Sony Unveils the VAIO C Series Laptops


Today Sony announced the new VAIO C lineup of entertainment notebooks, each equipped with a second generation Intel Core i5 processor. Select models will come built with a Blu-ray player drive with HD video playback and DVD/CD read/write and a 1GB AMD Radeon 6630 hybrid graphics card.
A glowing light will run around the edges of the neon-colored notebooks, and also around the VAIO logo and the touchpad. Each model will also feature a backlit keyboard. The 14-inch VAIO CA and 15-inch VAIO CB series will be available in neon orange and green, white, and black. Both notebooks will have LED backlit widescreen displays with 1080p resolution.
Each model will also come with three quick-launch buttons on the keyboard: one button to launch media applications, one for Sony VAIO Care, and another to quickly launch your web browser.
Each notebook will have both an HD camera with an Exmor sensor; according to Sony, the camera will work well even when the lighting is low in the room. The camera also includes face-tracking technology (when you move, it moves).
Sony Imagination Studio Suite 2: VAIO Edition Features (included)
  • Vegas Movie Studio Platinum, film-editing software
  • Acid Music Studio, audio-editing/mixing software 
  • Adobe Acrobat Standard
  • "Remote keyboard" option -- pair the VAIO C keyboard and touchpad with other Sony devices wirelessly
The VAIO C 14-inch and 15-inch models are expected to be a direct competitor to other similar-sized consumer notebooks such as the popular Dell Inspiron 14R and 15R. 
The VAIO C series will be available for pre-sale on March 13, 2011 through Sony's online store at an MSRP starting at $880.

Motorola i335 (Nextel)

It's been so long since we've reviewed a Nextel cell phone (the last was the Motorola i580 in July 2006) that we almost forgot they existed. In the wake of the 2005 Next/Sprint merger, the carrier announced it was phasing out iDEN-only models in favor of dual-mode handsets like the Motorola ic902 and ic502. But with its new Motorola i335, iDEN is back. Sporting Nextel markings only (you won't find "Sprint" anywhere on the handset or its packaging), the i335 combines traditional Nextel design with a dose of modern style. Its candy bar body is tough and durable, but the i335 is the thinnest Nextel handset to date. It lacks a camera, but of course it offers Nextel's standard array of push-to-talk (PTT) services. The i335 will put a crimp in your wallet if you pay full price ($249), but you can get it for as low as $49.99 with service if you buy it online. To find accessories for this phone, see our cell phone ringtones and accessories guide.
Design
Nextel loyalists will be pleased to know that the Motorola i335 has everything they've come to love in cell phone design. The sturdy candy bar model looks like it could take quite a beating, and the interface, while far from flashy, is functional and reliable. But as we mentioned earlier, the i335 is the first Nextel phone to make a play for the thin handset trend. At 4.7 inches by 1.8 inches by 0.5 inch, it sheds much of the bulk that plagued the carrier's earlier models though it remains slightly heavy at 3.7 ounces. The design succeeds not because it's fashionable, but rather because it's simple and practical. Clad in black with a few silver touches, it's unassuming as well.

Lenovo IdeaPad U260

Processor: 1.33GHz Intel Core i5-470UM
Memory: 4GB RAM
Storage: 320GB hard drive
Optical Drive: None
Screen: 12.5 inches (1,366x768 native resolution)
Graphics: Integrated Intel GMA HD
Weight: 3.3 pounds
Dimensions (HWD): 0.8x12.5x8.1 inches
Operating System: Windows 7 Home Premium (64-bit)
With apologies to Cole Porter, if there were one word to best describe the design of the $999 Lenovo IdeaPad U260 ultraportable laptop, it would have to be “swellegant.” Its sturdy, lightweight design, combined with smart-looking features, makes the U260 a very attractive acquisition to anyone looking for a sharp, compact laptop. Factor in strong performance for an under-$1,000 ultra portable, and you’ve got the potential makings of a real winner for frequent-traveling business users or general consumers.
But all is not so swell in one crucial aspect of this lightweight laptop: the battery. The built-in four-cell battery in this IdeaPad delivered poor battery life on our tests, and Lenovo's sealed-chassis design doesn't allow users to swap out batteries. For serious road warriors who need to work for long stretches off the AC-power umbilical, that alone might be enough to dissuade them from falling for the U260’s good looks.

Design

Measuring only eight-tenths of an inch thick, the U260 is one of the thinnest laptops we’ve seen in a while—at the moment, bested by only a few models, like the 0.75-inch-thick Dell Vostro V130 ($808 direct, in our tested configuration) and Apple's insanely thin 2010 MacBook Air. At 3.3 pounds, the U260 is also easy to cart around, but it’s not the lightest ultra portable you’re going to come across—other offerings, such as the Toshiba Portégé R705-P41 ($939.99) and Acer Aspire TimelineX 1830T-68U118 ($899), are a hair lighter, at 3.2 pounds and 3.1 pounds, respectively.
The U260 is available in two colors: Mocha Brown and Clementine Orange. (We looked at the latter.) This splash of color covers the laptop lid and the bottom of the unit. Both sections are made of a magnesium-aluminum alloy, which has an almost rubbery touch. The laptop felt secure in our hands when we carried it (unlike some glossy models that seem as though they’ll easily slip through our fingers), and it was fairly impervious to fingerprint smudges. Sandwiched between the lid and the bottom of the laptop, a glossy black plastic strip runs around the front and sides of the U260, offering a stylish contrast.

Along the left side of the U260 are a USB 2.0 port, a headphone jack, a cable-locking security slot, and a Wi-Fi toggle switch. On the right side are a second USB 2.0 port, HDMI- and VGA-out ports, an Ethernet jack, and the AC power-adapter jack. With only two USB ports and no card-reader or PC Card slots, the U260’s physical-connectivity options are limited. Wireless connectivity is better, as the U260 comes equipped with Wi-Fi (in the 802.11b/g/n flavors) and a Blue tooth 2.1 + EDR radio.
We don’t usually go into detail about the bottom of a laptop, but in the case the U260, it bears mentioning. That's not because of what’s there, but because of what’s missing: user-accessible components. You can’t add more memory, and you can’t swap out the hard drive. But most important, you can’t remove the integrated four-cell lithium-polymer battery. When it comes to the U260’s battery life, what it gives is what you get—there’ll be no battery-swapping on long flights, like with Dell's Vostro V130. It was a deal-breaker on that notebook, and it’s a deal-breaker on this one, too, as far as we’re concerned.

Features

A unique feature of the U260 is its use of a 12.5-inch display. The U260 is, in fact, the first laptop to come to market with a 12.5-inch panel(although LG has promised that its forthcoming Xnote P210 notebook will also use a same-size display). Like many laptop screens, the U260’s 1,366x768 display is prone to catching distracting reflections—and this despite the screen’s antiglare coating. We also found that the U260’s display isn’t as bright as other ultrap ortable displays we’ve seen, which became evident when we watched some videos in a dark room.
Speaking of videos, if you want to watch movies on the U260, you’re going to have to either stream them or copy them to the laptop, as the U260 doesn’t come with an integrated optical drive. (The same goes for listening to music.) Also, for any movie-watching or music-listening you do with the U260, we recommend that you do so using headphones, as the unit’s speakers don’t get very loud and produce very tinny-sounding audio.
One of the U260’s features that we like a lot is its glass-coated, multi-touch touch pad. The slick surface helped make the pad very responsive to touch and movement. On the other hand, we found the dedicated left and right mouse buttons—which are positioned at the bottom of the touch pad—a bit too soft for our liking.
We also found the Chiclet-style keyboard a tad spongy, as well. Lenovo also shrank the width of some of the keys, such as the Tab and right-Shift keys, to get them to fit. Lenovo states that the keyboard is spill-resistant (we didn’t put this claim to the test) and that it’s a “breathable keyboard,” which allows air to flow through the keyboard and into the unit to help keep it cool. (We often found the bottom of the unit to be warm to the touch, but it never got hot.) Another feature we like is the U260’s textured wrist rest, which feels like buffed leather.

Canon Pixma MX360

Canon Pixma MX360

Price (at time of review): $79.99 (mfr. est.)


Print Technology: Color Inkjet
Interface(s): USB 2.0; Ethernet
Max. Paper Size: 8.5x11 inches
Max. Resolution (Color): 4,800x1,200dpi
Max Resolution (Monochrome): 4,800x1,200dpi
Scan Resolution: 1,200x2,400 dpi, ADF: 600x600 dpi
Automatic Document Feeder (ADF): Yes
LCD Size (Diagonal): 3 inches
Dimensions (HWD): 7.8x18.1x16.4 inches
Weight: 19.3 pounds
In the rash of sub-$100 inkjet all-in-one (AIO) printers that we’ve seen recently, there’s one thing we can say we’ve learned: You’re going to have to make trade-offs when buying a printer at this price point. So, if it’s a budget AIO you’re after, you need to know what’s important to your small or home office’s needs before you make a decision. Is a rich feature set important to you? Or would you rather have a unit that can churn out prints at lightning-fast speeds? Or is top-notch print quality your number-one goal? These are choices you’ll have to make with a budget printer that you might not have to make with a pricier model. In the case of the $79.99 Canon Pixma MX360, it may not be the fastest printer in the race, but it offers a nice feature set for SOHO environments, as well as quality document and photo output. Budget-minded small or home offices that value features and quality of output over speed will want to give this AIO a good look.
Design
The Pixma MX360 is a gray plastic box with a moderate footprint (7.8 inches tall, 18.1 inches wide, and 16.4 inches deep). Weighing just over 19 pounds, the construction is solid, although the design is a bit stodgy compared with the sleek black of other units in Canon’s new line of AIOs. The unit tapers out from the top, and the controls lay on the front part of this tapered portion.
The scanner is located on the top of the machine. Beneath the scanner, an output tray folds out from the front face. You load paper into the MX360's single, rear-mounted feeder tray. (It holds up to 100 sheets.) That tray is not too obtrusive, unlike many of its type; if you unfold the feeder tray from the back, you can still position the unit up against a wall or in a corner. On the top of the scanner lid is the ADF for copying, scanning, or faxing multiple pages. It has a 30-page input capacity. The ADF's output tray is also on the top of the unit, below the input feeder
You connect the Pixma MX360 to a PC or Mac via USB 2.0 or optional Bluet ooth. The USB connection is on the back of the printer. It does not have any memory card readers, but we didn’t expect any at this price point. It does, however, offer a PictBridge port on the front of the unit for printing directly from your digital camera or USB drive.
You get to the ink supply by lifting the scanning bed, which reveals the print head and ink compartment. The printer uses two ink cartridges: one monochrome tank, and a three-in-one color cartridge. The black ink is pigment-based, while the color inks are dye-based. (The resilient pigment black can be a plus for text documents that will be passed around the office.) The slots for each cartridge are clearly marked; installing the tanks should present no challenge. The print head comes pre installed and requires no additional setup. Note, though, that because this Pixma uses a single color cartridge, rather than discrete color cartridges, you may end up paying more for your color ink if you tend to print one color more than the others (such as when printing scenes with large areas of sky that use up lots of blue).
In terms of cost-per-page, though, the Pixma MX360 is actually quite a bargain for a sub-$100 AIO, as long as you purchase the high-capacity cartridges. If you purchase the larger-capacity cartridges, you’ll pay 5.4 cents for a monochrome page and 13.4 cents for a page of mixed text and graphics. With the standard-capacity cartridges, you’re looking at 7.2 cents for a monochrome page and 15.8 cents for a page of mixed text and graphics. These numbers are on the high side for a printer in this category.

Apple MacBook Pro (13-Inch, 2011 Version)


Apple MacBook Pro (13-Inch, 2011 Version)


Processor: 2.3GHz Intel Core i5
Memory:
4GB RAM
Storage:
320GB hard drive
Optical Drive:
DVD±RW
Screen:
13.3 inches (1,280x800 native resolution)
Graphics:
Integrated Intel HD 3000 (382MB shared)
Weight:
4.5 pounds
Dimensions (HWD):
1x12.8x8.9 inches
Operating System:
Mac OS X 10.6 (Snow Leopard)

With Apple having an ever-increasing presence in the the homes of everyday users, the company has recently been making aggressive moves in terms of affordability versus performance in its desktops and laptops. Apple continues that trend with its latest line of MacBook Pros. Unlike the last makeover of this line, the 13.3-inch MacBook Pro, which is the entry-level version, gets a huge internal overhaul this time, receiving boosted processor power, as well as a larger hard drive, without raising the price tag. Some of the standout features from previous generations are here as well: The battery life is still unbeatable, and the design remains stark and gorgeous. In fact, aesthetically, it didn't change at all. The MacBook Pro line was already well ahead of its competition in terms of performance and style, and it takes another step ahead with this next generation.
The entry-level $1,199 13-inch MacBook Pro that we reviewed was built around a Second-Generation 2.3GHz Intel Core i5 processor (also known as Sandy Bridge), a 320GB hard drive, and a 13.3-inch screen. This is the base model of the group. For $300 more, you can bump up your processor to a 2.7GHz Core i7 and your hard drive to 500GB. The 15-inch models start at $1,799, and the 17-inchers at $2,499. The 15-inch and 17-inch models now come standard with Core i7 processors and advanced switchable graphics technology. The 13-inch offers only integrated Intel HD Graphics 3000 in both its models. All of the new MacBook Pros use Second-Generation Intel Core i5 or Core i7 processors.

Design

On the outside, the 13-inch MacBook Pro is almost exactly the same as the previous version. Design-wise, we think Apple was smart to approach the new line with the attitude that if it’s not broken, don’t fix it. The previous line of MacBook Pros was as stunning as it was stark, and the new line carries that torch onward. The silver case, dominated by an aluminum shell with just one seam around the underside, feels plenty solid. Nothing much mars the design of the MacBook’s body: On the top of the lid is a simple white Apple logo that lights up when the laptop is in use. And, well, that’s about it. The case snaps shut with a magnetic latch, making opening the lid easy without compromising the durability of the body.
As with the previous version, all the ports are located on the left side of the chassis and include an Ethernet jack, a FireWire 800 port (backward-compatible with FireWire 400, 200, and 100), the new Thunderbolt connector (more on that in a moment), two USB 2.0 ports, an SDXC-card slot, and a headphone jack. Toward the front left of the chassis are indicator lights that allow for a quick look at remaining battery power. On the right side of the body are a security-lock slot and the opening for the slot-loading optical drive, which is a dual-layer DVD burner. As with previous MacBook lines, it doesn’t support Blu-ray discs, a feature we keep hoping will come with every new iteration of MacBook Pros.

These MacBook Pros are the first laptops to feature the Thunderbolt port (which replaces the mini-DisplayPort connector from previous MacBook Pros), based on Intel's Light Peak technology, which supports both high-performance peripherals and high-resolution displays. Apple claims the technology can provide data transfer at 20 times the speed of a USB 2.0 port. And, from what we saw during our demonstration, we believe it. (We'd test it ourselves, but no cable is currently available.) It's compatible with USB 2.0 and 3.0, FireWire, Gigabit Ethernet, Fibre Channel, VGA, DVI, and HDMI. It also allows you to daisy-chain up to six devices.
We have to wag our finger at Apple a bit for not including a Thunderbolt cord in the box, though. Also, Apple won't even have Thunderbolt cables until this summer, so if you buy this system for this reason now, you'll have to buy an off-brand or wait until then. We haven't seen any pricing on these cables yet. Then again, there aren't many peripherals for it just yet, either.
Once you open the lid, you’ll notice that little has changed in the design of the keyboard and touch pad (which Apple terms its "Trackpad"). The full-size keyboard comes with backlit keys, and it remains perfectly spaced and nicely responsive to the touch. An ambient-light sensor adjusts the key backlighting according to the brightness of the area where you’re working. The speaker is above the keyboard, and although it's adequate for personal use while using the MacBook Pro, you won't want to try and fill a room with it.

Mobile Web Searches

According to recent statistics even through mobile web searches, Google has been the dominant medium of search used throughout US. Mobile web search trends have only gone higher in recent times. Google has been taking a commanding lead in mobile searches too since its mobile web search launch.
The statistics according to Opera’s State of the Mobile Web Report confirms this. About 9% of the pages viewed via mobile, Google’s search portal have repeatedly come to be popular over Yahoo and Bing. These two sites only get 4.3% and 0.03% of the hits among the other search engine pages viewed.
Opera’s State of the Mobile Web Report works on to bring monthly publications about mobile search statistics in great details. They also bring you information on the best of global trends that have been influencing mobile internet in recent times. They also highlight statistics and profiles in Middle East. Their reports have concluded that in January 2010 about 50 million people have been using Opera Mini. This has been a 7.4% increase since December the previous year.
There are statistics and comparison records presented through this team. Their track records included that about 23.3 billion pages had been viewed in January 2010 alone. Since December there have been greater trends among people to view more pages through the net. The data traffic has been noted to be 337 million. The top ten countries to be using the Opera Mini has been Russia, Indonesia, India, Ukraine, China, South Africa, United States, Nigeria, Vietnam and United Kingdom. Nigeria has come back to the top ten’s list after a 3 month of retreat period from using the Opera Mini.

Samsung Caliber (SCH-r860)

Samsung takes the cake with the advanced touchscreen which it has developed using the TouchWiz interface which is unique to Samsung. The touchscreen has several advanced features which includes certain Widgets which are specially designed so as to let users personalize them and adapt them according to their phone.

All the social networking websites like Facebook are accessible due to the phone’ s browser which is a full HTML enabled browser. There is mobile IM along with email facilities. The camera is a 3 mega pixel one and comes with a camcorder.

HOW TO REMOVE THE LEFT SIDE OF THE USER MESSAGE CENTER, CENTER TO RIGHT SIDE OF THE LAYOUT?


Difficulty: Ya Blue template in the program, users want to Message Center, ranked so part removed, so that the layout of the right center, how to correct? Remove the left of the label is currently the mold after the left into a blue background, the right of the layout did not move over. 
Answer: 
1, PAGE used to correct the corresponding template, such as "\ Template \ Ya Blue template program \ column page template \ default text works of the parent part page template (two right and left circular). Static pages" section of the template document. Remove the template "
" and "{PE.Label id =" node on the left of the text works "

ASP.NET APPLICATIONS, OPTIMIZING THE PERFORMANCE OF 26 EVERYDAY TIPS


consuming server resources. ASP.NET application pooling to help application (Connection Pool) to open and close the database to improve performance results. The system will connect the user's database connection pool on demand when removed, off when the recovery of connection, wait for the next connection request. Connection pool size is limited, if the connection pool to create a connection is still required after the maximum, be greatly effect performance. Therefore, to establish a database connection only open the connection when the real needs of operation, the application immediately after the close, so ... Body:
 
1. Visit Performance Optimization
Database connection and close
Resource requirements for visitors to create a database connection, open connection and close the connection of several operations. This part of the process needs to exchange messages with the database repeatedly authenticated, expensive trial of strength. . NET application application to help the connection pool (Connection Pool) to open and close the database to improve performance results. Database connection on a user's connection pool, the demand out, close the connection when the back, waiting for the next connection request.
Connection pool size is limited, if the connection pool to create a connection is still required after the maximum, be greatly effect performance. Therefore, to establish a database connection only open the connection when the real needs of operation, the application immediately after the close, so try to decrease the time to open the database connection to avoid connection beyond the control of the situation.
Application of the stored procedure
A stored procedure is stored on the server a set of pre-compiled SQL database statement, similar to DOS batch of documents. Stored procedure with an immediate visit to the database functions, message processing is very fast. Application of the stored procedure did not result to avoid multiple compilation command, after running an operation plan to reside in its cache, the demand just after the call directly to the binary cache.
In addition, the stored procedure runs on the server side, independent of the application ASP.NET applications, easy to correct, the most important achievement is that it did not decrease database operation statement on the Internet transmission.
Query optimization
ADO Connection ASP.NET application applications considerable consumption of resources, SQL database statement runs longer, taking longer time resources. Therefore, as far as possible applications optimized SQL database statement to decrease run time. For example, the query does not contain sub-queries, take advantage of indexes.
 
2. Char string operations performance optimization
Application tips ToString value category Char string in the connection, the frequent application of the "+" directly to the number added to the char string. This trick is simple, the results did not get the correct results, but not the same as it relates to the type of data, digital demand through the packing operation into the reference category was not added to the char string results. However, a larger effect on performance packing operations, due to the cessation of such treatment, will be allocated in the managed heap of a new object, the original value to the newly created objects.

Application of value types do not result ToString tips to avoid packing operation, thus increasing the practical application of program performance. The use of StringBuilder class String class objects are immutable, the String object re-assigned value, in essence, is to re-create a new value of the given String object and the object, the performance of their tricks ToString is not very significant increase. In dealing with char strings, the best use of StringBuilder class, the. NET application application namespace is System.Text. This class does not create new objects, but after Append, Rearouse, Insert and other tricks to stop directly on the char string operations, results of operations after return ToString tips. Its definition and operation of statement is as follows:
 
3. Optimize Web servers and the practical application of program-specific configuration files to meet your specific needs
By default, ASP.NET applications enabled application configuration is set to feature the most extensive and try to adapt to most everyday knowledge of the program. Therefore, the actual use of programs we did not score DEV procedures based on the actual use of application functionality, optimization and change some of these configurations to increase the actual use of program performance. The following list is a part of you should plan options.

The practical application of procedures only need to enable authentication. By default, the authentication mode to win the interface, or integrated NTLM. In most cases, the demand for the practical application of the authentication process, the best documentation in Machine.config disable authentication and enable authentication in the Web.config document. Under the appropriate request and response encoding settings to configure the practical application of procedures. ASP.NET Application Application default encoding format is UTF-8. If your program is strictly practical use ASCII, you configure the application procedures for the practical application of the performance of ASCII to get a little bit higher.

On the practical application of planning applications to disable AutoEventWireup. In Machine.config document will AutoEventWireup attribute is set to false, meaning PAGE names and events not to stop the match tips on matching and linking the two (such as Page_Load). If PAGEDEV we want to apply this part of the event, demand in the base class override this part of the trick (for example, demand for the load event rewrite PAGE Page.OnLoad, rather than as applied Page_Load tips). If disable AutoEventWireup, PAGE will be left after PAGE of the event and not connecting automatically as it is, get a slight performance boost.
Removed from the request processing pipeline without the module. By default, the server computer Machine.config document Nodes are reserved for the activation of all functions. The use of procedures based on the actual application, you do not score from the request to remove unused modules pipeline to get a little performance boost. Check each module and its functionality and customize it to your needs. For example, if you are not in the actual application of the use of the dialogue process state and output caching, you do not score from the List, remove them so that requests do not run more meaningful processing, do not have to run each module to enter and leave the source code.
 
4. Sure you want to disable debug mode
Practical application in the deployment of the production process or to stop before any performance measure, always remember to disable debug mode. If debug mode is enabled, the actual use of the program's performance estimates are subject to extraordinary large effect.
 
5. Extensive reliance on external resources for the practical application process, please plan on multiprocessor computers enabled Internet Gardening Application ASP.NET process model helps enable applications on multiprocessor computers scalability, multiple processes will be distributed to workers (each one), and each process is to contact the processor set to its CPU. This performance is called the Internet gardening. If the application of the practical application of program called a slow database server or external dependencies with COM objects (there is only mention of the two estimates), compared with the practical application of procedures for opening your Internet gardening is beneficial. However, in determining the opening of the Internet gardening, you should test the practical application programs on the Internet operation of the park.

FOREIGN LANGUAGE INTERNET ASP TIPS TO PREVENT INTERNET HACKERS


The second Internet Guide: not estimated immediately win your site. As ASP's easy to use, more and more applications are Internet daemon ASP scripting language. However, the ASP security vulnerabilities inherent part of, a little carelessness will give hackers an opportunity to help. In fact, security is not only a network thing, in English you must also pay attention to details in some of the security, to develop good safety habits, or will own a huge Internet security risks. Currently, most of the ASP program on the Internet so that security holes are, but if programming time to note that the words, but also ... the text:
How better to prevent hacker attacks, personal mention independent individual opinion! NO · 1, non-profit, non-profit program can not really use, since you do not have results to share the original code, the attacker did not score the same plan. If attention to prevention in the details, so your site to greatly increase the resistance. Injection SQL database even if there is a kind of vulnerability, the attacker does not win you estimate the site immediately. Because of the easy to use, more and more applications are Internet daemon ASP scripting language. However, the ASP security vulnerabilities inherent part of, a little carelessness will give hackers an opportunity to help. In fact, security is not only a network thing, we must also pay attention to details in some of the security, to develop good safety habits, or will own a huge Internet security risks.Currently, most of the ASP program on the Internet so that security holes are, but if a little programming time to pay attention to the words, but that did not result to avoid.

1, the user name and password is compromised
Attack Thought: the user name and password, hackers are often most interested in the items, if in some way be seen pouring through the code, the consequences are significant.
Prevention tips: involving the user name and password the best package at the end of the procedure, as little as possible appear in the ASP documentation involved with the connected user name and password should be given minimal privileges. Many occurrences of a user name and password did not result in a position to write contest include hidden document. If involved with the database connection, under ideal conditions it is only the permissions to run the stored procedure, do not directly given to the user to correct, insert, delete records of the authority.

2, authentication is bypassed
Attack ideas: the current needs of the ASP program validated mostly in the head plus a judge PAGE statement, but not enough, there are estimated to be hackers to bypass the authentication directly into.
Prevention tips: demand proven ASPPAGE, can track the PAGE on a document name, and only come in from the previous dialogue turn PAGE to read the PAGE.

3, inc disclosure documents and difficult
Attack idea: when there is production of ASP's home page and do not stop before the final testing completed, no additional results are some of the mobile object for the Search. If this time was using Search engines look for this part of the stop, the document will be on the grade, and can view the database in place and the details of the framework, and to reveal the full stream of the code.
Prevention tips: programmers should be published in the website thoroughly before it is to stop debugging; security experts reinforced the need for external users ASP document can not see them. First. Inc encrypted document content to stop, then did not score applications. Documents instead. Inc document should be directly from the browser the user can view the document stream of code. inc document the default document name can not be applied or have special meaning easy to guess the name of the user, no rules apply as far as possible in English letters.

4, the automatic backup is downloaded
Attack idea: In some props editing ASP program, when the ASP to create or correct a document, Editor automatically creates a backup of documents, such as: UltraEdit will backup one. Bak document, as you create or corrected some. asp, Editor will automatically generate a document called some.asp.bak, if you do not delete the bak document, the attacker did not score a direct download some.asp.bak document, as some.asp the source will be downloaded.

Prevention tips: check carefully before uploading process, delete unnecessary documents. BAK suffix of the document to be especially careful.

5, a special char
Attack ideas: the input box is a hacker using the purpose of their No results through the input script language such as damage to the user client; if that involves data query input box, they will use a special query and get more database data, or even the entire table. Therefore necessary to filter out the input box to stop. However, if only in order to increase efficiency and legitimacy of the client stop the importation of inspection, there are estimated to be bypassed.
Prevention tips: dealing with a similar message boards, BBS, etc. in the input box of the ASP program, the best block out static pages, javaScript, VBScript statements, as no special requirements, not performance limited only enter letters and numbers, masked special char. At the same time the length of the input char stop control. And not only the legality of the client stop the importation of inspections at the process on the server side to stop a similar examination.

6, Database Download Vulnerability
Attack thoughts: In with the Access database to do the background, if someone through a variety of tips to understand or guess the server's Access database path and database name, then he can download the Access database, document, which is unusual dangerous.
Prevention tips:
(1) the name of your database documentation for unusual from a complex regulation of the name, and put it under layers of the list. The so-called "extraordinary rules", so to speak, for example there is a database to save information about books, can not give it a "book.mdb" name, but to play a strange name, such as d34ksfslf.mdb, and put it on as ./kdslf/i44/studi / the layers list, so after a hacker in order to guess the way to get your Access database document to more difficult.
(2) The database name can not be written in the program. Some people like to write the DSN in the program, such as:
DBPath = server. MapPath ("cmddb.mdb") 
conn.Open "driver = {Microsoft Access Driver (*. mdb)}; dbq =" & DBPath
If in case people got the source, the name of your Access database to a glance. Therefore, in the opinion set your ODBC data source, and then write in the program as:
conn.open "webjxcom"
(3) Application Access to the database document coding and encryption. First, the "props → Security → Encryption / decryption database", select the database (such as: employer.mdb), and then click OK, then there will be "encrypted database, Save As" window can be saved as: "employer1.mdb" .
It should be noted that the above action does not set a password as the database, but only on the database to be encoded document, the purpose is to prevent other applications other props to view the content of the document database.
Then we as database encryption, encoding the first open after the employer1.mdb, when opened, select the "monopoly" approach. Then select the menu "prop → Security → Set Database Password", then enter the password. That even if the others were employer1.mdb documents without a password can see he is employer1.mdb content.

7, injection attacks against remote
Such attacks in the past should be the battle against the daily knowledge of methods, such as POST attack, the attacker did not score easily change the data value has to be submitted to attack purposes. Another example: COOKIES forgery, was the fuse that more value writers, or the attention, do not apply COOKIES method for the user authentication, or you and the thief left the keys to the same reason.
For example:
If trim (Request. cookies ("utitle "))=" fqy" and Request.cookies ("upwd") = "fqy # e3i5.com" then 
... ... .. Abundance ... ... ... 
End if
I think you like the Internet regulators to write the program or do not make such mistakes buddy, really is unforgivable. Forged COOKIES are more young people, and you also used to blame other people like to run your password. Involves to the user's password or user login, you best use it is the most secure session. If you want to apply COOKIES COOKIES in your message on one more, SessionID, which is 64-bit random value, we must guess solution It is not estimated. Example:
if not (rs.BOF or rs.eof) then 
login = "true" 
Session ("usertitle" & sessionID) = Usertitle 
Session ("passexpress" & sessionID) = Passexpress 
'Response.cookies ("usertitle") = Usertitle 
'Response.cookies ("Passexpress") = Passexpress
Here we talk about how to prevent remote injection attacks, attacks are usually single table to submit documents to the local drag, the Form ACTION = "chk.asp" to point to your server documentation to process the data. If all your data filter out pages in a single table, then congratulations, you will have been scripting attack.
How can stop that kind of long-range attack? Easy to handle, see the source code is as follows: The body of (9)
<% 
server_v1 = Cstr (Request. Server Variables ("HTTP_REFERER")) 
server_v2 = Cstr (Request. Server Variables ("SERVER_NAME")) 
if mid (server_v1, 8, len (server_v2)) <> server_v2 then 
response.record "

" 
response.record "" 
response.record "the wrong path you submit, submitted against the data from an external site, please change the parameters can not be chaos!" 
response.record "" 
response.end 
end if 
%> 
'Feeling independent individual filter out the source code above is not as good, some of the external submission and she was upright in, then write one. 
'That is to filter out good results, opinions applications. 
if instr (request.servervariables ("http_referer "),"")) <1 then response.record" server error when processing URL. 
If you are using any means to attack a server, you should be glad, for your server, all operations have been recorded, we will NO · 1 notice to the Public Security Bureau and the English department to check your IP. " 
response.end 
end if

ASP.NET Input Security


The second Internet Guide: Class records, or that they expect to apply some "query interface" to create and run queries, SQL databases without having direct application. This article demonstrates the use of ASP performance filter out the records to establish the interface to select a trick. Although the discussion of the settlement where the trick is quite simple, but the application did not result in similar performance of complex queries of any WebPAGE help do the job. Solution for any tips before coding, you should fully understand and record the end-user needs. For this example, the user requires the ability to use the specified types of tricks to get the specified name ... Body:
 
First, note 
Most end users of their Web solutions require some kind of report can help do the job.Application of static Web pages and, no result is very simple to help record and are listed in the table one by one view of their competence. However, users often require that after a drop-down list box (or other selection method) to select a specific category of records, or that they expect to apply some "query interface" to create and run queries, SQL databases without having direct application. This article demonstrates the use of ASP performance filter out the records to establish the interface to select a trick. Although the discussion of the settlement where the trick is quite simple, but the application did not result in similar performance of complex queries of any WebPAGE help do the job. 
Solution for any tips before coding, you should fully understand and record the end-user needs. For this example, the user requires the ability to use the specified class name specified in the table to get the hang of a group of records, he had not the type of results did not select all results select a specific category. That feature is there, we apply a the "recursive" ASPPAGE, it has helped select the form contains the category from the list, according to the data extraction form to send the results of the record set, the result will be recorded in the form of table appears to facilitate the user to look. 

Second, the structure required to filter out 
For the practical application of such a database should first understand the database table involved in the necessary framework and connect to the database connection parameters. Tips connection parameters specified in Microsoft's ASP online documentation has a very detailed description, the paper will not repeat them. In this case to use two tables for the: Document_Category, it contains for the user to select a category name Category_Name; Documents, which contains the names corresponding to other data types, fields, including Category_Name, File_Name, Comments, Date_Submitted and so on. 
Select the category list in the form table from the category of Category_Name Document_Category field, constructed type drop-down list box below, please note that there use to VBScript ADO contains documentation: 


 
<% 
ConnString = "DSN = LocalUpload;" 
Set conn = server. CreateObject ("ADODB.Connection") 
conn.Open ConnString,,, adOpenForwardOnly 
Set rs = SERVER.CreateObject ("ADODB.Recordset") 
'First get used to populate the drop-down list box the type of record 
'Set the SQL database statement 
database strSQL = "SELECT * FROM Document_Category ORDER BY category_title" 

database rs.Open strSQL, conn, adOpenStatic 
%>

PERSONAL HISTORY TIPS: ASP.NET APPLICATIONS 2.0 GENERICS AND ANONYMOUS TIPS

Introduction to the second Internet: s.Generic.Stack (statement source code) did not score the Stack class thought of as the process has the following schematic: Stack class indicative source: public class stack <> {T [] item; int count ; public void Push (T item) {} public T pop () {}} No results for the generic type parameter set three kinds of constraints: the derived constraints, structural parameter constraints, the reference / value type constraint Anonymous Tip: Almost Anonymous Tips ... Body:
Generic:
Generic Description: Generic class can actually be used, tricks, frameworks, interfaces, delegates and other design, and re usability, type and high efficiency is associated in a non-generic of the reach for the practical application of generic , required application class System.Collections.Generic.Stack. Such a statement as follows:
System.Collections.Generic.Stack (Declaration)
No results the Stack class thought of as the process has the following schematic:
Indicative of the source code of class Stack:
public class stack <> 

{ 

T [] item; 

int count; 

public void Push (T item) {} 

public T pop () {} 

} 

No results for the generic type parameter to set the constraints 3: derived constraints, structural parameter constraints, the reference / value type constraint
Anonymous tips:
Anonymous tips overview: In C # 1.x, the application support calls tricks of the delegate to occur event. Fu and tricks to help calculate commission to add or delete the purpose of tips, did not result in the whole. Net framework, widely used for events, callbacks, asynchronous calls, multithreading. However, in order to apply a commission, and sometimes can not not create a class or a trick, this approach is too cumbersome, and the habit of thinking with the DEV we do not match. For example, the following example arose from a box containing a list, document boxes, and buttons for simple input form. When you press the button, the document box of the document will be added to the list box. In C # 1.x, the application event mechanism entrusted to occur, the source code looks like
The emergence of application C # 1.x source code
class InputForm: From 

{ 

ListBox listBox; 

TextBox textBox; 

Button addButton; 

pulic MyForm () 

{ 

listBox = new ListBox (); 

textBox = new TextBox (); 

addButton = new Button (); 

} 

........ 

void AddClick (object sender, EventArgs e) 

{ 

listBox.Items.Add (textBox.Text) 

} 

} 

Anonymous tips allow one associated with the source code (usually tips entity) "embedded" into the application areas delegate, delegate and tricks entities that together
The emergence of anonymous tips application source code (no argument)
class InputForm: From 

{ 

ListBox listBox; 

TextBox textBox; 

Button addButton; 

pulic MyForm () 

{ 

listBox = new ListBox (); 

textBox = new TextBox (); 

addButton = new Button (); 

addButton.Click + = delegate {listBox.Items.Add (textBox.Text);}

.NET ENGINEERS MUST UNDERSTAND THE 20 QUESTION


The second Internet Guide: is overloaded? CTS, CLS and CLR, respectively, be interpreted?4. List know about your performance and the practical application of XML types and reference types 5.value the difference? Write a C # sample source code. 6.ADO.net in which everyday objects? Describe, respectively. 7. How to understand the commission? 8.C # interfaces and classes in what similarities and differences. 9 .. net in which classes are used to read and write database needs? Their connections and TCP connection function 10.UDP the similarities and differences. Body:
Want to become. Net engineer? Consider the following 20 questions you can answer how much road?
1. OO What are the main ideas?
2. What is. Net user control in the
3. What is the actual use of application domain? What is regulated? What is a strong category?What is boxing and unboxing? What is overloading? CTS, CLS and CLR, respectively, be interpreted?
4. List know about your performance and the practical application of XML
5.value categories and reference category is the difference? Write a C # sample source code.
6.ADO.net in which everyday objects? Describe, respectively.
7. How to understand the commission?
8.C # interfaces and classes in what similarities and differences.
9 .. net which classes are used in reading and writing needs? Their function
10.UDP connections and similarities and differences between TCP connections.
11.ASP.net authentication methods are there? What were thinking?
12. Processes and threads, respectively, how to understand?
13. What is the code-Behind performance.
14. Gathering the list of features.
15 .. net class to read and write XML, which all belong to the namespace?
16. Explain UDDI, WSDL meaning and function.
17. What is SOAP, what practical use.
18. How to deploy one ASP.netPAGE.
19. How to understand. Net recovery mechanism in the Junk.
20. Everyday tips for calling webservice What?