Jul 16
Did you know? You can type ASCII characters into any application. Press and hold the Left-Alt key, then using the numeric keypad, type the four-digit decimal number for the ASCII character you want, then release the Left-Alt key. For example, to type è, press and hold Left-Alt, then type 0232 on the numeric keypad. When you release the Left-Alt key, è will be typed.
Here is the world famous ASCII table:
Continue reading »
Tags: ASCII, ASCII-Table, Tips
Jul 11
The version of .NET against which you compile an application or assembly may not be the same version of .NET on which the application is currently running. A .NET application should always be able to run on the same or newer version of .NET against which it was compiled.
This is because .NET is backward compatible. This means that an application compiled on .NET v1.1 should run OK on .NET v2.0 and v3.0. But an application compiled on .NET v2.0 will not run on .NET v1.1.
Continue reading »
Jul 11
You can use the following JavaScript code in a web page to determine which versions of .NET are installed on a client PC:
Continue reading »
Jun 19
The leading SEO (Search Engine Optimization) sites will tell you that placing an ad after the first post in your blog’s home page is particularly effective. This is because the ad is essentially embedded in the blog content, hence your readers are less likely to develop “ad blindness” and skip over the ad as usual.
To place an ad after the first post in your WordPress blog main page:
Continue reading »
Tags: Ad-Blindness, AdSense, Blog, Blogging, Google, Tips, WordPress
Jun 14
Have you ever tried to find your Internet Explorer 7 (IE7) cookies or temporary files on disk using Windows Explorer? Chances are Explorer is configured to hide system files, which is how Microsoft has designated the folder that contains its IE7 files.
Continue reading »
Tags: Cookies, IE7, Internet-Explorer, Internet-Explorer-7, Temporary-Files, Temporary-Internet-Files, Web, Windows
Jun 14
Blogs are becoming an important and prevalent method for software developers to share knowledge, tips and code. Unlike code-sharing sites that have publication guidelines and restrictions, blogs are typically privately-owned, which gives developers freedom to deliver and format their content in many ways. But this freedom can also result in a poor experience for the blog reader, ranging from code samples that won’t compile, to the equivalent of a messy desk where nothing useful can be found.
Following are several tips for software developers to write and manage their blogs, and to make the blogs easier to use and navigate for their readers.
Continue reading »
Tags: Blog, Blogging, categories, Live-Writer, More-Tag, Spam, Spam-Blog, Splog, Splogger, Splogging, Tags, Visual Studio, Web, WordPress
Jun 13
Many applications store data in the “My Documents” folder. Unfortunately, by default this folder is buried at “C:Documents and SettingsUserNameMy Documents”.
A smarter approach is to separate your programs and data. For example, I store the operating system and programs on my C: drive and all data on my D: drive.
But simply moving your data is not enough–you need to tell applications and the operating system where to find it.
Continue reading »
Tags: My-Documents, Tips, Windows
Jun 05
Copyright infringement is the sincerest form of flattery.
What’s a Splog?
A splog or “spam blog” is a blog that steals content from other web sites, then aggregates and republishes all or some of the content on its own blog.
Splogs are created to promote and increase search engine ranking of affiliated web sites, and/or to make money from ads shown on the splog. Typically splogs are automated, but they can also be manual copy & paste. A recent study indicated that 56% of all blogs are spam, and there are over 575 thousand splogs reported.
Continue reading »
Tags: Anti-Piracy, Blog, Blogging, Content-Piracy, Content-Theft, DMCA, Fair-Use, Spam, Spam-Blog, Splog, Splogger, Splogging, Web
Jun 02
If you are a .NET developer, how would you feel if your original C# or VB source code was published on the Web for the world to see? That’s exactly what happens if you release your .NET software without obfuscation.
Continue reading »
Tags: .NET-assembly, Anti-Piracy, Development, Disassembly, Obfuscation, Obfuscator, Piracy, Reflection, Reflector, Reverse-Engineering, Xenocode
Jun 02
About one-third of all software installed on personal computers globally in 2006 was pirated, according to a study from IDC. This resulted in a worldwide software revenue loss of $40 billion, an increase of more than $5 billion or 15% over 2005. The software piracy rate exceeded 60% in more than half of the 102 countries studied, and exceeded 75% in about one-third of the countries.
Continue reading »
Tags: Anti-Piracy, BSA, Business, Piracy, SIIA, Software-Piracy