Cryptography in .NET Succinctly

My latest Syncfusion eBook The need to convey information in a secure manner has existed for thousands of years. For as long as people have needed to communicate, other people have wanted to undermine any efforts to secure that information. You might think that you don’t have information important enough for anyone to want

The Daily Six Pack: April 27, 2015

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: Lambdas and LINQ Lambdas & LINQ in C# Explained, dotNetDave Other Your Password is Too Damn Short, Jeff Atwood Generating A Password in SQL Server with T-SQL from Random Characters, Dallas Snider Team Project Rename available on VS Online, Brian Harry Recommended add-ons/plugins for Microsoft Visual Studio, StackOverflow When Should

The Daily Six Pack: December 9, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: Edward Snowden Snowden and Greenwald: The Men Who Leaked the Secrets, Janet Reitman Other FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance, Craig Timberg, Ellen Nakashima The Sad Story Behind Yahoo's Latest Startup Acquisition: Ptch, Julie Bort Members of

The Daily Six Pack: November 25, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: New Windows 8.1 Settings New PC settings to play with, Anna Brinkmann Other Software, You're Doing it Wrong, Eli Weinstock-Herman NSA infected 50,000 computer networks with malicious software, Floor Boon #980 – Getting Data Out of a SecureString, Sean Sexton Visual Studio

The Daily Six Pack: November 7, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: iPad Air 10 Things Heavier Than the iPad Air, Mashable Other November Issue of MSDN Magazine, Michael Desmond Do you know what’s in your ‘Other’ Facebook folder, Josh Benson Windows 8.1 Preview: Experiments with SkyDrive and Files, Mike Taulty Microsoft warns flaw in Windows Vista, Server

The Daily Six Pack: October 31, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: .NET Security Security Driven .NET – A practical book for .NET security engineers, Stan Drapkin Other Controlling Skype with C#, Gabriel Szabo T-SQL Count of Tables, Views, Stored Procedures and Functions, Jason What Developers Need to Know About SQL Server, Brent

The Daily Six Pack: October 30, 2013

Fallback Image

A COLLECTION OF LINKS FOR LOVERS OF I.T. Dirk Strauss . . . . Feature link: Buffer Hacked Buffer confirms hackers stole users’ Twitter and Facebook tokens, but billing information unaffected, Kaylene Hong Other Different ways of getting Path, Abhishek Sur My Responsibilities as a Social Media Strategist, Ahna Hendrix 5 Claims About SQL, Explained, Alex Bolenok How to Get the IP

Crypto Obfuscator – Protect Your Code And Intellectual Property

Fallback Image

Crypto Obfuscator - There are a few things that I consider rather important when developing an application for resale. Two of those are licensing and protecting your source code. If you had to sell an application, would you be confident enough that the source could not be reverse engineered? There are