How to secure Windows Remote Desktop (RDP)

How to secure Windows Remote Desktop (RDP)

How secure is Windows RDP? By default, a Remote Desktop session is operated via an encrypted channel which prevents anyone to view your session by network listening methods. Although this is a secure method, it is still susceptible to “man-in-the-middle-attack” to a certain degree as well as a form of brute-force attacks or simple guesses if the attacker has any info on your general likes, preferences and habits (Social media is fun indeed). Basic security tips Keep your Windows updated…

Read More Read More

Set up a proxy server on the machine level

Set up a proxy server on the machine level

Set up the proxy for a system account ExecutePsExec.exe -i -s cmd.exeto run the command prompt under a system account.Note: Check whether you have the proper login set up by executing the “whoami” command. The response should be “nt authority\network service” Execute%PROGRAMFILES%\Internet Explorer\iexplore.exeto run Internet explorer in system context. Open the Control Panel, and go to Internet Options > Connections > LAN settings. Click Use a proxy server, and define your proxy settings. Set up the proxy for a network…

Read More Read More

Throttling Concurrent Outgoing HTTP Requests in .NET Core

Throttling Concurrent Outgoing HTTP Requests in .NET Core

In my last post, we implemented the rate limiting for an API endpoint on the server side. The server side rate limiting is useful for API providers to ensure system performance and/or to realize business values. On the client side, the API consumers then should throttle the rate of concurrent HTTP requests in order to comply with the rate limits of the endpoints and moderate the usage of client side resources. This post will go over how to make concurrent outgoing HTTP requests on the client…

Read More Read More

Oracle for Absolute Beginners: Date, Timestamp and Interval

Oracle for Absolute Beginners: Date, Timestamp and Interval

Source: https://www.red-gate.com/simple-talk/sql/oracle/oracle-for-absolute-beginners-date-timestamp-and-interval/ All databases stand on a tripod of datatypes: strings, numbers and dates. And though they might dress them in fancy clothing – varchar2, clob, float, integer – strings are really just strings, and numbers are really just numbers. But dates — dates are interesting. In this article I’ll talk to you about dates, about time, and about how both are All databases stand on a tripod of datatypes: strings, numbers and dates. And though they might dress them…

Read More Read More

Run/install/debug Android applications over Wi-Fi

Run/install/debug Android applications over Wi-Fi

Connect the device via USB and make sure debugging is working; adb tcpip 5555. This makes the device to start listening for connections on port 5555; Look up the device IP address with adb shell netcfg or adb shell ifconfig with 6.0 and higher; You can disconnect the USB now; adb connect <DEVICE_IP_ADDRESS>:5555. This connects to the server we set up on the device on step 2; Now you have a device over the network with which you can debug as usual. To switch…

Read More Read More

Enable/Disable Hyper-V

Enable/Disable Hyper-V

To disable Hyper-V from starting the following command can be used: bcdedit /set hypervisorlaunchtype off To enable the Hyper-V role again use the following command: bcdedit /set hypervisorlaunchtype auto A reboot of of the Windows 10 is necessary.

Những định luật nổi tiếng trong phát triển phần mềm

Những định luật nổi tiếng trong phát triển phần mềm

Định luật Murphy: Nếu một tình huống xấu có thể xảy ra, thì nó sẽ xảy ra (If something can go wrong, it will). Defensive programming, version control, TDD, MDD,… đều là các nguyên tắc, kỹ thuật được sử dụng để phòng trách các sự cố liên quan đến định luật Murphy. Định luật Brook: Gia tăng nhân lực cho một dự án chậm tiến độ càng làm nó chậm tiến độ hơn (Adding manpower to a late software project…

Read More Read More