.NET Information center

General information about .NET, Silverlight, WPF, WCF and everything else

Sunday, July 31, 2011

А вот и настал момент

34397-020226-d0403ef8ae0f3ebf6e8bc863434ae4dd.jpg

Posted via email from Jasper-Net

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Search This Blog

Translate

Popular Posts

  • Comodo Dragon Internet Browser
    Fast and versatile Internet Browser based on Chromium, infused with Comodo's unparalleled level of Security What makes Comodo Dragon T...
  • Chrome Remote Desktop
    Chrome Remote Desktop is a new Chrome extension that lets you remotely control a computer from your browser. It's the first software th...
  • Secure file exchange with .NET Crypto API
    Introduction I have recently found interest in online storage services like Skydrive, Dropbox or Box, just to mention a few. I've been w...
  • List of standard icons for Windows Phone 7 (WP7)
    Maybe I’m simply a total failure at The Google(s) and The Bing(s) but I went looking for the list of standard icons for Windows Phone 7 (WP7...
  • Unlocking the Secrets of REST with WCF
    In this session we will travel to the very depths of our new WCF WEB stack where there treasures which will delight the RESTful eye. Read ...
  • AvalonDock [2.0] Tutorial
    Introduction  "AvalonDock is a WPF controls library which can be used to create a docking layout system like that is present in Visual...
  • Open Source More Expensive Says MS Report
    Much conventional wisdom about programs written by volunteers is wrong. The authors took money for research from Microsoft, long the arch- e...
  • What is DLL import binding ?
    Last time, we saw how hinting is used to speed up the resolving of imported functions. Today, we'll look at binding. Recall that the mo...
  • דרך נוחה לעיון בקוד של פרוצדורות ואובייקטים אחרים
    לפני מספר חודשים כתבתי פוסט על דרכים לעיון בקוד של פרוצדורה (חוץ מאשר למצוא אותה בצד שמאל ב-SSMS ולהציג את הסקריפט על ידי קליק ימני),  ומצאת...
  • Protect Your Network From Bots
    One of cybercriminals' favorite ways to carry out criminal activities is through botnets. They use spam, phishing attacks, or malicious ...
Awesome Inc. theme. Theme images by chuwy. Powered by Blogger.