Skip to main content

Home/ Agency Oasis Developers/ Group items tagged class

Rss Feed Group items tagged

Mark Ursino

Untie LINQ to SQL Connection String from Application Settings | {Programming} & Life - 1 views

  •  
    Did you know that by default LINQ to SQL defines your connection string in more than one place if you define your LINQ to SQL classes out from a web app, such as a data access layer class library?
Mark Ursino

Property vs. Method Guidelines - 1 views

  •  
    Class library designers often must decide between implementing a class member as a property or a method. In general, methods represent actions and properties represent data. Use the following guidelines to help you choose between these options.
Mark Ursino

json2csharp - generate c# classes from json - 0 views

shared by Mark Ursino on 15 Aug 12 - No Cached
  •  
    "generate c# classes from json"
Mark Ursino

PostSharp - 0 views

  •  
    Produce Cleaner Code with Aspects: Encapsulate common support behavior, such as exception handling, into classes that can be applied using .NET attributes. Remove Boilerplate Code: Stop duplicating code in and across systems. Build a support framework that your team can leverage across multiple apps. Focus on What Matters: Reduce system knowledge required across your team by factoring complex issues, such as multithreading, into aspects.
Mark Ursino

CustomItemGenerator - 0 views

  •  
    The custom item generator is a tool that is used to create classes which will wrap access to a template's fields.
Mark Ursino

miniXML - 0 views

  •  
    MiniXML is a set of PHP classes and Perl modules that allow you to access XML data and create valid XML output with a tree-based hierarchy of elements.
mgraber

SourceForge.net: PortableApps.com: Portable Software/USB: Files - 0 views

  • Mozilla Firefox, Portable Edition 2.0.0.20 Notes
    • mgraber
       
      Hey M3
    • mgraber
       
      download or else
Mark Ursino

Take Control of Your Web.Config - 1 views

  •  
    Helper class to get settings
Mark Ursino

Yedda Twitter C# Library - 0 views

  •  
    The Yedda Twitter C# Library provides easy access to the Twitter API. Every method in the Twitter API has a method in the C# class with the same name. Every method that can return one of the various formats such as RSS, XML and Atom follow the following convention "MethodNameAsFormat".
Douglas Couto

Using JavaScript Along with ASP.NET 2.0 - 0 views

  •  
    "This class would be best used when you have a JavaScript function that you want to initiate when the page is loaded."
Mark Ursino

Sending agents - Sitecore - 0 views

  •  
    Details about web.config agents and passing in method parameters and defining class properties
Mark Ursino

HTML5 Front End Development Framework | G5 Framework - 1 views

  •  
    - HTML5 baseline - Base CSS - PHP Active Class - Smooth Scroll to Top - HTML5 Placeholder Fallback - Base SEO - Based on a F Layout - Sticky Footer - Clean Organization
Mark Ursino

FireQuery - 0 views

  •  
    * jQuery expressions are intelligently presented in Firebug Console and DOM inspector * attached jQuery data are first class citizens * elements in jQuery collections are highlighted on hover * jQuerify: enables you to inject jQuery into any page
Mark Ursino

FireQuery = Firebug enhancements for jQuery - 0 views

  •  
    FireQuery is a Firefox addon integrated with Firebug: - jQuery expressions are intelligently presented in Firebug Console and DOM inspector - attached jQuery datas are first class citizens - elements in jQuery collections are highlighted on hover - jQuerify: enables you to inject jQuery into any web page
mgraber

Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet - OWASP - 0 views

  •  
    "Viewstate (ASP.NET) ASP.NET has an option to maintain your ViewState. The ViewState indicates the status of a page when submitted to the server. The status is defined through a hidden field placed on each page with a control. Viewstate can be used as a CSRF defense, as it is difficult for an attacker to forge a valid Viewstate. It is not impossible to forge a valid Viewstate since it is feasible that parameter values could be obtained or guessed by the attacker. However, if the current session ID is added to the ViewState, it then makes each Viewstate unique, and thus immune to CSRF. To use the ViewStateUserKey property within the Viewstate to protect against spoofed post backs. Add the following in the OnInit virtual method of the Page-derived class (This property must be set in the Page.Init event) protected override OnInit(EventArgs e) { base.OnInit(e); if (User.Identity.IsAuthenticated) ViewStateUserKey = Session.SessionID; } The following keys the Viewstate to an individual using a unique value of your choice. (Page.ViewStateUserKey) This must be applied in Page_Init because the key has to be provided to ASP.NET before Viewstate is loaded. This option has been available since ASP.NET 1.1. However, there are limitations on this mechanism. Such as, ViewState MACs are only checked on POSTback, so any other application requests not using postbacks will happily allow CSRF. "
mgraber

Specificity Calculator - 0 views

shared by mgraber on 23 Jan 13 - No Cached
  •  
    Specificity Calculator isn't a CSS validator. If you enter invalid selectors it will return incorrect results. For example, the negation pseudo-class may only take a simple selector as an argument. Using a psuedo-element or combinator as an argument for :not() is invalid CSS3 so Specificity Calculator will return incorrect results.
mgraber

ASP.NET QuickStart Tutorials - 0 views

  • Securing Non-ASP.NET Files
  • ASP.NET handles requests for file extensions that are normally associated with ASP.NET, while IIS handles requests for all other file extensions. By default this means common file extensions such as .aspx and .asmx are processed by ASP.NET. This processing includes authentication and authorization to ASP.NET files. Sometimes though, a developer wants non-ASP.NET resources to be processed by ASP.NET. One reason for processing non-ASP.NET files through ASP.NET is to allow ASP.NET authentication and authorization to control access to these types of files. The combination of IIS6 on Windows Server 2003 and ASP.NET 2.0 provides the most flexibility for running the ASP.NET pipeline as part of processing a request for a non-ASP.NET resource. IIS6 includes support that allows ASP.NET 2.0 to perform authentication and authorization steps, and to then hand off the remainder of the processing of a non-ASP.NET resource back to IIS6. For example, it is possible to authenticate access to an ASP page using ASP.NET forms authentication, authorize access with ASP.NET's Url authorization and still allow the ASP ISAPI extension (asp.dll) to execute the ASP page. This support is possible because IIS6 introduced a new server support function for ISAPI extensions: HSE_REQ_EXEC_URL. Assume that a directory structure contains a mix of both ASP and ASP.NET files. The ASP.NET pages are used to log a user in with forms authentication, while the ASP pages represent the rest of the application. Using the IIS6 MMC, right-click on directory and create an application (this is the same step that is necessary when setting up a standard ASP.NET application). After an application has been created, click on the Configuration button that is located on the Directory property page. This will cause the Application Configuration dialog to be displayed. New to IIS6 is a feature called wildcard application mapping. The bottom of the Application Configuration dialog allows you to configure this feature. First determine the path for the ASP.NET ISAPI extension that processes ASP.NET files such as .aspx files. You can find this path by looking at the extensions that are listed in the Application Extensions list shown in the top half of the Application Configuration dialog. Click on the row in the list that maps the .aspx extension, and select the Edit button. In the dialog that pops up, highlight the text in the Executable textbox and copy it to the clipboard. Then cancel out of the dialog. Next, click the Insert button that is in the bottom half of the Application Configuration dialog. A dialog box titled Add/Edit Application Extension Mapping will be displayed. In the Executable text box, enter the path to the ASP.NET ISAPI extension that you copied to the clipboard earlier. The end result should look something like the screenshot below.
  • Click OK to close out all of the dialogs. Now whenever a request is made for any file, the request will first be processed by ASP.NET. If the web.config for your ASP.NET application has enabled forms authentication, an unauthenticated request for a .asp file will first trigger a redirect to the login page configured for forms authentication. After a user has successfully logged in, they will be redirected back to the original .asp page. When the now-authenticated user requests the .asp page, ASP.NET will first run through the FormsAuthenticationModule to verify that the forms authentication cookie exists and is still valid. If this check passes, ASP.NET will hand processing of the .asp page back to IIS6, at which point IIS6 will pass the request on to the ISAPI extension that normally process .asp pages. In this case the extension is asp.dll and the ASP page will then run to completion. The reason ASP.NET will pass the request back to IIS6 is that non-ASP.NET resources will fall through the list of configured <httpHandlers> to the following entry: <add path="*" verb="GET,HEAD,POST" type="System.Web.DefaultHttpHandler" validate="True" /> The DefaultHttpHandler is responsible for handing requests back to IIS6 for further processing.
  •  
    "Securing Non-ASP.NET Files"
1 - 20 of 23 Next ›
Showing 20 items per page