Search: none
Add a search phrase to search resource page titles and descriptions. Different keywords are ANDed with tags.
 

MSDN Archive

Target and filter your gallery search using the following dynamic dialogues.
1-3 of 3Resources < Previous 1 Next >
Resource Page Name and Description Current Release
The ActiveX "killbit" has been in the security news lately, and I've always been mystified by how the 'killbit' works. Then I read an article in one of Microsoft's blogs that went into great detai...
The ActiveX "killbit" has been in the security news lately, and I've always been mystified by how the 'killbit' works. Then I read an article in one of Microsoft's blogs that went into great detail about the ActiveX "killbit" and how it's actually configured and used (http://blogs.technet.com/swi/archive/2008/02/06/The-Kill_2D00_Bit-FAQ_3A00_-Part-1-of-3.aspx). And even further, Robert McLaws' blog article "IE8 and "Killbits'" (http://www.windows-now.com/blogs/robert/ie8-and-killbits.aspx) gave me the incentive to think of this as more than just a propellerhead problem. Once I had that information in hand, and mostly because I was looking for a new challenge for my growing coding skills, I decided to write a .NET GUI app that would allow me to see which ActiveX controls had been "killbit'ed" (as well as explore all those ActiveX controls that were candidates for the "killbit"). I've left room in the application to be able to enable editing of the killbit (turning it on for additional controls, as well as *potentially* turn it off for already-"killbit'ed" controls), but in its initial form it's just a read-only exploration tool. If you like it, and would like it to be enhanced in some way, let me know by posting a new Discussion or Issue in the project space. If you'd like more details on how it was constructed, ask away and I'll post explanations as answers (and as a way to document it as well).
Popular tags: .NET, .NET 2.0, ActiveX, C#, Internet Explorer, killbit, security
Downloads: 4 | Started: Jul 21 2008  | Contributors: 1
Providing WPF and Windows Forms sample application to demonstrate how to programming elevated privilege/UAC.
Providing WPF and Windows Forms sample application to demonstrate how to programming elevated privilege/UAC.
Popular tags: WPF, XAML, Windows Forms, UAC, security, C#
Downloads: 0 | Started: Aug 14 2009  | Contributors: 1
First Release
Aug 14 2009
This example uses Microsoft Codename "Dallas", a service based on SQL Azure, to show how to integrate a web service with Microsoft AppFabric Access Control (AC), a part of the Azure Services Platfo...
This example uses Microsoft Codename "Dallas", a service based on SQL Azure, to show how to integrate a web service with Microsoft AppFabric Access Control (AC), a part of the Azure Services Platform. It includes a WPF based Dallas browser, an AC management library, and a set of AC aware Dallas service proxy classes. Prerequisites include Visual Studio 2008 SP1, .NET Framework 3.5 SP1, Microsoft Windows Identity Foundation and WPF Toolkit June 2009 Release.
Downloads: 0 | Started: Dec 10 2009  | Contributors: 3
Fabrikam Jets (2.1)
Jul 8 2010
Updating...
Page view tracker