May 2004 - Posts
One more Buzz for 1 GB Mail lovers...Here you go...
Now a new and exclusive home is ready for Internet Information Server (IIS) at www.tryiis.com from Microsoft.
The website is describing some of the most wanted topics of IIS 6.0, any developer or architect would need like
01. Why Should You Consider IIS 6.0?
02. What Difference Can IIS 6.0 Make to Your Organization?
03. The 6 reasons to Try IIS 6.0
with lot of additional resources and webcasts supporting the above points....
Microsoft's P & P has released a new book called “The Antivirus Defense-in-Depth Guide”
[Microsoft] :- “Microsoft Solutions for Security: The Antivirus Defense-in-Depth Guide provides an easy to understand overview of the assorted types of malware, their risks, characteristics, means of replication and payloads. The solution also details the considerations for implementing a comprehensive antivirus defense for your network, servers and clients which goes beyond simply installing antivirus software into the related tools which will help reduce your risk of infection. Lastly, the solution provides a comprehensive methodology for quickly and effectively responding to outbreaks or incidents when they occur.”
MSDN has created a collection of articles on above given subject. Now they have added a new article on "Sets"
Part 1 (Introduction)
Part 3 (Binary Trees and BST)
Part 5 (From Trees to Graphs)
Part 6 (Effectively Representing Sets)
Now it is avaiable here.
You can also submit your own questions and comments for this web site.
Oh! Now I am able to see this post…cool J
FREE XDN Professional for .NET Bloggers during May 2004
Mike Schinkel, president of Xtras.Net, made an offer on his personal blog of a free XDN Professional membership (http://www.xtras.net/xdn) during the month of May 2004 for anyone that blogs about .NET frequently. If you are a .NET blogger, see Mike's post for how to get your free XDN membership.
Now this excellent course is avaiable online for free.
A must for all the .NET Developers who want to write secure code.
While reading a course material on secutity I found these “Golden rules of security”
Refers to the ability to verify that a user is who he/she says he/she is.
Controls what resources an authenticated user can access.
The ability to keep track of user actions for traceability and diagnosis of possible security weaknesses.
Ensures that user data can be viewed only by authorized users.
Making sure user data is complete, accurate, avaiable, and has not been manipulated.
Providing evidence that an action has occured so that a user cannot deny that he or she performed it.
There are some Key Security Concerns about security which are similar to these also avaiable for refernce here.
Google Re-Launched blogger with a great look and feature set which can match any of the modern web log providers. Homepage was totally revamped and give you a nice description about what is a blog ?
The cool features added are :
01. New Template Galore (I love these...)
03. Profiles (Describes you)
04. Individual Pages for each post
Find out more here
I have configured my old blog with new settings now :)
More Posts Next page »