----------------------------------------------- Begin ---------------------------------------------
Title: detect and block GDI leaks in your code using two powerful Windows XP tools
Time: 2004-12-20 11:00:00
Overview: Build and describe the two tools designed to detect and eliminate GDI leaks in applications running on Windows XP, Windows 2000, and Windows NT.
----------------------------------------------- Begin ---------------------------------------------
Title: Driver Chain Manager
Time: 2004-12-20 11:00:00
Introduction: Learn about the driver Chain Manager (DCM) when a user of a secondary technology product installs multiple screen readers, screen amplifiers, or remote access software on his computer) how to help reduce errors that users will experience.
----------------------------------------------- Begin ---------------------------------------------
Title: Avoid auto refresh
Time: 2004-12-20 11:00:00
Introduction: describes an optional method for automatic page refresh in HTML. When a page is reloaded without user requests, automatic page refresh will make users with cognitive impairment overwhelmed. This document describes how to apply an explicit manual page refresh control.
----------------------------------------------- Begin ---------------------------------------------
Title: mytracer Monitoring and Tracking ASP. NET Applications
Time: 2004-12-20 11:00:00
Introduction: in this topic, we will first analyze all ASP.. NET applications can use the tracking subsystem, and then write a Windows form application, to execute a given page and collect runtime information such as the view status, request context, and Global Object (such as cache, application, and session) of the page.
----------------------------------------------- Begin ---------------------------------------------
Title: Exploring s4u Kerberos extensions in Windows Server 2003
Time: 2004-12-20 11:00:00
Introduction: server developers can program with the built-in security model provided by windows to use the group-based authorization framework that administrators are already familiar.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: Visual Studio 2005: msbuild
Time: 11:00:00 |
Introduction: in this show, Alex kipman shows how to use Microsoft's new platform msbuild to fundamentally change the Visual Studio generation process.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: clickonce Introduction: Web deployment of Windows Forms applications
Time: 11:00:00 |
Introduction: Visual Studio 2005 (formerly called "Whidbey") is a technology codenamed "clickonce". By using this technology, developers can write Windows Forms applications to take advantage of the powerful functions of the client, and can also easily deploy and upgrade like web pages.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: Use Visual Studio 2005 to write managed code for SQL Server 2005
Time: 11:00:00 |
Introduction: with SQL Server 2005, you can write managed code running on the server. Visual Studio 2005 makes it easy to build stored procedures, triggers, data types, and aggregation in managed code. Milind Lele demonstrates how to create, deploy, and debug user-defined data types (UDT) in Visual Basic ).
----------------------------------------------- Begin ---------------------------------------------
Title: get the menu handle, declare getparam, and filter file name
Time: 11:00:00 |
Introduction: C ++ Q & A: get the menu handle, declare getparam, and filter file name
----------------------------------------------- Begin ---------------------------------------------
Title: use XML to unlock information in Microsoft Office 2003
Time: 11:00:00 |
Introduction: Learn how to process and use the sample Web application built using ASP. NET, which demonstrates how to process and use these documents externally in the application that creates Microsoft Office documents.
----------------------------------------------- Begin ---------------------------------------------
Title: using Microsoft Office Visio 2003 ActiveX Control programmatically
Time: 11:00:00 |
Introduction: Learn to associate Microsoft? Office Visio? 2003 ActiveX? Controls (that is, the Visio Drawing Control) are integrated into applications. View best practices and how to use the Visio Drawing Control programmatically.
----------------------------------------------- Begin ---------------------------------------------
Title: Enable data tracing with Smart Tags in Excel
Time: 11:00:00 |
Introduction: Learn how to use smart tags to reestablish connections between data stored in workbooks and other data in the enterprise. Explore how to use regular expressions to develop intelligent tag recognition.
----------------------------------------------- Begin ---------------------------------------------
Title: extension of ASP. NET webmethod framework by adding XML Schema verification
Time: 11:00:00 |
Introduction: Add XML Schema verification to extend the webmethod framework through the custom soapextension class.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: Generic API in Microsoft. NET Framework
Time: 11:00:00 |
Introduction: This program outlines the main generic APIs, including the collections in the new namespace system. Collections. generic.
----------------------------------------------- Begin ---------------------------------------------
Title: Microsoft Active accessibility
Time: 2004-12-17 11:00:00
Overview: This overview describes how Microsoft Active accessibility helps software developers make their programs more compatible with auxiliary functions, and helps secondary function developers make auxiliary functions more reliable.
----------------------------------------------- Begin ---------------------------------------------
Title: Easy XML data manipulation using XPath and XSLT APIs in. NET Framework
Time: 2004-12-17 11:00:00
Introduction: In this article, the author examines the implementation details of the XPath navigator and XSLT processing programs, and contains some practical examples, such as Asynchronous conversion, sorting node set, and ASP.. NET Server Side conversion.
----------------------------------------------- Begin ---------------------------------------------
Title: making web pages more accessible
Time: 2004-12-17 11:00:00
Introduction: This article provides practical tips for making web pages easier to access, including applicable to users who cannot use or are difficult to use the mouse.
----------------------------------------------- Begin ---------------------------------------------
Title: allows users to add features to your. NET application through macros and plug-ins
Time: 2004-12-17 11:00:00
Introduction: In this article, the authors will describe the Extensible features of. NET Framework (including late binding and reflection) and their usage methods, as well as the plug-in security considerations.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: process and thread ID in ASP. NET
Time: 2004-12-16 11:00:00
Introduction: Erik Olson describes the configuration options for controlling processes and thread identifiers in ASP. NET.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: Drag once databinding)
Time: 2004-12-16 11:00:00
Introduction: introduces a new set of features that allow you to quickly build data-bound applications. In this show, Steve Lasker demonstrated the drag once databinding feature and introduced some enhancements after beta 1.
----------------------------------------------- Begin ---------------------------------------------
Title: msdn TV: code correction using fxcop
Time: 2004-12-16 11:00:00
Summary: Michael Murray and Jeffrey Van Gogh from the CLR team talked about fxcop, a free code analysis tool from Microsoft.
----------------------------------------------- Begin ---------------------------------------------
Title: host multiple ASP. NET Applications
Time: 11:00:00
Overview: This section describes the technologies used in Windows 2000 and 2003 to isolate ASP. NET applications to ensure the integrity, confidentiality, and authenticity of the hosted web site data.
----------------------------------------------- Begin ---------------------------------------------
Title: building secure service components
Time: 11:00:00
Introduction: This module explains how enterprise-level service (COM +) Security relies on Windows security to authenticate and authorize callers, how to ensure secure deployment of service components, as well as reliable coding technology and appropriate catalog configuration.
----------------------------------------------- Begin ---------------------------------------------
Title: Use code access security in ASP. NET
Time: 11:00:00
Introduction: This module details the actual elements of code access security. You will learn how to develop a moderately trusted web application to benefit from the security protection provided by code access security, you can still use components that require full trust.
----------------------------------------------- Begin ---------------------------------------------
Title: code access security practices
Time: 11:00:00
Introduction: The beginning of this unit details the working principle of code access security, and then a group of comprehensive examples, covers all resources that can be asserted, required, requested, or allowed to access security permissions by code.
----------------------------------------------- Begin ---------------------------------------------
Title: Guidelines for Designing Secure Web Applications
Time: 11:00:00
Introduction: This module presents a secure architecture and design guidelines. They are organized and categorized by common application defect categories. These are critical areas of Web Application Security and the most common areas of error.
----------------------------------------------- Begin ---------------------------------------------
Title: advanced systems format Overview
Time: 11:00:00
Introduction: advanced systems format (ASF) is an extensible file format designed to store and coordinate multimedia data online. This document provides a brief overview of the ASF file format and describes how to use this format on the Windows Media 9 series platform.
----------------------------------------------- Begin ---------------------------------------------
Title: audio and video technologies for hardware developers
Time: 11:00:00
Introduction: Microsoft digital media platform allows you to interact with and manipulate data from a wide range of hardware devices.
----------------------------------------------- Begin ---------------------------------------------
Title: *. DVR-MS File
Time: 11:00:00
Overview: This article describes how to access the recorded audio and video content stored on the Media Center PC hard disk in the form of *. DVR-MS files for independent software vendors and original device manufacturers.
----------------------------------------------- Begin ---------------------------------------------
Title: redistributing Windows Media Components
Time: 11:00:00
Introduction: This article describes how to use Microsoft? Windows Media? The runtime component includes the process and requirements during installation of your application.
----------------------------------------------- Begin ---------------------------------------------
Title: Build the Windows Media Player and Windows Media Encoder plug-ins
Time: 11:00:00
Introduction: This article discusses how to use Microsoft? Windows Media? Various types of plug-ins created by Player 9 series and Windows Media Encoder 9 Series. This article is intended for readers who have basic knowledge about the Component Object Model (COM) technology.
----------------------------------------------- Begin ---------------------------------------------
Title: Deployment assembly
Time: 11:00:00
Introduction: Explore options for deploying Assembly DLL in development and production environments.
----------------------------------------------- Begin ---------------------------------------------
Title: security architecture and design check
Time: 11:00:00
Introduction: This module puts forward issues that should be taken into account when conducting a comprehensive inspection of the architecture design.
----------------------------------------------- Begin ---------------------------------------------
Title: Deep farewell (Web team interview)
Time: 11:00:00
Summary: at the end of the topic, let's take a look at the highlights of SQLXML, Internet Explorer Web controls, Web navigation, and useful web team answers.
----------------------------------------------- Begin ---------------------------------------------
Title: Introduction to the Windows Media Metafile
Time: 11:00:00
Introduction: This article describes how to use the client Metafile in Windows Media Player 9 series.
----------------------------------------------- Begin ---------------------------------------------
Title: Use the zip class in the J # class library to compress files and data
Time: 2004-12-13 11:00:00
Introduction: This article explains how to use the Microsoft J # class library to create a C # application that can compress and decompress ZIP files. It also introduces some other unique parts of the J # Runtime Library that can be used in any. Net compatible language to save some coding work.
----------------------------------------------- Begin ---------------------------------------------
Title: Custom "Open File" dialog box
Time: 2004-12-13 11:00:00
Introduction: in this column, I will focus on the Location Bar of the "open file" General dialog box, and discuss how to customize the list of displayed folders, and how to make it special to applications, it is even specific to calls.
----------------------------------------------- Begin ---------------------------------------------
Title: Use Role-based security through the authorization manager in the middle layer. NET application
Time: 2004-12-13 11:00:00
Introduction: The authorization manager in Windows Server 2003 represents a significant improvement in role-based security management, enabling it to be more scalable, flexible, and easy to implement. You can use the authorization manager to define roles and tasks that can be executed by these roles. You can nest roles to inherit the features of other roles and define application groups.
----------------------------------------------- Begin ---------------------------------------------
Title: Custom provider controls
Time: 2004-12-13 11:00:00
Introduction: provides a program control to add new properties to an existing control without inheritance. This means that new attributes and actions are provided to existing controls using external extended controls. When such an extension is implemented, it does not add weight to the basic control, but is a lightweight alternative to inheritance. The provider control does not replace inheritance, but is extended and supplemented in multiple ways.
----------------------------------------------- Begin ---------------------------------------------
Title: Explore ADO. Net datarow
Time: 2004-12-13 11:00:00
Introduction: This article discusses how to use datarow to operate data, and focuses on how to import, load, traverse, search, and check data in ADO. NET and C.
----------------------------------------------- Begin ---------------------------------------------
Title: Secure Thread Synchronization
Time: 2004-12-13 11:00:00
Brief Introduction: describes the design intent and working method of syncblocks and monitor. Then, explain why the design is frightening and explain how to use the mechanism in a good and safe way.
----------------------------------------------- Begin ---------------------------------------------
Title: Use the. NET printing namespace to preview and print Windows Forms applications
Time: 2004-12-13 11:00:00
Introduction: system. windows. the forms namespace provides seamless integration with all standard print dialogs, but the system. drawing. the printing namespace provides a large number of classes for extension and customization.
----------------------------------------------- Begin ---------------------------------------------
Title: Use threads in server-side Web code and generate asynchronous handlers
Time: 2004-12-13 11:00:00
Introduction: In this article, the author will examine the thread processing in the ASP. net http pipeline and explain how to effectively manage threads without the involvement of developers.
----------------------------------------------- Begin ---------------------------------------------
Title: How to Protect developer Workstations
Time: 2004-12-10 11:00:00
Overview: protection for development workstations. Use a non-administrative account for development. Make sure that the latest operating system patches are applied. Lock IIS security. Lock SQL Server and MSDE security.
----------------------------------------------- Begin ---------------------------------------------
Title: Checklist: Protect Web Servers
Time: 2004-12-10 11:00:00
Overview: This checklist is part of the Guide for the unit "securing your web server. It is used to help implement secure Web servers, or as a brief comment on the corresponding unit.
----------------------------------------------- Begin ---------------------------------------------
Title: Checklist: Protection of Web Services
Time: 2004-12-10 11:00:00
Introduction: This checklist is part of the Guide for the unit "building secure Web Services. It helps you build and protect Web Services and serves as a brief description of the corresponding unit.
----------------------------------------------- Begin ---------------------------------------------
Title: Checklist: Remote Protection
Time: 2004-12-10 11:00:00
Introduction: This checklist is part of the Guide for the unit "building secure Remoted components. It helps you build security components that use Microsoft. NET remote processing technology, and serves as a brief description of the corresponding unit.
----------------------------------------------- Begin ---------------------------------------------
Title: Checklist: Network Protection
Time: 2004-12-10 11:00:00
Introduction: This checklist is part of the Guide for the unit "securing your network. Use it to help protect your network, or as a brief comment on the corresponding unit.
----------------------------------------------- Begin ---------------------------------------------
Title: Checklist: Protecting Enterprise Services
Time: 2004-12-10 11:00:00
Overview: This checklist is part of the Guide for units "building secure Serviced components" and "securing your application server. It helps you protect your Enterprise Services and the servers that run the services, or provide a brief comment on the corresponding unit.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.