Welcome to weblogs.com.pk Sign in | Join | Help

January 2005 - Posts

Windows :: IPSec

Windows 2000 onwards has the IPSec stack available that can be used to implement IP firewall rules. Windows 2003 is shipped with command NETSH that can be used to access these features. Here is how I recently configured a Slammer protection on one such
Posted by khurram | 3 Comments

Patterns & Practices :: Enterprise Library

Microsoft introduced Application Blocks; the building blocks that help us leverage the best practices. I personally have used their Data Access Application Block in lot of projects. Recently, Enterprise Library has been released that integrates most of
Posted by khurram | 1 Comments
Filed under: ,

NAT :: SQL :: Sharepoint

Last evening, I wanted to configure a box for multi-purpose. I am writing down the problems and their work-around that I faced J Networking :: NAT Network Address Translation (NAT) is useful to let people on private subnet to access the other subnets.

NUnitASP :: Unit Testing Web Based User Interfaces

Testing is an important defect removal technique. Unit testing is the most affective regression testing technique. NUnit is the mostly used CASE tool people uses around. NUnit helps us unit test class libraries. The missing part had been non availability
Posted by khurram | (Comments Off)
Filed under: ,

.NET Inspector for .NET Framework 2.0 Beta 1 (Whidbey)

http://www.dotnet2themax.com/DotNetBrowser/ShowAssemblies.aspx Welcome to the .NET Inspector, brought to you by Code Architects and the 2TheMax Team. Use this browser to explore all the assemblies, namespaces, types, and members in version 1.1 and 2.0
Posted by khurram | (Comments Off)
Filed under:

Must-have tools for .NET developers

Must-have tools for .NET developers
Posted by khurram | (Comments Off)
Filed under:

Ruby/.NET Bridge

Ruby/.NET Bridge http://www.saltypickle.com/RubyDotNet The Ruby/.NET Bridge lets you use .NET and Ruby objects together in your programs. You can access .NET objects from Ruby and vice-versa. 5 Minute Tutorial Download the latest bridge
Posted by khurram | (Comments Off)
Filed under:

SAP - Microsoft Deliver Developer Toolkit

http://www.infoworld.com/article/05/01/12/HNmssaptool_1.html SAP, Microsoft deliver developer tool Kit helps programmers build portal applications on SAP's NetWeaver SAP and Microsoft announced the availability of a new portal development kit, delivering
Posted by khurram | 1 Comments

Open Solaris

http://www.opensolaris.org The Solaris operating system is being released under the terms of the OSI-approved, CDDL (Common Development and Distribution License). Millions of development hours worth of code and over 1,600 patents are being contributed
Posted by khurram | (Comments Off)

Embedded Databases :: SharpHSQL :: Enhancing SharpHSQLReader to Support Data Binding

Data plays the centre role in today’s software. We are exposed to abstract data structures like arrays, stack, queues, linked lists, trees and maps etc, and then on the other hand we have relational, hierarchical and object database management systems.
Posted by khurram | 2 Comments
Filed under: ,

Looking for Pre-school Recommendations

Any recommendations for a pre-school for my son in Lahore area?
Posted by khurram | 2 Comments

Developing Software for Medical Professionals

I am supposed to develop a small payment/receipt/accounting system for the hospital. The in-charge of the unit (department) of hospital is sponsoring this experiment from his own personal pocket to streamline the “money” issues. (Personally
Posted by khurram | 1 Comments
Filed under: ,

RADIUS

I have been involved in a work that revolves around RADIUS, Remote Authentication Dial In User Service; one of the oldest protocols in the ISP industry. This protocol is used for AAA, Authentication, Authorization and Accounting. RADIUS in simple is set
Posted by khurram | 2 Comments

Group Policy :: gpupdate and event id 1030

To refresh Group policies across the domain we use the command gpupdate. Sometimes we may get the following entries in the event viewer of domain controller. “Windows cannot query for the list of Group Policy objects. Check the event log for possible
Posted by khurram | (Comments Off)

Eclipse, Tomcat & Lomboz

Lomboz is an Eclipse plugin for J2EE development. I configured it today with Tomcat 5. I was having problems debugging the web module from Eclipse. After little research I found the problem in eclipse\plugins\com.objectlearn.jdt.j2ee_3.0.1\servers\tomcat50x.server
Posted by khurram | (Comments Off)
Filed under:

MRTG on Windows

If you want to run MRTG on Windows, you need to edit the Perl\lib\FindBin.pm file. In the end, you need to enter the following lines, which resolve folder path problem. $RealBin = abs_path($RealBin) if($RealBin); ## existing line if ($IsWin32) { $Bin
Posted by khurram | (Comments Off)

XPath Injection

Few years back we used to think how to keep our applications safe from SQL Injection exploits, now due to recent trend of using technologies around XML we also need to think how to keep our applications safe from XPath Injection exploits. Blind XPath
Posted by khurram | (Comments Off)
Filed under: ,

Call Centres

In call centre applications, usually the most important desire from the call centre operator is automatic caller identification and to provide related details. For instance if it’s a mobile phone provider, they will wish that the system instantly
Posted by khurram | (Comments Off)
Filed under:

C#: Left() and Right()

Missing Left() and Right() functions of VB6 in C#? Here are these: public class Text { Text() {} static public string Left( string data, int length) { return data.Length<length? data: data.Substring(0, length); } static public string Right( string
Posted by khurram | (Comments Off)
Filed under: