Richard Morris Bruce Schneier: Geek of the Week If one were to close one's eyes and imagine a BT Executive, one would never conjure up Bruce Schneier. He... 16 February 2010 12 min read
Dr. Masha Petrova Increase Your Value as a Professional in the Technical Industry It has never been so important to enhance your employability as it is today. Job security can never be taken... 17 November 2009 7 min read
Richard Morris Luca Cardelli: Geek of the Week Luca Cardelli is probably best known for Polyphonic C# and Biocomputing, but he has designed a number of experimental languages... 02 September 2009 7 min read
Nick Harrison A Defense of Reflection in .NET The trouble with making general rules about programming practices is that one can miss out on many benefits of of... 13 August 2009 14 min read
Ben Lye Restricting Outlook Client Versions in Exchange 2007 There are good reasons for preventing old versions of Outlook from connecting to Exchange Server. You'll probably, at least, want... 29 July 2009 7 min read
Brian Harris Ziggurats, Batman and the Town Crier We asked Brian for a description of the Help System for the software he's working on and ends up quoting... 19 August 2008 11 min read
Richard Morris Ross Anderson: Geek of the Week Professor Ross Anderson is one of the foremost experts in Computer Security in the world. He has published widely on... 31 July 2008 13 min read
Richard Morris The Dark Arts of Journalism Although the IT industry is usually blamed for security breaches in confidential databases, it is likely that it is usually... 16 March 2008 9 min read
Cristian Lefter Logon Triggers Login Triggers were quietly introduced in SP2 to tighten up the security features of SQL Server to comply with the... 10 October 2007 28 min read
András Belokosztolszki Discovering Security Uses for SQL Compare Much of the security of SQL Server is implemented as part of the database schema. This provides some bonus uses... 06 August 2007 10 min read
William Brewer SQL Server Endpoints: Soup to Nuts SQL Server Endpoints are database objects that define the ways and means that SQL Server 2005 communicates on the network.... 06 July 2007 12 min read
Phil Factor Robyn Page SQL Server Security Workbench Part 1 Robyn Page and Phil Factor present practical T-SQL techniques for controlling access to sensitive information within the database, and preventing... 06 March 2007 17 min read
Robyn Page SQL Server Security Cribsheet If you've ever had brain meltdown trying to understand SQL Server users, roles, permissions, logins etc. then Robyn Page's security... 20 February 2007 21 min read
Jesse Liberty Controls Based Security in a Windows Forms Application Jesse Liberty demonstrates a role-based security architecture for Windows Forms applications that will allow you to restrict access to any... 22 January 2007 24 min read