Tags: .NET

Data Types in C#

Benjamin Perkins C#

There are some really good descriptions and explanations concerning data types on the internet. However I will add my understanding and comments about them on this website. Just in case you stumble across this page in your search for ultimate C# knowledge.  There are 2 data types. Value Types and Reference Types. I published a […]

Read More →

Arrays in C#

Benjamin Perkins C#

I always liked the concept of arrays. Being able to conceptually visualize in multiple dimensions took me some time to get my mind around, but in the end I was successful. The example here will discuss 2 dimensional arrays of type single, multiple and jagged. A single dimensional array is the simplest. You simply code […]

Read More →

Hacked

Benjamin Perkins C#

This happened to me way back in 2011.  I am migrating all my blogs and articles to this site and am adding it here.  This shouldn’t happen anymore if you use an ORM like Entity Frame Work or NHibernate.  A few weeks ago I had to fend off a hacker. Some of the database statements […]

Read More →

Language Independence

Benjamin Perkins C#

The most common .Net languages are Visual Basic, C++ and C#. However, there are numerous other programming languages that will function with the .Net Framework. Like, F#, J#, PowerBuilder, IronPython, IronRuby, etc… It is possible to use .Net from many programming languages because they have all agreed on some standards. For example the Common Type […]

Read More →

Lab 28: The impact of debug=true

IIS Benjamin Perkins

Prerequisites Read this about .NET Compilation Read this about why debug=true is not good for performance Understand that ASP.NET (ASPX, ASCX, ASAX, MVC) files are compiled into a DLL and stored into c:\Windows\Microsoft.NET\Framework?\v?.?.?\Temporary ASP.NET Files Setup Install CSharpGuitarBugs.zip onto an IIS web server as per Lab 1 Install the ASP.NET Role Open the IIS Manager […]

Read More →

Using TLS 1.2 with WCF

Security Cyber Benjamin Perkins

NOTE: Security is a very serious topic and you should always engage an IT security expert before deploying an application that needs to be secure. This article is intended to share my experience versus being an article to use as a guideline. With all the news about the different vulnerabilities like heartbleed and poodle, developers […]

Read More →