100SILEX, de 0 ŕ 100 s: Database
1282 Lotus Notes/Domino - Tools and utilities for Administrators and Users.
VirtualObjectives provides IT consulting services for Microsoft SQL Server administration, Tools and utilities for Windows environments, and Lotus Notes/Domino databases/utilities for system administrators.
virtual,objectives,lotus,notes,domino,database,utility,utilities,program,application,free,freeware,windows,development,john buoro,notes.ini,notesini,killnotes,stopnotes,moontool,log analyser,log analyzer,analyser,analyzer,sendsmtp,mail box cleaner,notesrepair,repair notes,repair lotus notes,repair,compact,desktop,workspace,desktop6.ndk,error code,text formatting,text tools,csv,col2csv,col2tab,csv2tab,tab2csv,csv2html,html2csv,csv2xml,xml2csv,epolicy,policy,netware quota,user registration,id store,partcopy,stopnotes,killnotes,recover,password,mame,frontend,mamerunner,emulator,partcopy,sql server,clean drive pro,clean drive,dts,dts package,sql,sql server,script,rconsole
1142 The Eurorack Database | Home
The Eurorack Database aims to be the authoritative source of information about Eurorack format modular synthesizer modules, cases, and more.
992 Troy Hunt: Whoâs who of bad password practices â banks, airlines and more
Troy Hunt on observations, musings and conjecture about the world of software and technology
Troy Hunt, blog, .NET, Azure, Backup, Bing, Blogger, Career Development, Code Quality, Conference, Database, Design Utopia, DotNetNuke, Enterprise Software Platform, Internet Explorer, iPhone, K2, LinkedIn, Media, NDepend, Online Identity, OWASP, People Management, Personal Development, Product Review, ReSharper, Security, SharePoint, Silverlight, Software Quality, SQL Injection, SQL Server, Subversion, Travel, Twitter, Visual Studio, Windows Mobile, XSS,
Ah, passwords. Love âem or hate âem, theyâre a necessary evil of the digital age. The reality is we all end up with an alphabet soup of passwords spread over dozens of various sites and services across the internet. Whilst we might not always practice it, we all know the theory of creating a good password; uniqueness, randomness and length. The more of each, the better.
Of course we frequently donât do this because of all sorts of human factors such as convenience, memory or simple unawareness of the risks. Still, when itâs a case of individuals electing not to create secure passwords, they really only have themselves to blame.
But what happens when the website wonât allow you to create a secure password? Or at least when they severely constrain your ability to create long, random, unique passwords? And what about when they donât allow you to send it between your computer and their server securely?
Even worse, what happens when our most âsecureâ institutions implement lazy password policies? Unfortunately, all of this is pretty rampant practice.
921 Tapeline.info - Content
Established in 1985 ~ Serving the Audio and Video industry for over 25 years
News, news, New, new, Technology, technology, Headlines, headlines, Nuke, nuke, PHP-Nuke, phpnuke, php-nuke, Geek, geek, Geeks, geeks, Hacker, hacker, Hackers, hackers, Linux, linux, Windows, windows, Software, software, Download, download, Downloads, downloads, Free, FREE, free, Community, community, MP3, mp3, Forum, forum, Forums, forums, Bulletin, bulletin, Board, board, Boards, boards, PHP, php, Survey, survey, Kernel, kernel, Comment, comment, Comments, comments, Portal, portal, ODP, odp, Open, open, Open Source, OpenSource, Opensource, opensource, open source, Free Software, FreeSoftware, Freesoftware, free software, GNU, gnu, GPL, gpl, License, license, Unix, UNIX, *nix, unix, MySQL, mysql, SQL, sql, Database, DataBase, Blogs, blogs, Blog, blog, database, Mandrake, mandrake, Red Hat, RedHat, red hat, Slackware, slackware, SUSE, SuSE, suse, Debian, debian, Gnome, GNOME, gnome, Kde, KDE, kde, Enlightenment, enlightenment, Interactive, interactive, Programming, programming, Extreme, extreme, Game, game, Games, games, Web Site, web site, Weblog, WebLog, weblog, Guru, GURU, guru, Oracle, oracle, db2, DB2, odbc, ODBC, plugin, plugins, Plugin, Plugins
755 Lotus Notes/Domino 7 application performance: Part 2: Optimizing database views
In part two of this article series, we explain how you can build views that are optimized for performance in your Notes/Domino applications.
lotus notes, lotus domino, view performance, application performance, view indexing, reader names field, dddlsca
720 Common Security Mistakes in Web Applications - Smashing Magazine
Web application developers today need to be skilled in a multitude of disciplines. Itâs necessary to build an application that is user friendly, highly performant, accessible and secure, all while executing partially in an untrusted environment that you, the developer, have no control over. I speak, of course, about the User Agent. Most commonly seen in the form of a web browser, but in reality, one never really knows whatâs on the other end of the HTTP connection.
There are many things to worry about when it comes to security on the Web. Is your site protected against denial of service attacks? Is your user data safe? Can your users be tricked into doing things they would not normally do? Is it possible for an attacker to pollute your database with fake data? Is it possible for an attacker to gain unauthorized access to restricted parts of your site? Unfortunately, unless weâre careful with the code we write, the answer to these questions can often be one weâd rather not hear.
Weâll skip over denial of service attacks in this article, but take a close look at the other issues. To be more conformant with standard terminology, weâll talk about Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Phishing, Shell injection and SQL injection. Weâll also assume PHP as the language of development, but the problems apply regardless of language, and solutions will be similar in other languages.
680 Spheremusic - Home page
Sphere music is dedicated to the sale of new and second hand pro audio and music equipment. Sphere includes an exhaustive pro audio database as well as an online shop where instruments, effects and any pro audio or music gear can be purchased and sold.
sphere occasion bargain second hand musique music intrument studio database databases shop magasin achat vente purchase sale as/400 as400 auction enchĂ¨re synthesizer synthĂŠtiseur effet outboard pro audio equipment belgique belgium france french uk
674 Remove Complex Backgrounds from Images in Photoshop - How-To Geek
While tools like the Magic Eraser can sometimes remove your backgrounds, the fact is you're going to have to get your hands dirty with the eraser if you have images with complex backgrounds that need removing.
Windows, Windows Vista, Ubuntu, Programming, Networking, Firefox, Help, Solaris, Linux, Unix, VMware ,SQL Server, Oracle, MySQL, Analytics, Suse, Redhat, network security, firewall, postgresql,database, how to, how-to, howto, hints, tips, shell scripts, system administration
298 The Evolution of Privacy on Facebook
Facebook is a great service. I have a profile, and so does nearly everyone I know under the age of 60.
However, Facebook hasn't always managed its users' data well. In the beginning, it restricted the visibility of a user's personal information to just their friends and their "network" (college or school). Over the past couple of years, the default privacy settings for a Facebook user's personal information have become more and more permissive. They've also changed how your personal information is classified several times, sometimes in a manner that has been confusing for their users. This has largely been part of Facebook's effort to correlate, publish, and monetize their social graph: a massive database of entities and links that covers everything from where you live to the movies you like and the people you trust.
This blog post by Kurt Opsahl at the the EFF gives a brief timeline of Facebook's Terms of Service changes through April of 2010. It's a great overview, but I was a little disappointed it wasn't an actual timeline: hence my initial inspiration for this infographic.
297 Synth Finder v5
Find the synth that is right for you!
Now you can easily find the synthesizer that you have been searching for. Simply choose the options from the menu to the left that best describe the types of synthesizers you are looking for and we'll do the rest!
You may choose any options and in any combination. For example, simply choose 'Analog' for a complete list of all analog synths, or get more specific and choose additional options for a more personalized set of results. Note that we only list synths that are featured in our database here at the Vintage Synth Explorer.
For more details and descriptions of what the Synth Finder options mean, click here.
288 Modular Synthesizer (C) SEQUENCER / SYNTH DBase
Modular Synthesizer sequencer / synth database
synthesizer, modular, synth, vst, sequencer, sequenzer, analog, instrument
89 Top 20+ MySQL Best Practices
Database operations often tend to be the main bottleneck for most web applications today. It's not only the DBA's (database administrators) that have to worry about these performance issues. We as programmers need to do our part by structuring tables properly, writing optimized queries and better code. Here are some MySQL optimization techniques for programmers.
Freesound: collaborative database of creative-commons licensed sound for musicians and sound lovers. Have you freed your sound today?
101 - 201