Monday, November 8, 2010

Exchange 2010 Development

The following is a collection of links that I'm using to learn Exchange development

Exchange 2010 Developer webcasts

Exchange 2010 SP1 SDK packages

More Developer webcasts

MSDN Guide to Exchange 2010 SP1 Development Technologies

Friday, September 17, 2010

JavaScript Speed Comparison IE9 Beta vs. Firefox 4.0b6

Using the SunSpider JavaScript benchmark at webkit.org, here's the results for my PC.  Both browsers support GPU acceleration. Both browsers have those settings set to their default values.  IE9 comes out ahead, being about 20% faster than Firefox 4.0b6 on my work PC hardware (Core2 Duo E6550 @2.33 GHz, ATI Radeon HD 2400 Pro video adapter). This is by no means the end-all, be-all of browser performance ratings, just a cursory test since I was curious.

Firefox 4.0 beta 6: http://bit.ly/9AgL8b

Internet Explorer 9 Beta: http://bit.ly/dvlVWv


Friday, July 30, 2010

Generate all possible values for the Defcon 18 Badge Ninja Unlock in C#

Part of the fun at DEFCON is the badge hacking contest.  This year I decided to take a hard look at the code behind the badge.  One area of interest was the Ninja Party "Locked" screen, so I decided to see if I could figure out how to unlock it.  I did.  Here's the code I used.  There was also an Excel spreadsheet involved that computed the tumbler values based on the dc18_encode_tumblers function in the file DC18_Badge.c.

Once you figure out the pin encoding (I can’t make this too easy), this code will let you validate the integer result.


Keywords: DEFCON DC8 Ninja Badge NinjaNetworks

Monday, June 28, 2010

Query Windows 7/Vista/Server 2008 Security Log for Login Failures using an XPATH

The following XPATH query allows you to query for all “Audit Failure” events from the Windows Security event log where the user name matches the string “username”.  Ideally you’d be able to use a contains(.,“username”) clause instead of the =“username” syntax, but so far I haven’t been able to make that work.

Code Snippet
  1. <QueryList>
  2.   <Query Id="0" Path="Security">
  3.     <Select Path="Security">*[System[Provider[@Name='Microsoft-Windows-Security-Auditing'] ]] and (*[System[band(Keywords,4503599627370496)]]) and (*[EventData[Data[@Name="TargetUserName"]="username"]])</Select>
  4.   </Query>
  5. </QueryList>

If you have some ├╝ber-cool XPATHs you use to query your event logs, post them to the comments section.

Thursday, February 18, 2010

Background Transparency In Office 2004

Edit the slide master

Add your picture

Send it to the back of the slide by choosing Send to Back on the Layering menu.

 Picture 4

Next, click Format Picture… in the formatting palette.

Picture 3

Slide the Transparency slider until a desired transparency effect is reached. You can click the Preview button in the bottom left-hand corner of the window to see the results of your chosen settings.

Picture 1

Above (before). Below (after)

Picture 2