Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Add key: DisableAntiSpyware 1
Source: https://dev.to/risafj/beginner-s-guide-to-oauth-understanding-access-tokens-and-authorization-codes-2988 As a user, it’s easy and convenient to use your Google account (or Facebook, Twitter, etc.) to sign into other services. You click the “Sign in with Google” button You get redirected to a consent screen You click “Allow” The page redirects to the actual application But there’s actually a lot going on … Read moreBeginner’s guide to OAuth: Understanding access tokens and authorization codes using Google API
Source: http://fabricjs.com/fabric-intro-part-3 We’ve covered most of the basics in first and second parts of this series. Let’s move on to the more advanced stuf! Groups First thing we’ll talk about is groups. Groups are one of Fabric’s most powerful features. They are exactly what they sound like — a simple way to group any Fabric objects into a single … Read moreIntroduction to Fabric.js. Part 3.
Source: http://fabricjs.com/fabric-intro-part-2 In the first part of this series, we only started to get familiar with Fabric.js. We looked at the reasons to use Fabric, at its object model and object hierarchy, at different kind of entities available in Fabric — simple shapes, images, and complex paths. We also learned how to perform simple operations with … Read moreIntroduction to Fabric.js. Part 2.
Source: https://flaviocopes.com/should-commit-node-modules-git/ That’s a good question to have. There are pros and cons. I discuss the topic so you can make your own opinion. Published Aug 06, 2018 Should you commit the node_modules folder to Git? I mention Git but the same applies to any version control system you happen to use That’s a good question … Read moreShould you commit the node_modules folder to Git?
Source: https://philipm.at/2018/searching_users_in_active_directory.html Two Approaches to Searching Users in Active Directory Thu, Oct 18 2018 I’m sure there are more than two ways to perform searches against Active Directory, however I wanted to highlight two approaches: DirectorySearcher and PrincipalSearcher. The former, DirectorySearcher comes from System.DirectoryServices and it’s the more “bare-metal” version of the two. PrincipalSearcher, of System.DirectoryServices.AccountManagement provenance, is more of a query by example pattern and I’d … Read moreTwo Approaches to Searching Users in Active Directory
Source: https://www.productiverage.com/i-didnt-understand-why-people-struggled-with-nets-async I didn’t understand why people struggled with (.NET’s) async Long story short (I know that some readers love a TL;DR), I have almost always worked with async/await in C# projects where it’s been async from top-to-bottom and so I’ve rarely tried to start integrating async code into a large project that is primiarily non-async. Due … Read morePeople are struggling with .NET Async
Source: https://msdn.microsoft.com/en-us/ie/aa292118(v=vs.94) ASP.NET Impersonation Another important security feature is the ability to control the identity under which code is executed. Impersonation is when ASP.NET executes code in the context of an authenticated and authorized client. By default, ASP.NET does not use impersonation and instead executes all code using the same user account as the ASP.NET process, … Read moreWhat is IIS Impersonation
Source: https://michaelscodingspot.com/ways-to-cause-memory-leaks-in-dotnet/ Any experienced .NET developer knows that even though .NET applications have a garbage collector, memory leaks occur all the time. It’s not that the garbage collector has bugs, it’s just that there are ways we can (easily) cause memory leaks in a managed language. Memory leaks are sneakily bad creatures. It’s easy to ignore … Read more8 Ways You can Cause Memory Leaks in .NET