Monday, April 22, 2013
Monday, March 4, 2013
Professional programming community with purpose to provide tribute to successful individuals/communities/companies.
Black Belt will be a way to promote deserving individuals, companies and all those who adequately doing their work on community development. Who unselfishly spread knowledge and provide assistance to those who need the help.
There are many ideas of how the belt colors in the martial arts came to be, some more romantic than others. One quaint tale says that students of a karate school would be given a white belt. The students’ belts would gradually become stained darker from use and eventually a person who was of a high standard and who had trained for a long time would then have a black/brown/dirt colored belt. This is an inspiring way to encourage students to train harder, and might have its basis in truth since martial arts practitioners as a general rule don’t wash their belts after training.The systematic use of belt colour to denote the rank was first used by Kano Jigoro, the founder of judo, who first devised the colored belt system using obi, and awarded the first black belts to denote a Dan rank in the 1880s. Initially the wide obi was used; as practitioners trained in kimono, only white and black obi were used. It was not until the early 1900s, after the introduction of the judogi, that an expanded colored belt system of awarding rank was created.Idea for using colored belt system in IT has goal to promote and to provide tribute to meritorious and successful individuals/communities/companies.We will use partially changed Kyokushin Karate grading system:
Shodan Black Belt 1st Dan
Nidan Black Belt 2nd Dan
Sandan Black Belt 3rd Dan
Yondan Black Belt 4th Dan
Godan Black Belt 5th Dan
Rokudan Black Belt 6th Dan
Shichidan Black Belt 7th Dan
Hachidan Black Belt 8th Dan
Kyudan Black Belt 9th Dan
Jyudan Black Belt 10th Dan
Sunday, March 3, 2013
“Here you can follow the entire life of a search query, from the web, to crawling and indexing, to algorithmic ranking and serving, to fighting webspam,” Google Product Manager Jake Hubert said in a blog post announcing the page.
“The site complements existing resources, including this blog [Google’s Inside Search blog], the help center, user forums, Webmaster Tools, and in-depth research papers. We hope the site helps to illuminate the split-second journey from algorithms to answers,” he added
Thursday, February 28, 2013
Building Web Apps with ASP.NET Jump Start
- 1: What's New in ASP.NET 4.5
- 2: Building and Deploying Websites with ASP.NET MVC 4
- 3: Creating HTML5 Applications with jQuery
- 4: Building a Service Layer with ASP.NET Web API
- 5: Leveraging Your ASP.NET Development Skills to Build Office Apps
- 6: Building and Leveraging Social Services in ASP.NET
- 7: Building for the Mobile Web
- 8: Real-time Communication with SignalR
- 9: Taking Advantage of Windows Azure Services
Tuesday, February 26, 2013
Code.org is a non-profit whose goal is to expose all students to computer programming. We believe that computer programming is a liberal art; it's something EVERY student in the world should be exposed to at some point in their childhood education.
Entrepreneurs like Facebook's Mark Zuckerberg, Square founder Jack Dorsey and Microsoft founder Bill Gates open up about how they got started coding. Zuckerberg says he started coding when he was in sixth grade because he wanted to make "something that was fun for myself and my sisters." Bill Gates started coding in his teens and wrote a program to play tic-tac-toe.
Saturday, February 23, 2013
Thursday, February 21, 2013
Free security tools that Microsoft provides to help make IT professionals' and developers' lives easier.
Anti-Cross Site Scripting Library
The Microsoft Anti-Cross Site Scripting Library V4.2.1 (AntiXSS V4.2.1) is an encoding library designed to help developers protect their ASP.NET web-based applications from XSS attacks. It differs from most encoding libraries in that it uses the white-listing technique -- sometimes referred to as the principle of inclusions -- to provide protection against XSS attacks. This approach works by first defining a valid or allowable set of characters, and encodes anything outside this set (invalid characters or potential attacks). The white-listing approach provides several advantages over other encoding schemes.
Attack Surface Analyzer
Attack Surface Analyzer can help software developers and Independent Software Vendors (ISVs) understand the changes in Windows systems' attack surface resulting fro m the installation of the applications they develop. It can also help IT professionals, who are responsible for managing the deployment of applications or the security of desktops and servers, understand how the attack surface of Windows systems change as a result of installing software on the systems they manage.
The banned.h header file is a sanitizing resource that is designed to help developers avoid using and help identify and remove banned functions from code that may lead to vulnerabilities. Banned functions are those calls in code that have been deemed dangerous by making it relatively easy to introduce vulnerabilities into code during development.
BinScope Binary Analyzer
The BinScope Binary Analyzer tool can be helpful for both developers and IT professionals that are auditing the security of applications that they are developing or deploying / managing. Auditing the software deployed in an environment and determining if it is making use of security mitigations can help risk managers make more meaningful assessments.
Enhanced Mitigation Experience Toolkit (EMET)
EMET it is a free toolkit that helps prevent vulnerabilities in software from being successfully exploited for code execution. It does so by allowing developers to enable some of the latest mitigation technologies already built into Windows. The result is that a wide variety of software is made significantly more resistant to exploitation – even against ze ro day vulnerabilities and vulnerabilities for which an update has not yet been applied.
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for IT professionals and helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. It is a standalone security and vulnerability scanner designed to provide a streamlined method for identifying common security misconfigurations and missing security updates.
Microsoft Safety Scanner
The Microsoft Safety Scanner is a free stand-alone virus scanner that is used to remove malware or potentially unwanted software from a system. The tool is easy to use and packaged with the latest signatures, updated multiple times daily. The application is not designed to replace your existing antimalware software, but rather act as an on demand virus removal tool in situations where you suspect your real time antimalware software might not be working correctly.
Microsoft Security Compliance Manager
Microsoft's Security Compliance Manager (SCM) enables organizations to centrally plan, view, update, and export thousands of Group Policy settings for Microsoft client and server operating systems and applications. It makes it easier for organizations to plan, implement, and monitor security compliance baselines in their Active Directory infrastructure. With SCM, IT Professionals can obtain baseline policies based on security best practices, customize them to the particular needs of their organization and export them to a number of formats for use in different scenarios.
Portqry is a TCP/IP connectivity test tool, port scanner, and local port monitor. Portqry is designed to help IT Professionals troubleshoot networking issues as wel l as verify network security related configurations. Portqry is a great lightweight port scanner regardless of what version of Windows you are running.
Threat Modeling Tool
The SDL Threat Modeling Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle. To help make threat modeling a little easier, Microsoft offers a free SDL Threat Modeling Tool that enables non-security subject matter experts to create and analyze threat models by communicating about the security design of their systems, Analyzing those design for potential security issues using a proven methodology and suggesting and managing mitigations for security issues.
URLScan Security Tool
URLScan is a security tool that restricts the types of HTTP requests that IIS will process. URLScan scans incoming URL requests and associated data. It uses a series of rules to determine whether the information in each request is potentially dangerous, or contains information not normally expected. To help you diagnose any potential problems and any attempts to upset your server, URLScan can also log requests—including the offending request data. By blocking specific HTTP requests, the URLScan security tool helps to prevent potentially harmful requests from reaching applications on the server.analyze threat models by communicating about the security design of their systems, Analyzing those design for potential security issues using a proven methodology and suggesting and managing mitigations for security issues.
Windows Defender Offline
Windows Defender Offline is a standalone software application that is designed to help detect malicious and other potentially unwanted software, including rootkits that try to install themselves on a PC. Windows Defender Offline works by scanning an operating system to check the authenticity of any communication the operating system has with the Internet. If there is an application deemed unsafe, it will alert the user and block the contents of the application until the user either accepts or denies the risk.