The Daily Six Pack: April 27, 2015

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: Lambdas and LINQ Lambdas & LINQ in C# Explained, dotNetDave Other Your Password is Too Damn Short, Jeff Atwood Generating A Password in SQL Server with T-SQL from Random Characters, Dallas Snider Team Project Rename available on VS Online, Brian Harry Recommended add-ons/plugins for Microsoft Visual Studio, StackOverflow When Should

The Daily Six Pack: December 9, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: Edward Snowden Snowden and Greenwald: The Men Who Leaked the Secrets, Janet Reitman Other FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance, Craig Timberg, Ellen Nakashima The Sad Story Behind Yahoo's Latest Startup Acquisition: Ptch, Julie Bort Members of

The Daily Six Pack: November 25, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: New Windows 8.1 Settings New PC settings to play with, Anna Brinkmann Other Software, You're Doing it Wrong, Eli Weinstock-Herman NSA infected 50,000 computer networks with malicious software, Floor Boon #980 – Getting Data Out of a SecureString, Sean Sexton Visual Studio 2013 Asynchronous Debugging, Gaston Hillar Windows

Scumbag Scammers – My Conversation With The Devil In Disguise

Scumbag Scammers - I have always maintained that the easiest way to hack someone, obtain access to their PC or to get someone's password is to simply ask them for it. There is a worrying trend in the world where more and more people's private information is being compromised by

The Daily Six Pack: November 7, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: iPad Air 10 Things Heavier Than the iPad Air, Mashable Other November Issue of MSDN Magazine, Michael Desmond Do you know what’s in your ‘Other’ Facebook folder, Josh Benson Windows 8.1 Preview: Experiments with SkyDrive and Files, Mike Taulty Microsoft warns flaw in Windows Vista, Server

The Daily Six Pack: October 31, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: .NET Security Security Driven .NET – A practical book for .NET security engineers, Stan Drapkin Other Controlling Skype with C#, Gabriel Szabo T-SQL Count of Tables, Views, Stored Procedures and Functions, Jason Gaylord What Developers Need to Know About SQL Server, Brent Ozar Remove "SecureBoot isn't

The Daily Six Pack: October 30, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: Buffer Hacked Buffer confirms hackers stole users’ Twitter and Facebook tokens, but billing information unaffected, Kaylene Hong Other Different ways of getting Path, Abhishek Sur My Responsibilities as a Social Media Strategist, Ahna Hendrix 5 Claims About SQL, Explained, Alex Bolenok How to Get the IP

Crypto Obfuscator – Protect Your Code And Intellectual Property

Fallback Image

Crypto Obfuscator - There are a few things that I consider rather important when developing an application for resale. Two of those are licensing and protecting your source code. If you had to sell an application, would you be confident enough that the source could not be reverse engineered? There are