Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Usability and Design
The Usability and design space brings together the latest information, research, tools, podcasts, and conference information related to usability and design. Content is pulled from IBM and non-IBM sites.
»
Ajax Resource Center
This space is your one-stop shop for information on the Ajax programming model, including articles and tutorials, discussion forums, blogs, wikis, events, and news. If it's happening, it's covered here.
»
Linux Security
The Linux security space gives an overview of security issues related to Linux and covers all aspects of securing a Linux distribution. It also links to Linux security-related news and articles.
»
Ruby Programming
Take a closer look at Ruby, a dynamic programming language that is growing rapidly in popularity. Explore its intriguing features and learn what programmers are doing with it.
»
Wiki: WebSphere, SOA, J2EE in Practice
This wiki discusses how to use J2EE and related technologies to develop business applications, including how to make best use of IBM J2EE products like WebSphere Application Server and Rational Application Developer, and IBM SOA products like WebSphere Process Server and WebSphere Integration Developer. While it occasionally delves into tangential topics and future trends, the primary focus is on how to make use of the products and technologies that we have today.
»
[Updated] RFID Programming Made Simple and Cheap
Rating: Bradley Jones - 12/07/2006 Using RFID hardware and incorporating RFID tag information into your applications can really be quite simple. See what can be done with less than $100 and no more than a few dozen lines of code.
Managed C++: Authenticating Users via Hash Codes
Rating: Tom Archer - MSFT - 01/27/2005 For situations when a company doesn't want the responsibility of maintaining a user password file, Tom Archer presents a mechanism that stores and uses the hash codes of passwords instead of the actual passwords to validate users.
ASP.NET 2.0 Moves User Authentication One Step Forward
Rating: none Anand Narayanaswamy - 11/05/2004 ASP.NET 2.0 provides new classes, methods, and controls that make implementing authentication easy. Learn how to apply the authentication functionalities of the Membership class and its methods into ASP.NET applications.
Blocking Brute-Force Attacks
Rating: m8urnett - 08/12/2004 A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack.
Introduction to Role-Based Security in .NET
Rating: Klaus Salchner - 06/18/2004 Learn how role-based security in .NET works. The sample code shows how to implement a database-driven security model for enterprise applications.
Two Quick Ways to Perform ASP.NET Authentication
Rating: Anand Narayanaswamy - 06/07/2004 By applying ASP.NET programming logic, you can store user data in either XML files or a Web configuration file and then validate users by using those files. Learn how to apply both of these simple methods of authentication.
The Lowdown on ASP.NET Authentication
Rating: none Karl Moore - 01/14/2004 By default anyone can access your ASP.NET web pages; however, there is a way to keep nosy, unwanted types out. Discover how to use authentication.
ASP.NET Tip: Encrypting a Configuration File Section
Rating: none Eric Smith - 01/29/2007 ASP.NET 2.0 enables you to encrypt portions of your configuration file. You can pick a section in your Web.config file to encrypt and then decrypt.
Encrypt Connection Strings in VS 2005 .config Files
Rating: none Paul Kimmel - 04/28/2005 Learn how to add a connection string to your app.config file in Visual Studio 2005, encrypt that connection string, and introduce a tool for automatically encrypting connection strings for ASP.NET.
Encrypt DataSets for Offline Storage
Rating: none Paul Kimmel - 01/28/2005 Learn how to encrypt offline data, .NET style. Paul Kimmel offers you the opportunity to experiment with ADO.NET, XML serialization, streams, and the DPAPI—technologies you can use to encrypt user data.
Combining Symmetric and Asymmetric Encryption
Rating: larryjf - 11/01/2004 Explains symmetric and asymmetric encryption, and then shows how to combine them. The .NET framework is used. All code snippets are written in VB.NET.
Cryptography in .NET
Rating: Mark Strawmyer - 11/22/2002 In the latest CodeGuru .NET Nuts '& Bolts column, Mark covers encrypting data using the cryptography classes available through the Microsoft .NET Framework.