Skip to content
Another Day in the Life of a Programmer Gal

Another Day in the Life of a Programmer Gal

To curiosity…

TNW Categories

  • .NET Framework (14)
    • .NET (7)
    • CLR (5)
    • Task Parallel Library (1)
    • WPF (2)
  • .NET Graphics (1)
  • .NET Windows Forms (1)
  • APIs (1)
  • Architecture (13)
    • Domain Driven Design (1)
    • IdM (2)
    • Release Management (1)
    • Service Oriented Architecture (1)
    • Software Maintenance (3)
  • ASP.NET (8)
    • ASP.NET Delegation (1)
    • ASP.NET MVC (1)
    • Forms Authentication (1)
    • Globalization (2)
  • Azure Cloud (1)
  • Back to Basics (4)
    • Agile (3)
      • Mocks (1)
  • C# (7)
  • CAB/Prism (2)
    • composite applications (1)
  • Cache (1)
  • Certification (1)
  • Curiosity (2)
  • data exchange (1)
  • Delegation (1)
  • Fusion (1)
  • GUIs (2)
  • hosting (2)
  • HTTP (3)
  • IdentityManagement (3)
  • interop (1)
  • Java (3)
  • JavaScript (1)
    • JQuery (1)
  • Kerberos (2)
  • localization (2)
  • MCP (1)
  • Merge Replication (11)
  • NHibernate (1)
  • OAUTH2.0 (3)
  • OIDC (3)
  • Out of Curiosity (24)
  • Performance (2)
  • PowerShell (1)
  • Privacy concerns (2)
  • protocol transition (1)
  • Security (11)
    • Digital Certificates (1)
    • Digital Signatures (1)
  • SQL Server (20)
    • data partitions (1)
    • Reporting Services (2)
  • TSQL (1)
  • Uncategorized (87)
  • Visual Studio IDE (1)
  • web 2.0 (7)
    • caching (1)
    • IE6 (1)
    • IE6 and IE5 (1)
  • web composition pluggable architecture (2)
    • wcsf (1)
  • web services (5)
    • svcutil (1)
    • WCF (2)
  • Windows Debuging Tools (3)
    • ANTS Profiler (1)
    • Performance bottlenecks (2)
  • Windows OS (3)
    • Windows XP Professional (2)
  • XML (1)
    • schema files (1)

Archive

February 2014
M T W T F S S
 12
3456789
10111213141516
17181920212223
2425262728  
« Apr   Jul »

Search TNW

Tags

  • #aad
  • AAD-b2c
  • adal
  • agile
  • architecture
  • asc
  • ASP.NET
  • Azure
  • azure security center
  • bearer_token
  • ciam
  • cloud-identity-access-management
  • CPU_usage
  • devops
  • digital_certificates
  • digital_signatures
  • grant_type
  • graph
  • Identity Management
  • identity provider
  • idp
  • java
  • jwt
  • jwt bearer_tokens
  • KQL
  • Kusto
  • memory_analysis
  • microsoft
  • Microsoft_Sentinel
  • msal
  • oauth2
  • oauth2.0
  • oauth2_flows
  • oidc
  • OSS
  • Security
  • Sentinel
  • SIEM
  • SOA
  • Software Engineering
  • software_maintenance
  • spring-security-azure-ad
  • springboot
  • springmvc
  • Windows_Security_Events

About me.

  • Who’s the author of this blog?

Month: February 2014

Never underestimate the importance of training your IT personnel

fa435a8c-577b-11e3-928e-12313d04d198-medium

Posted on February 17, 2014Categories Architecture, Software MaintenanceLeave a comment on Never underestimate the importance of training your IT personnel

What is a SQL Injection attack?

Two days ago I interviewed a developer that was applying for a junior software developer position.

One of the questions that every interviewer must always ask is about the security of the data.

So, the developer answered the question by referring me to this comic:

How to avoid sql server attacks in a funny way.
How to avoid sql server attacks in a funny way.
Posted on February 16, 2014February 16, 2014Categories Security, SQL ServerLeave a comment on What is a SQL Injection attack?
Proudly powered by WordPress