Java EE 6 was released over
2 years ago and now there are 14
compliant application servers. In all my talks around the
world, a question that is frequently asked is
Why should I use Java EE 6 instead
of Spring ?
There are already several blogs covering that topic:
Java
EE wins over Spring by Bill Burke
Why
will I use Java…
In this article we will address the lack of testability that our current application has. We will do this by making our application conform to the dependency injection pattern. This will allow us to push up all of our dependencies which makes our code considerably more testable than it currently is.
In this article we will discuss how we can enhance the power of the Dependency Injection pattern by implementing an Inversion of Control container. We will discuss what an IoC container can be used for and how it works. Then we will look at implementing an Inversion of Control container in our code. We will specifically implement the IoC…
Once a week we dump out our tips box and share some of the great reader submitted tips with you. This week we’re looking at reading comic strips on the iPad, quick access via the Android Power Bar, and limiting the spotlight search on the iPad.
Amazon’s New Kindle Fire Tablet: the How-To Geek Review
…
What do you get when you mix Mario and Grand Theft Auto? The “real” answer to where Mario got his racing kart!
Here is the original GTA V official trailer that Grand Theft Mario is based on.
Grand Theft Mario [via Dorkly Bits]
HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS
…
Just submitted my session abstracts for Ann Arbor's Day of .NET 2010. Getting up to speed with .NET 3.5 -- Just in time for 4.0! Yes, C# 4.0 is just around the corner. But if you haven't had the chance to use C# 3.5 extensively, this session will start from the ground up with the new features of 3.5. We'll assume…
I just wanted to have one place where I list all the six Unity blogs I’ve written. Part 1: The very basics – Begin using Unity (code here) Part 2: Registering other types and resolving them (code here) Part 3: Lifetime Management (code here) Part 4: Constructor and Property or Setter Injection (code here) Part 5: Arrays (code…
I read through Ron Jacobs post on Monitoring WCF Data Services with AppFabric http://blogs.msdn.com/b/endpoint/archive/2010/06/09/tracking-wcf-data-services-with-windows-server-appfabric.aspx What is immediately striking are 2 things – it’s so easy to get monitoring data into a viewer (AppFabric Dashboard) w/ very…
Jason Brimhal wrote today on his blog that new book, Defensive Database Programming , written by Alex Kuznetsov ( blog ) is coming to bookstores. Alex writes about various techniques that make your code safer to run. SQL injection is not the only one vulnerability the code may be exposed to. Some other include…
Join Oracle Security gurus to hear how Oracle products monitor Oracle and
non-Oracle database traffic, detect unauthorized activity including SQL
injection attacks, and block internal and external threats from
reaching the database. Hear how organizations such as TransUnion Interactive and SquareTwo …
I need to write several passages of text in an offer to the client about the security layer in ASP.NET MVC web solution.
I am aware of security that comes along with MVC 3 and an improvements in MVC 4. But all of them are non conceptual, except for AntiForgeryToken (AntiXSS) and built-in SQL Injection…
What do you get when your favorite crime-fighting organization meets Doctor Who? CSI: Gallifrey!
CSI: Gallifrey (with one-liner) [via Geeks are Sexy]
How to Make the Kindle Fire Silk Browser *Actually* Fast!
Amazon’s New Kindle Fire Tablet: the How-To Geek…
Recent Tips and News on Java, Java EE 6, GlassFish & more :
• Tutorial - Introduction to CDI - Contexts and Dependency Injection for Java EE (JSR 299) (Mark Struberg, Peter Muir)
• Clustering with Glassfish 3.1 (Javing)
•…
ASP.NET applications can make use of the System.Web.Caching.Cache object to cache data and prevent repeated expensive calls to a database or other store. However, ideally an application should make use of caching at the point where data is retrieved from the database, which typically is inside a…
Discover an easy way to set up system-wide global API hooks using AppInit_DLLs registry key for DLL injection and Mhook library for API hooking. To illustrate this technique we will show how to easily hide calc.exe from the list of running processes.
Your weekend is almost here, so why not get an early start on the fun with a quick bit of gaming goodness? In this week’s game your powers of division will be put to the test as you seek to clear each level of red box material using a limited number of slices.
How to Make…
Photoshop is a powerful, but complex, graphics program that can be difficult to learn and frustrating to use. We have published many articles about tips and tricks for using Photoshop and how to fix annoying issues you may encounter.
This article compiles 30 of the best tips and tricks we…
Today I've just seen this article which described the relevance of SOLID principle in F# development-
F# and Design principles – SOLID
And while addressing the last one - "Dependency inversion principle", the author said:
From a functional point of view, these containers and…
From my earliest memory of programming, I was taught that we should do some level of design before coding. Somewhere around the way I started hearing phrases Dependency Injection, IoC etc., but whenever I asked people the need for these patterns, I seldom got an answer that…
Do you love watching tropical fish as they swim through serene ocean waters? Then you will definitely want to download the Tropical Fish Theme for Windows 7. The theme comes with nine wallpapers filled with colorful, tropical goodness from the oceanic realms.
Download the…
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-1593 Denial of Service (DoS) vulnerability
3.3
Wireshark
Solaris 11
11/11 SRU 8.5
CVE-2012-1594 Improper Control of Generation of Code ('Code Injection') vulnerability
3.3
CVE-2012-1595…
Most of the time you’ll eject the CD/DVD drive on your PC through a button on the drive, but some laptops don’t include a button. Here’s a way to do it right from the desktop.
If you’d like to safely eject USB drives from your desktop, we’ve got you covered with…