) normally handles standard input and standard output, which is your keyboard and monitor. Windows 7 assumes that all command input comes from the keyboard and that all command output (such as a DIR listing or a system message) goes to the screen
Windows 7 : Working at the Command Line (part 2)
Windows 7 loads the DOSKEY utility by default when you start any command-line session. This useful little program brings a number of advantages to your command-line wor
Windows 7 : Working at the Command Line (part 1)
When you have your command-line session up and running, you can run commands and programs, create and launch batch files, perform file maintenance, and so on.
Windows 7 : Getting to the Command Line (part 2) - Running CMD
You can also launch Command Prompt using the CMD executable, which enables you to specify extra switches after the cmd.exe filename. Most of these switches aren’t particularly useful, so let’s start with the simplest syntax that you’ll use most ofte
Windows 7 : Getting to the Command Line (part 1)
To take advantage of the command line and all its many useful commands, you need to start a Command Prompt session. Windows 7 offers a number of different ways to do this, but perhaps the easiest is to select Start, type command, and then click Command Prompt in the search results
Windows Azure : Programming Access Control Service (part 10) - Deploying the Web Service in Windows Azure
Once you have tested the claims-based authentication and authorization for the ACSMachineInfo web service, you can package and deploy the web service as a Windows Azure cloud service
Windows Azure : Programming Access Control Service (part 9) - Configuring a Web Service Client to Acquire and Send SAML Tokens
In the previous example, you created a service namespace, token policy, and scope in ACS for processing SWT tokens generated by the web service consumer client. This example uses the same service namespace and token policy and only configures ACS to process the SAML token issued by the custom STS.
Windows Azure : Programming Access Control Service (part 8)
In the previous example, you created a service namespace, token policy, and scope in ACS for processing SWT tokens generated by the web service consumer client. This example uses the same service namespace and token policy and only configures ACS to process the SAML token issued by the custom STS.
Windows Azure : Programming Access Control Service (part 7) - Integrating ACS with a SAML Token Provider
As shown in Figure 6, the call to EncodeString() fails with an unauthorized exception when executed in the context of a User role as a group claim, whereas all the methods are executed when executed in the context of an Administrator role as a group claim.
Windows Azure : Programming Access Control Service (part 6)
As shown in Figure 6, the call to EncodeString() fails with an unauthorized exception when executed in the context of a User role as a group claim, whereas all the methods are executed when executed in the context of an Administrator role as a group claim.
Windows Azure : Programming Access Control Service (part 5)
The web service client creates an SWT token with input claims and sends it to ACS to acquire an SWT token with output claims. The web service client packages this token into the header of the web service method call
Windows Azure : Programming Access Control Service (part 4)
In Listing 4, trustedSolution represents your ACS service namespace, trustedAudienceValue represents the destination URL where the ACS token will be sent, and trustedSigningKey represents the token policy key associated with the token issuer your trust
Windows Azure : Programming Access Control Service (part 3)
A token policy defines the ACS token-issuing policy. You can create the token policy for the ACSMachineInfo example using Acm.exe as follows
Windows Azure : Programming Access Control Service (part 2)
To use ACS, you have to first create an ACS account from the AppFabric developer portal at http://netservices.azure.com. The provisioning process has changed over the past year from limited early adopter access through tokens to direct commercial access.
Windows Azure : Programming Access Control Service (part 1)
In this example, you learn to use ACS to protect access to a REST web service. Consider an example in which you're exposing a web service named ACSMachineInfo that returns simple machine information to the clients
Windows 7 : Working with Registry Entries (part 3)
If the setting is a REG_SZ value (as it is in our example), a REG_MULTI_SZ value, or a REG_EXPAND_SZ value, you see the Edit String dialog box, shown in Figure 12.5. Use the Value Data text box to enter a new string or modify the existing string, and then click OK
Windows 7 : Working with Registry Entries (part 2)
If the setting is a REG_SZ value (as it is in our example), a REG_MULTI_SZ value, or a REG_EXPAND_SZ value, you see the Edit String dialog box, shown in Figure 12.5. Use the Value Data text box to enter a new string or modify the existing string, and then click OK
Windows 7 : Working with Registry Entries (part 1) - Changing the Value of a Registry Entry
Changing the value of a Registry entry is a matter of finding the appropriate key, displaying the setting you want to change, and editing the setting’s value. Unfortunately, finding the key you need isn’t always a simple matter
Windows 7 : Keeping the Registry Safe
The sheer wealth of data stored in one place makes the Registry convenient, but it also makes it very precious. If your Registry went missing somehow, or if it got corrupted, Windows 7 simply would not work.
Windows 7 : Getting to Know the Registry (part 2)
The Registry may be a dangerous tool, but you can mitigate that danger somewhat by becoming familiar with the layout of the Registry and what it various bits and parts are used for
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us