Geeks With Blogs
Mark Pearl April 2012 Entries
SQL Source Control – Why buy the DB products and go through their Webinar
Before I go into the contents of this post I would like to give a quick disclaimer – I have been asked to give review of the SQL Source Control webinar, my payment of the review is a free license of SQL Source Control from Red Gate. It’s great to have the license but I have no need for it as my company has already purchased a license of SQL Toolbelt from Red Gate which includes SQL Source Control. I might come across as a bit of a Red Gate fan boy, but it is because their tools have saved my bacon ......

Posted On Thursday, April 26, 2012 7:27 AM

Getting to grips with the stack in nasm
Today I spent a good part of my day getting to grips with the stack and nasm. After looking at my notes on nasm I think this is one area for the course I am doing they could focus more on… So here are some snippets I have put together that have helped me understand a little bit about the stack… Simplest example of the stack You will probably see examples like the following in circulation… these demonstrate the simplest use of the stack… org 0x100 bits 16 jmp main main: push 42h push 43h push 44h ......

Posted On Monday, April 9, 2012 2:09 PM

More NASM with GVim
Today I am bashing around with nasm again… some useful things I found… Set the current working directory of gvim to the current file path I have found setting the current working directory of gvim to the file location is very useful, especially if you are wanting to use commands in gvim to run your compiled code. It can be done by typing in the following in the command mode in gvim… cd %:p:h Once you have set it, you can use the ! to run commands you would normally run in the dos shell.. e.g. !dir ......

Posted On Monday, April 9, 2012 1:40 PM

Computer Networks UNISA - Chap 12 – Networking Security
After reading this section you should be able to Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware and design based security techniques Understand methods of encryption such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols such as RADIUS< TACACS,Kerberos, PAP, CHAP, and MS-CHAP function Use network operating system ......

Posted On Saturday, April 7, 2012 3:02 PM

Computer Networks UNISA - Chap 8 – Wireless Networking
After reading this section you should be able to Explain how nodes exchange wireless signals Identify potential obstacles to successful transmission and their repercussions, such as interference and reflection Understand WLAN architecture Specify the characteristics of popular WLAN transmission methods including 802.11 a/b/g/n Install and configure wireless access points and their clients Describe wireless MAN and WAN technologies, including 802.16 and satellite communications The Wireless Spectrum ......

Posted On Saturday, April 7, 2012 12:30 PM

Computer Networks UNISA - Chap 10 – In Depth TCP/IP Networking
After reading this section you should be able to Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation Explain the differences between public and private TCP/IP networks Describe protocols used between mail clients and mail servers, including SMTP, POP3, and IMAP4 Employ multiple TCP/IP utilities for network discovery and troubleshooting Designing TCP/IP-Based Networks The following sections explain how network and host information in ......

Posted On Saturday, April 7, 2012 9:51 AM

Computer Networks UNISA - Chap 14 – Insuring Integrity & Availability
After reading this section you should be able to Identify the characteristics of a network that keep data safe from loss or damage Protect an enterprise-wide network from viruses Explain network and system level fault tolerance techniques Discuss issues related to network backup and recovery strategies Describe the components of a useful disaster recovery plan and the options for disaster contingencies What are integrity and availability? Integrity – the soundness of a networks programs, data, services, ......

Posted On Friday, April 6, 2012 3:55 PM

Computer Networks UNISA - Chap 15 – Network Management
After reading this section you should be able to Understand network management and the importance of documentation, baseline measurements, policies, and regulations to assess and maintain a network’s health. Manage a network’s performance using SNMP-based network management software, system and event logs, and traffic-shaping techniques Identify the reasons for and elements of an asset managements system Plan and follow regular hardware and software maintenance routines Fundamentals of Network Management ......

Posted On Friday, April 6, 2012 1:34 PM

Driven2Distraction – New South African Developer Podcast
For those out there that are interested… I am now one of the hosts of the Driven2Distraction podcast. Being a fan of podcasts like .Net Rocks and Hanselminutes for years now, I have always wanted to be involved in the recording of a podcast and now that time has finally come. What makes the Driven2Distraction podcast different from all the others out there is its uniquely South African flair. It’s focus is towards Software Development in the Southern Africa – and has a mix of “what happening locally” ......

Posted On Friday, April 6, 2012 12:06 PM

Getting App.config to be configuration specific in VS2010
I recently wanted to have a console application that had configuration specific settings. For instance, if I had two configurations “Debug” and “Release”, depending on the currently selected configuration I wanted it to use a specific configuration file (either debug or config). If you are wanting to do something similar, here is a potential solution that worked for me. Setting up a demo app to illustrate the point First, let’s set up an application that will demonstrate the most basic concept. using ......

Posted On Wednesday, April 4, 2012 10:35 AM

Copyright © MarkPearl | Powered by: GeeksWithBlogs.net | Join free