Browse by Tags - Systems, architecture and engineering solutions! - Site Home - MSDN Blogs
Systems, architecture and engineering solutions!
This site will do in depth analysis of subjects such as service oriented architecture, software engineering and technologies such as Exchange and Sharepoint.
Translate This Page
Translate this page
30 Days to Launch
Academic Software Engineering
Azure Cloud Outage
Azure VM, Azure Cloud, Cloud, Windows Phone 7 cloud, I got a bunch of apps that need to be moved to the cloud
Azure, Azure App Fabric, Azure Cloud, Azure Code, Azure SLA, Azure Windows Phone 7, Cloud and mobile, mobile cloud, the world in your hand, cloud in your hand, Azure VM, Apple demotes laptop, Apple demotes desktop, Apple wants you stuck on their cloud, Ap
C++ Security Practices
code analysis for you final project
Excel SDK Excel Developer center
FORTRAN, Software Architecture
Free Azure 30 Day Pass, Free Azure access, Free Azure
Free Azure Access
Free Azure Pass
Free Azure Pass, Free Azure Access, Free Cloud
free security analysis tool
Free Security Tool
FxCop and Visual Studio 2010
HTML Samples, CSS, Samples, Windows Phone Development, LINQ, Azure sample, VC++ Client based code, WPF Documentation Samples, Free Samples
HTML5, XHTML, HTML5 Specification, Current HTML 5, HTML 5, How to meet ladies
LightSwitch, Database, Administration, Power Users, Team Explorer
Osama Bin Laden Scammer
Secure your code
Secure your code, free security analysis tool, code analysis for you final project, FxCop, FxCop and Visual Studio 2010, Free Security Tool
Security, Security Hacks, Security Essentials, Osama Bin Laden Scammer
Service Oriented Architecture
Software Design, Software engineering, Software Engineering, Software Design, Security, Windows 7, Windows 7 Security, Security Hacks, Security in WPF, Security Essentials, SMT, Software Quality, Whitebox Fuzzers, SAGE, Software Test, Software Design, Sof
Software Engineering Education is in poor shape in the US
Software Engineering, Software Design, Software Restriction Policy, Software Quality, Software Engineering Education is in poor shape in the US
Software Restriction Policy
Standards for Programming Languages
Team Foundation Server
Team Foundation Server, Team Foundation Server Installation, Team Project, Team Collection
Team Foundation Services
UML use cases
UML Visual Studio 2010 CMMI
Visual Studio 11
Visual Studio 11 beta
Visual Studio 12
Visual studio and TFS
Visual Studio Architech
Visual Studio Architect
Visual Studio Team Systems, Academics, Visual Studio 2010, SCRUM, Links to SCRUM, Project Planning, Project Management
Visual Studio Team Systems, Visual Studio 2010, Visual Studio Windows Phone Express, Visual Studio Web Developer, Deployment, ClickOnce Deployment Manifest, ClickOnce, ClickOnce Deployment, Click Once, Click Once Deployment, Visual Studio 2010 Ultimate, D
Visual Studio Ultimate
VS for Students
Windows 7 security
Windows 8 Operating System
Windows 8 Security
Windows 8 system
Windows Phone 7 cloud
Windows Phone 7 SDK
Windows Phone 7.1 SDK
Windows Phone 7.5, Mango, Changes in WP7
Windows Presentation Foundation
Browse by Tags
Systems, architecture and engineering solutions!
Tagged Content List
10 Questions to ask when Outsourcing to Azure
Top ten questions Which process, application and information can be moved to the cloud to gain efficiency and cost benefits while satisfying the organization's security and compliance requirements? How can the organization be harmed if systems, applications, services or information are accessed...
28 Jun 2012
List of four Kinect Security items
For a device that should be all about games, people are sure thinking up ways to use the Kinect for things like medicine and security. With security you might want to take a look at the following URLs: In home paranoia: Kinect Long Term Privacy Issues Daunting? A cover for your Kinect: Address...
20 Jun 2012
Pretty as a Picture Password, is it secure, really? How do you know? How can anyone know?
There are few things in life that are just freaking awesome! Having baby like the Egan’s just have (I guess), getting a degree in Computer Science, Engineering, Math or Science. A little further down the list is logging into your computer using a picture! This does mean that you will...
2 Apr 2012
5 top links: Security in Windows 8
Wow, Security in Windows 8 is going to move the needle. Here are 5 of the links I Protecting you from malware Protecting your digital identity Signing in with a picture password Optimizing picture password security (Keep your screen clean if you use this one!) http://code.msdn.microsoft...
19 Mar 2012
5 Links for Securing Silverlight
When my page views are extremely positive, it is time to discuss security, why? Because security is always a way to drive the numbers down. Let’s face it, no one wants to face the world of security or the discipline. Tell a potential “partner” that you do software security and it is likely...
27 Feb 2012
Free NSA Guidance for Addressing Malicious Code Risk and vocabulary list
Yep, that’s NSA as in National Security Agency, and you don’t have to burn it after reading! This is a great way to get up to speed on code risks. Zoom over to GUIDANCE FOR ADDRESSING MALICIOUS CODE RISK (you tell it is serious because it is all caps) So act now for this publication paid...
23 Feb 2012
OS Command Injection
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') See this previous blog for this subject: Software insecurity: Insecure Interaction Between Components So what is an “OS Command Injection”? (From: The software constructs all or part...
8 Feb 2012
Software Insecurity: SQL Injection code example
Code example of a bad example: SQL Injection using C# Code Snippet string userName = connection.getAuthenticatedUserName(); string query = "SELECT * FROM items WHERE owner = '" + userName + "' AND item = '" + ItemName.Text + "'" ; sda = new SqlDataAdapter...
7 Feb 2012
Software Insecurity: Risky Resource Management
The weaknesses in this category are related to ways in which software does not properly manage the creation, usage, transfer, or destruction of important system resources. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-22 Improper Limitation of a Pathname to a Restricted...
3 Feb 2012
Software insecurity: Insecure Interaction Between Components
The top 6 software insecurities, with links. CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-79 Improper Neutralization of Input During Web Page Generation...
1 Feb 2012
Costa Concordia: Mathematical Model of the Submarine
Hopefully the Costa Concordia won’t become a submarine, but the only ready control system design document that I could find easily was from MIT. Multivariable control system design for a submarine The copy isn’t printable since the document was generated in 1976, here is the diagram...
23 Jan 2012
Browser security: Chrome has the most security vulnerabilities
Well, I did my occasional checking up on browser security over the past three months with the various browsers. Graphs and a better post can be seen at Jerry Nixon's blog, leave nice comments there, bad comments here. :) http://jerrytech.blogspot.com/2011/10/browser-security-vulnerabilities.html...
24 Oct 2011
Page 1 of 1 (12 items)
© 2015 Microsoft Corporation.
Privacy & Cookies