Click here to Skip to main content
15,881,803 members

Videos


Page 1 of 6
1 2 3 4 5 6


.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
1. SMiShing & Canadian Banks & Data
Earlier this spring became aware of a new cyber attack (Smishing) spreading across the US after migrating it’s way through Asia. This new attack as you may have already guessed was SMiShing and subsequently it’s close cousin Vishing.
All Topics » »
CdnSecurityEngineer Updated: 14 Dec 2015
Rating: 5.00/5 ( (1 vote))
2. Vendor: Insecure, Security
Vendor: Insecure, Security
All Topics » »
CdnSecurityEngineer Updated: 18 Nov 2015
Rating: 5.00/5 ( (1 vote))
3. How do I set the width on VBA List box
I am dynamically generating a VBA form. One of the items on the form is a list box, when attempting to set the width on the list box never works regardless of where I try. The code looks like Public Sub BuildForm() Dim ws As Worksheet Dim row As Integer Dim topSpaceAccum As...
VBA » »
CdnSecurityEngineer Updated: 18 Nov 2015
Rating: ( (No votes))
.

()
» »
Updated:
Rating: ()
.

()
» »
Updated:
Rating: ()
4. How do I Convert Java Client to use TLS instead of SSLv3
Hi, I have a java client that makes a SOAP SSLv3 request to a webservice. The web service provider has informed me that, effective May 1st, only TLS connections will be accepted. Now this doesn't require a change in the certificate or the trusted certificate. So I don't think I need to...
CdnSecurityEngineer Updated: 27 Mar 2015
Rating: ( (No votes))
5. Connecting SQL Express Entity Framework
So I am trying to setup an Entity framework app, however I am having some difficulty. The connection information in the App.config looks like.
Programming Languages » C# 5.0 »
CdnSecurityEngineer Updated: 18 Mar 2015
Rating: ( (No votes))
6. Think Like a General
How to think like a general
Multimedia » DirectX »
CdnSecurityEngineer Updated: 21 Feb 2015
Rating: 5.00/5 ( (1 vote))
.

()
» »
Updated:
Rating: ()
7. Security Engineer Manifesto
Security Engineer manifesto
Security » »
CdnSecurityEngineer Updated: 9 Feb 2015
Rating: 5.00/5 ( (3 votes))
8. Your Security Position & the Vendor’s
Your security position and the vendor's
All Topics » »
CdnSecurityEngineer Updated: 6 Feb 2015
Rating: 5.00/5 ( (2 votes))
9. AppSec Don’t Trust the Network
AppSec Don’t Trust the Network
All Topics » »
CdnSecurityEngineer Updated: 4 Feb 2015
Rating: 3.86/5 ( (3 votes))
10. Use of Managed Service Accounts
I know and understand the introduction of windows service accounts, and how various applications run as Windows Service Account or a virtual account. I also know that one can connect to things such a File Share etc using a Managed Service Account. Has anyone ever tried to do anything like...
Database Development » SQL Server » SQL Server 2012
CdnSecurityEngineer Updated: 17 Dec 2014
Rating: ( (No votes))
11. Why do I get Access Violation when Inserting pointer to hash_map
The issue was with the way AuthenticationRequestDelegator was being authenticated. Essentially a bald pointer was being created, which was allowing the constructor to fire, and then when registerAuthenticator was being called this was NULL. Which essentially means the pointer calling this...
CdnSecurityEngineer Updated: 7 Dec 2014
Rating: ( (No votes))
12. Why do I get Access Violation when Inserting pointer to hash_map
I am trying to construct a hash_map of values, key -> unique pointer, the code compiles fine. However on every execution I get an error from the STL about an access violation with iterators and I am not sure why. The offending code looks like. void...
CdnSecurityEngineer Updated: 7 Dec 2014
Rating: ( (No votes))
13. Insert base folder to all requests within a website
IIS has a URL rewrite module. It essentially allows you to define an inbound url rool and determine what the out bound url is. [^]I am still really confused as to the problem that you're facing. Why didn't you just make your url's relative that way it doesn't matter where your website is...
Web Development » IIS »
CdnSecurityEngineer Updated: 20 Nov 2014
Rating: ( (No votes))
14. Case for Security Intelligence
Case for Security Intelligence
Security » »
CdnSecurityEngineer Updated: 12 Nov 2014
Rating: 5.00/5 ( (1 vote))
15. how to delete data in (.txt) file in c programming language
Really you can ask a question here but you can't google the answer?http://www.codingunit.com/c-tutorial-deleting-and-renaming-a-file[^]
CdnSecurityEngineer Updated: 12 Nov 2014
Rating: 5.00/5 ( (1 vote))

Page 1 of 6
1 2 3 4 5 6