Click here to Skip to main content
13,300,654 members (51,203 online)

Articles by Michael Haephrati (Articles: 29, Tip/Tricks: 2)

Articles: 29, Tip/Tricks: 2

RSS Feed

Average article rating: 4.94

Desktop Gadgets
General
Posted: 25 Jan 2012   Updated: 21 Mar 2015   Views: 53,100   Rating: 4.90/5    Votes: 65   Popularity: 8.89
Licence: The Code Project Open License (CPOL)      Bookmarked: 117   Downloaded: 3,411
A C++ client for uploading documents to your Google Docs account.
Files and Folders
Security
Posted: 18 Sep 2012   Updated: 12 Jun 2014   Views: 40,570   Rating: 4.92/5    Votes: 40   Popularity: 7.88
Licence: The Code Project Open License (CPOL)      Bookmarked: 44   Downloaded: 0
How the Shopping List mechanism was used as part of the Target Eye project
Miscellaneous
General
Posted: 4 Oct 2013   Updated: 12 Jun 2014   Views: 13,540   Rating: 4.91/5    Votes: 13   Popularity: 5.47
Licence: The Code Project Open License (CPOL)      Bookmarked: 12   Downloaded: 0
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it
Posted: 11 Aug 2013   Updated: 12 Jun 2014   Views: 66,660   Rating: 4.97/5    Votes: 40   Popularity: 7.96
Licence: The Code Project Open License (CPOL)      Bookmarked: 64   Downloaded: 0
In the fourth part of this series of articles, Michael Haephrati describes how keyboard capturing was implemented as part of Target Eye
Shell and IE programming
Shell Programming
Posted: 4 Jan 2012   Updated: 12 Jun 2014   Views: 89,270   Rating: 4.99/5    Votes: 58   Popularity: 8.80
Licence: The Code Project Open License (CPOL)      Bookmarked: 97   Downloaded: 1,412
How Target Eye's Auto updating mechanism allows a silent update of an application from identifying newer versions, downloading them and running them instead of the old one
Posted: 7 Oct 2014   Updated: 9 Jan 2017   Views: 11,970   Rating: 4.79/5    Votes: 17   Popularity: 5.88
Licence: The Code Project Open License (CPOL)      Bookmarked: 18   Downloaded: 152
This article explains how the Skype account details are stored, how to fetch this information and in general, how to interpret XML files using Rapid XML library.
Tools
Posted: 13 Jul 2014   Updated: 13 Jul 2014   Views: 15,450   Rating: 4.88/5    Votes: 30   Popularity: 7.20
Licence: The Code Project Open License (CPOL)      Bookmarked: 34   Downloaded: 987
How to develop a tool that will adjust mistaken date and time of multiple files, photos or videos
Posted: 12 Oct 2017   Updated: 12 Oct 2017   Views: 5,690   Rating: 5.00/5    Votes: 11   Popularity: 5.21
Licence: The Code Project Open License (CPOL)      Bookmarked: 11   Downloaded: 204
When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful.
Web Security
Security
Posted: 17 Sep 2012   Updated: 12 Jun 2014   Views: 58,000   Rating: 4.96/5    Votes: 51   Popularity: 8.47
Licence: The Code Project Open License (CPOL)      Bookmarked: 80   Downloaded: 3,454
How Target Eye's screen capturing mechanism works
iOS and watchOS
General
Posted: 1 Jun 2012   Updated: 15 Feb 2013   Views: 55,950   Rating: 4.97/5    Votes: 50   Popularity: 8.44
Licence: The Code Project Open License (CPOL)      Bookmarked: 69   Downloaded: 3,074
How great could it be to be able to send SMS messages from your IPhone using the Internet connection
Database
Utilities
Posted: 25 Sep 2012   Updated: 15 Feb 2013   Views: 25,970   Rating: 4.98/5    Votes: 38   Popularity: 7.87
Licence: The Code Project Open License (CPOL)      Bookmarked: 36   Downloaded: 0
The DataTune system was one of the earliest data cleansing systems.
C / C++ Language
General
Posted: 3 Dec 2012   Updated: 15 Feb 2013   Views: 96,510   Rating: 4.86/5    Votes: 65   Popularity: 8.80
Licence: The Common Development and Distribution License (CDDL)      Bookmarked: 115   Downloaded: 2,323
A string obfuscation system that integrates in a Visual Studio C++ solution
Posted: 12 Jun 2014   Updated: 15 Jun 2014   Views: 20,230   Rating: 4.88/5    Votes: 25   Popularity: 6.81
Licence: The BSD License      Bookmarked: 25   Downloaded: 0
Target Eye uses an outdated approach for hiding files and yet it is recently becoming practical
Posted: 8 Sep 2015   Updated: 8 Sep 2015   Views: 9,630   Rating: 4.86/5    Votes: 9   Popularity: 4.63
Licence: The Code Project Open License (CPOL)      Bookmarked: 6   Downloaded: 0
Pixelating images for privacy protection while running a monitoring and surveillance software.
Howto
Posted: 1 Jun 2012   Updated: 1 Jul 2013   Views: 246,070   Rating: 4.93/5    Votes: 84   Popularity: 9.50
Licence: The Code Project Open License (CPOL)      Bookmarked: 231   Downloaded: 16,294
How to send an SMS from a Desktop Applicaiton (written in C++).
C++ / CLI
Applications
Posted: 11 Sep 2017   Updated: 11 Sep 2017   Views: 8,140   Rating: 5.00/5    Votes: 17   Popularity: 6.15
Licence: The Code Project Open License (CPOL)      Bookmarked: 29   Downloaded: 189
A simple way to provide silent automatic updates with no server side code
.NET Framework
Utilities
Posted: 30 Jan 2012   Updated: 15 Feb 2013   Views: 38,130   Rating: 4.85/5    Votes: 57   Popularity: 8.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 66   Downloaded: 1,179
A pure Win32 API applicaiton that can analyze a .NET binary without .NET installed.
MFC
General
Posted: 21 Sep 2017   Updated: 21 Sep 2017   Views: 4,560   Rating: 5.00/5    Votes: 9   Popularity: 4.77
Licence: The Code Project Open License (CPOL)      Bookmarked: 6   Downloaded: 76
How to detect the currently use language regardless of the active application
Win32/64 SDK & OS
General
Posted: 27 Jan 2012   Updated: 15 Feb 2013   Views: 65,220   Rating: 4.94/5    Votes: 61   Popularity: 8.82
Licence: The Code Project Open License (CPOL)      Bookmarked: 100   Downloaded: 3,789
How can an applicaiton elevate itself to gain "Admin" rights during runtime
Windows API
General
Posted: 23 Aug 2013   Updated: 23 Aug 2013   Views: 20,270   Rating: 4.90/5    Votes: 23   Popularity: 6.68
Licence: The Code Project Open License (CPOL)      Bookmarked: 45   Downloaded: 0
An up to date article about NT Services
Algorithms & Recipes
General
Posted: 19 Jan 2013   Updated: 15 Feb 2013   Views: 58,250   Rating: 4.98/5    Votes: 57   Popularity: 8.74
Licence: The Code Project Open License (CPOL)      Bookmarked: 96   Downloaded: 3,445
Creating an application that can generate crosswords from a list of words
Cryptography & Security
Security
Posted: 9 Jan 2017   Updated: 9 Jan 2017   Views: 12,920   Rating: 4.99/5    Votes: 34   Popularity: 7.64
Licence: The Code Project Open License (CPOL)      Bookmarked: 38   Downloaded: 936
The article focuses on Wi-Fi stored credentials and how they can easily be fetched and decrypted.
Posted: 30 Jan 2017   Updated: 30 Jan 2017   Views: 10,240   Rating: 5.00/5    Votes: 17   Popularity: 6.15
Licence: The Code Project Open License (CPOL)      Bookmarked: 25   Downloaded: 229
Chrome stores all passwords and other credentials in an encrypted database but guess what: they can be retrieved by anyone with the proper knowledge. This article will show you how.
Posted: 30 Jan 2017   Updated: 30 Jan 2017   Views: 7,570   Rating: 5.00/5    Votes: 6   Popularity: 3.89
Licence: The Code Project Open License (CPOL)      Bookmarked: 13   Downloaded: 0
Internet Explorer allows two methods of credentials storage: web sites credentials (for example: your Facebook user and password) and autocomplete data. The data can be easily retrieved by anyone who knows how. This article will show you how.
Posted: 30 Jan 2017   Updated: 30 Jan 2017   Views: 7,530   Rating: 5.00/5    Votes: 11   Popularity: 5.21
Licence: The Code Project Open License (CPOL)      Bookmarked: 11   Downloaded: 0
Firefox is the most secured web browser. Finding a way to fetch its stored credentials wasn't easy, especially when it comes to the more recent versions. However, there is a way and it is shown in this article.
Uncategorised References
General
Posted: 12 Sep 2013   Updated: 12 Sep 2013   Views: 12,860   Rating: 5.00/5    Votes: 15   Popularity: 5.88
Licence: The Code Project Open License (CPOL)      Bookmarked: 11   Downloaded: 0
What might be the missing indrigent of today's Internet
Hardware & System
Hardware
Posted: 13 Sep 2013   Updated: 13 Sep 2013   Views: 6,690   Rating: 5.00/5    Votes: 3   Popularity: 2.39
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Michael Haephrati about the AmigaHASP copy protection system for the Amiga
Posted: 24 Jan 2012   Updated: 28 Jan 2015   Views: 167,160   Rating: 4.89/5    Votes: 96   Popularity: 9.69
Licence: The Code Project Open License (CPOL)      Bookmarked: 175   Downloaded: 14,965
How a computer can be identified in order to generate a unique ID.
Scrapbook
General
Posted: 27 Nov 2011   Updated: 9 Oct 2013   Views: 28,790   Rating: 4.96/5    Votes: 37   Popularity: 7.78
Licence: The Code Project Open License (CPOL)      Bookmarked: 25   Downloaded: 17
When I have devleoped Rashumon, there was no built in support for multi-lingual / bi-directional text and I had to develop such from scratch
No blogs have been submitted.

Average tips rating: 4.69

Database
SQL Server
Posted: 3 May 2016   Updated: 3 May 2016   Views: 3,640   Rating: 4.58/5    Votes: 4   Popularity: 2.76
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
How to overcome an error message preventing you from saving a change in an SQL Server database
Programming Tips
General
Posted: 27 Nov 2011   Updated: 15 Feb 2013   Views: 28,120   Rating: 4.80/5    Votes: 27   Popularity: 6.87
Licence: The Code Project Open License (CPOL)      Bookmarked: 15   Downloaded: 0
Many types of applications must have the ability to recover from an abnormal termination and continue from where they stopped
No reference articles have been posted.

Michael Haephrati
CEO Secured Globe, Inc.
United States United States
Michael Haephrati, is an entrepreneur, inventor and a musician. Haephrati worked on many ventures starting from HarmonySoft, designing Rashumon, the first Graphical Multi-lingual word processor for Amiga computer. During 1995-1996 he worked as a Contractor with Apple at Cupertino. Worked at a research institute made the fist steps developing the credit scoring field in Israel. He founded Target Scoring and developed a credit scoring system named ThiS, based on geographical statistical data, participating VISA CAL, Isracard, Bank Leumi and Bank Discount (Target Scoring, being the VP Business Development of a large Israeli institute).

During 2000, he founded Target Eye, and developed the first remote PC surveillance and monitoring system, named Target Eye.


Other ventures included: Data Cleansing (as part of the DataTune system which was implemented in many organizations.



Advertise | Privacy |
Web03 | 2.8.171207.1 | Last Updated 18 Dec 2017
Copyright © CodeProject, 1999-2017
All Rights Reserved. Terms of Service
Layout: fixed | fluid