SQL Server 2008 Extended Events

SQL Server 2008 Extended Events are the new low level, high performance eventing system in SQL Server. They use less system resources and provide better tracking of SQL Server performance than previous methods like Perfmon and SQL Trace/Profiler events. Performance…

WCF Security

Overview Services and service consumers are often on opposite sides of trust boundaries. A trust boundary is a physical or virtual boundary within which actual levels of trust can vary. A trust boundary can be an application process, a machine,…

Limitations of SQL Azure

Below are the limitations in the SQL Azure CTP1: When writing applications for SQL Azure, you can use the following drivers and libraries: • .NET Framework Data Provider for SQL Server (System.Data.SqlClient) from the .NET Framework 3.5 Service Pack 1…

Dispersed Team Management Part -2

Act Global, Think Local Although quite different in makeup and operation, dispersed teams and local teams share some important characteristics. All successful teams need to be well designed. That includes defining the purpose of the team, building in project management…

Detect MITM attacks and Secure your clients

The following code demonstrates a dynamic URL generator written in C# for use in ASP.NET, implemented as a static class method, and its corresponding parser module that singles out MITM attackers by detecting multiple IP address mismatches originating from the…

Symmetric key Encryption and Decryption

I saw many of the applications with out basic level of security with respect to data transfer etc. Few people uses Base64 Encoding while sending data through URL which is a common practice. But a simple Javascript code can reverse…