Skip to main content

Home/ Agency Oasis Developers/ Group items tagged and

Rss Feed Group items tagged

Mark Ursino

WeBlog - 0 views

  •  
    WeBlog is a blog module for Sitecore 6.2+. It is the successor to the EviBlog module. Features Windows Live Writer integration (MetaWeblog API) Page Editor support and custom WebEdit ribbon Wordpress Import CSS-based themes, with custom themes possible (one included) Various blog navigation components Comments (with author notification and optional approval workflow) Comment CAPTCHA through MSCaptcha or reCAPTCHA Gravatar Support Social sharing through ShareThis or AddThis, and other Facebook and Twitter widgets Tagging and tagcloud RSS Feeds (Sitecore Integrated RSS) Multi-server (staged architecture) support Globalized labels and messaging (English, Danish, Dutch, and Japanese translations provided) Most importantly, WeBlog has been architected to allow you to easily integrate it into your existing content and design, and to allow you to customize its templates and layout to your project requirements.
mgraber

ASP.NET QuickStart Tutorials - 0 views

  • Securing Non-ASP.NET Files
  • ASP.NET handles requests for file extensions that are normally associated with ASP.NET, while IIS handles requests for all other file extensions. By default this means common file extensions such as .aspx and .asmx are processed by ASP.NET. This processing includes authentication and authorization to ASP.NET files. Sometimes though, a developer wants non-ASP.NET resources to be processed by ASP.NET. One reason for processing non-ASP.NET files through ASP.NET is to allow ASP.NET authentication and authorization to control access to these types of files. The combination of IIS6 on Windows Server 2003 and ASP.NET 2.0 provides the most flexibility for running the ASP.NET pipeline as part of processing a request for a non-ASP.NET resource. IIS6 includes support that allows ASP.NET 2.0 to perform authentication and authorization steps, and to then hand off the remainder of the processing of a non-ASP.NET resource back to IIS6. For example, it is possible to authenticate access to an ASP page using ASP.NET forms authentication, authorize access with ASP.NET's Url authorization and still allow the ASP ISAPI extension (asp.dll) to execute the ASP page. This support is possible because IIS6 introduced a new server support function for ISAPI extensions: HSE_REQ_EXEC_URL. Assume that a directory structure contains a mix of both ASP and ASP.NET files. The ASP.NET pages are used to log a user in with forms authentication, while the ASP pages represent the rest of the application. Using the IIS6 MMC, right-click on directory and create an application (this is the same step that is necessary when setting up a standard ASP.NET application). After an application has been created, click on the Configuration button that is located on the Directory property page. This will cause the Application Configuration dialog to be displayed. New to IIS6 is a feature called wildcard application mapping. The bottom of the Application Configuration dialog allows you to configure this feature. First determine the path for the ASP.NET ISAPI extension that processes ASP.NET files such as .aspx files. You can find this path by looking at the extensions that are listed in the Application Extensions list shown in the top half of the Application Configuration dialog. Click on the row in the list that maps the .aspx extension, and select the Edit button. In the dialog that pops up, highlight the text in the Executable textbox and copy it to the clipboard. Then cancel out of the dialog. Next, click the Insert button that is in the bottom half of the Application Configuration dialog. A dialog box titled Add/Edit Application Extension Mapping will be displayed. In the Executable text box, enter the path to the ASP.NET ISAPI extension that you copied to the clipboard earlier. The end result should look something like the screenshot below.
  • Click OK to close out all of the dialogs. Now whenever a request is made for any file, the request will first be processed by ASP.NET. If the web.config for your ASP.NET application has enabled forms authentication, an unauthenticated request for a .asp file will first trigger a redirect to the login page configured for forms authentication. After a user has successfully logged in, they will be redirected back to the original .asp page. When the now-authenticated user requests the .asp page, ASP.NET will first run through the FormsAuthenticationModule to verify that the forms authentication cookie exists and is still valid. If this check passes, ASP.NET will hand processing of the .asp page back to IIS6, at which point IIS6 will pass the request on to the ISAPI extension that normally process .asp pages. In this case the extension is asp.dll and the ASP page will then run to completion. The reason ASP.NET will pass the request back to IIS6 is that non-ASP.NET resources will fall through the list of configured <httpHandlers> to the following entry: <add path="*" verb="GET,HEAD,POST" type="System.Web.DefaultHttpHandler" validate="True" /> The DefaultHttpHandler is responsible for handing requests back to IIS6 for further processing.
  •  
    "Securing Non-ASP.NET Files"
mgraber

ASP.NET View State Overview - 0 views

  •  
    "Encrypting View State Although MAC encoding helps prevent tampering with view state data, it does not prevent users from viewing the data. You can prevent people from viewing this data in two ways: by transmitting the page over SSL, and by encrypting the view state data. Requiring the page to be sent over SSL can help prevent data-packet sniffing and unauthorized data access by people who are not the intended recipients of the page. However, the user who requested the page can still view the view state data because SSL decrypts the page to display it in the browser. This is fine if you are not concerned about authorized users having access to view state data. However, in some cases, controls might use view state to store information that no users should have access to. For example, the page might contain a data-bound control that stores item identifiers (data keys) in view state. If those identifiers contain sensitive data, such as customer IDs, you should encrypt the view state data in addition to or instead of sending the page over SSL. To encrypt the data, set the page's ViewStateEncryptionMode property to true. If you store information in view state, you can use regular read and write techniques; the page handles all encryption and decryption for you. Encrypting view state data can affect the performance of your application. Therefore, do not use encryption unless you need it. Control State Encryption Controls that use control state can require that view state be encrypted by calling the RegisterRequiresViewStateEncryption method. If any control in the page requires that view state be encrypted, all view state in the page will be encrypted. Per-user View State Encoding If a Web site authenticates users, you can set the ViewStateUserKey property in the Page_Init event handler to associate the page's view state with a specific user. This helps prevent one-click attacks, in which a malicious user creates a valid, pre-filled Web page with view state from a pre
Mark Ursino

Closure Compiler - Google Code - 0 views

  •  
    The Closure Compiler is a tool for making JavaScript download and run faster. It is a true compiler for JavaScript. Instead of compiling from a source language to machine code, it compiles from JavaScript to better JavaScript. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes what's left. It also checks syntax, variable references, and types, and warns about common JavaScript pitfalls.
mgraber

James Jardine : Developer Notes - 0 views

  •  
    "Cross Site Request Forgery (CSRF) This article assumes you already understand what CSRF is and how it works. If you don't, do a quick Google search and it will clear it up. CSRF can be done using POST or GET, but GET is much easier to implement. By default, ASP.Net forms and other functionality work via the POST method. If we could submit a GET instead of a POST it would open up the attack surface a great deal. No longer do we need someone to visit a page with a form on it, but we could actually embed the GET request (a link) in emails or other medium. Fortunately for the attacker, unfortunately for the developer, .Net uses Value Shadowing for its controls. This means all server side controls, ie. Viewstate, EventValidation, EventCommand, EventArguments, etc.. It is possible to take the values that would be submitted as part of the form and just add them to the Querystring instead. Now there is a GET request that is comparable to the POST request. ASP.Net Webforms does not check whether a post back comes from GET or POST. The one thing to keep in mind is that the URL in a GET is limited in size. If the form is large and the viewstate is very large, this could block this technique from working. This depends on the way the application is configured (more later)."
Mark Ursino

Kube Framework - 0 views

  •  
    Minimal and enough. Adaptive and responsive. Revolution grid and beautiful typography. No imposed styles and freedom.
Mark Ursino

Speed Tracer - Google Web Toolkit - Google Code - 0 views

  •  
    " Speed Tracer is a tool to help you identify and fix performance problems in your web applications. It visualizes metrics that are taken from low level instrumentation points inside of the browser and analyzes them as your application runs. Speed Tracer is available as a Chrome extension and works on all platforms where extensions are currently supported (Windows and Linux). "
Mark Ursino

Sitecore Scaling Guide - 0 views

  •  
    This document describes how you can scale a Sitecore CMS 6.3 solution by configuring multiple instances in one or more environments, such as Content Management (CM) and Content Delivery (CD). After defining requirements and recommendations for Sitecore CMS 6.3 multi-instance solutions, this document provides instructions to configure CM and CD environments, and describes the steps required to configure an example implementation.
Douglas Couto

Download LINQPad - 0 views

shared by Douglas Couto on 15 Mar 10 - Cached
  •  
    "Tired of querying in antiquated SQL? Well, you don't have to! LINQPad lets you interactively query databases in a modern query language: LINQ. Kiss goodbye to SQL Management Studio! LINQPad supports everything in C# 3.0 and Framework 3.5, and more: * LINQ to Objects * LINQ to SQL and Entity Framework * LINQ to XML * WCF Data Services & SQL Azure * LINQ to SQLite and MySQL Enterprise Server * Mindscape LightSpeed ORM * (Even old-fashioned SQL!)"
Mark Ursino

Charles Web Debugging Proxy * HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Reverse P... - 0 views

  •  
    Charles is an HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet. This includes requests, responses and the HTTP headers (which contain the cookies and caching information).
Mark Ursino

PowerCommands for Visual Studio 2010 - 0 views

  •  
    The Format document on save option formats the tabs, spaces, and so on of the document being saved. It is equivalent to pointing to the Edit menu, clicking Advanced, and then clicking Format Document. The Remove and sort usings option removes unused using statements and sorts the remaining using statements in the document being saved.
Mark Ursino

loadUI - The Home of Load Testing - 0 views

  •  
    loadUI is a free and open source cross-platform Load Testing solution. With a visual, drag-and-drop interface, it allows you to create, configure and redistribute your Load Tests interactively and in real-time.
Mark Ursino

BlueScreenView - View blue screen of death (STOP error) information. - 0 views

  •  
    BlueScreenView scans all your minidump files created during 'blue screen of death' crashes, and displays the information about all crashes in one table. For each crash, BlueScreenView displays the minidump filename, the date/time of the crash, the basic crash information displayed in the blue screen (Bug Check Code and 4 parameters), and the details of the driver or module that possibly caused the crash (filename, product name, file description, and file version). For each crash displayed in the upper pane, you can view the details of the device drivers loaded during the crash in the lower pane. BlueScreenView also mark the drivers that their addresses found in the crash stack, so you can easily locate the suspected drivers that possibly caused the crash.
Mark Ursino

Closure Library - Google Code - 0 views

  •  
    The Closure Library is a broad, well-tested, modular, and cross-browser JavaScript library. You can pull just what you need from a large set of reusable UI widgets and controls, and from lower-level utilities for DOM manipulation, server communication, animation, data structures, unit testing, rich-text editing, and more.
Mark Ursino

OpenCalais Integration Module - 0 views

  •  
    OpenCalais Integration module allows you to to automatically discover semantic relations between your content, Create relevant tags in the Sitecore Taxonomy and tag your content with those by integrating the Sitecore Taxonomy Module, WeBlog Module or any Sitecore item based taxonomy seamlessly with OpenCalais service without additional development. The service is open for commercial and non-commercial use and is free if you don't need to tag more than 50,000 documents a day. The service is easy to apply in your project with this module and almost effortless if you're already using the Sitecore's Shared Source Taxonomy Module.
Mark Ursino

The C5 Generic Collection Library for C# and CLI - 0 views

shared by Mark Ursino on 17 Feb 10 - Cached
  •  
    C5 provides functionality and data structures not provided by the standard .Net System.Collections.Generic namespace, such as persistent tree data structures, heap based priority queues, hash indexed array lists and linked lists, and events on collection changes
Mark Ursino

iLightBox · Revolutionary Lightbox Plugin - 0 views

  •  
    Sleek, intuitive, powerful, and revolutionary jQuery lightbox plugin for creative and ambitious web designers and developers.
Mark Ursino

jQuery Org Chart - a plugin for visualising data in a tree-like structure « T... - 0 views

  •  
    jQuery OrgChart is a plugin that allows you to render structures with nested elements in a easy-to-read tree structure. To build the tree all you need is to make a single line call to the plugin and supply the HTML element Id for a nested unordered list element that is representative of the data you'd like to display. Features include: Very easy to use given a nested unordered list element. Drag-and-drop reorganisation of elements. Showing/hiding a particular branch of the tree by clicking on the respective node. Nodes can contain any amount of HTML except and . Easy to style.
mgraber

The Exchange database store may not mount in Exchange Server, and event IDs 9175, 486, ... - 0 views

  •  
    "The Exchange database store may not mount in Exchange Server, and event IDs 9175, 486, 455, 413, and 5 may be logged"
Mark Ursino

How To Estimate Software Tasks - 0 views

  •  
    Good article on estimating dev tasks: - Let developers estimate their own work - Design first, and in detail - Break things down to very small tasks - Track actual times and learn from your mistakes - Account for vacations, holidays, meetings, etc. - Add schedule items - Ignore business needs (and your manager) - Learn more
1 - 20 of 519 Next › Last »
Showing 20 items per page