The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,862 other subscribers

Archive for January, 2013

Chrome extension Search Plus (formerly FullSearch): Search Any Text String Across All Open Tabs In Chrome

Posted by jpluimers on 2013/01/11

Often while researching, I have a zillion pages open in Chrome. Mentally I have the right search texts in my head, but finding back the really relevant tabs can be a pain. That’s where the Chrome extension Search Plus comes in handy which used to be called FullSearch.

To quote a via FullSearch: Search Any Text String Across All Open Tabs In Chrome review :

The extension allows you to search for text in all open tabs at once, and shows a list of search results right in the pop-up. Moreover, clicking any of the results takes you to the particular tab with the highlighted text.

From the Search Plus extension page:

The Search Plus is a Chrome Extension App.

It helps to find the tabs you’re looking for from all opened tabs regardless of window, and you can manage the found tabs easily and quickly.

It works like a charm.
Highly recommended!

–jeroen

via:

Posted in Chrome, Google, Power User | 2 Comments »

Disable e-mail notifications on Google+ | How To – CNET

Posted by jpluimers on 2013/01/10

Disable e-mail notifications on Google+ | How To – CNET.

Posted in G+: GooglePlus, Power User, SocialMedia | Leave a Comment »

Converting Visual Studio 2003 WinForms to Visual Studio 2005/2008/2010/2012 partial classes (via: Duncan Smart’s Weblog)

Posted by jpluimers on 2013/01/10

In the .NET 1.x past, the WinForms designers in Visual Studio .NET and Visual Studio 2003 would put the C# or VB.NET code containing the form code as the InitializeComponent method of the top most class monolithic C# and VB.NET files that also contain the user code (for events and such).

As of Visual Studio 2005 (actually: Whidbey and higher), this code is based on partial classes. For each form (actually designable entity, but lets limit this to WinForms forms) you get a MyForm.cs and MyForm.Designer.cs

As a side note, with a bit of effort, you can generate the Windows Form Designer generated code yourself as this answer shows. This is for instance convenient when you have form definitions in a different technology and want to convert it to WinForms, WPF or another form of designer based .NET code.

I long time ago I wrote a short manual for co-workers on converting the monolithic files (for people interested, it is below).

Since then I found a couple of very interesting links: Read the rest of this entry »

Posted in .NET, .NET 1.x, .NET 2.0, .NET 3.0, C#, C# 1.0, C# 2.0, C# 3.0, C# 4.0, C# 5.0, Development, Software Development, Visual Studio 11, Visual Studio 2002, Visual Studio 2003, Visual Studio 2005, Visual Studio 2008, Visual Studio 2010, Visual Studio and tools, WinForms | 1 Comment »

Dreaming: MacBook Air is an Ultrabook, so with Haswell will it have Touch?

Posted by jpluimers on 2013/01/09

A few recent rumour and news items:

Since a MacBook Air fits the Ultrabook description perfectly, I dreamed that this might lead to a MacBook Air with Haswell and Touch.

And I’m not the only one dreaming that dream (:

What would you favour, MacBook Air with Touch, Retina or both?

–jeroen

Posted in Opinions | Tagged: , , , , , | Leave a Comment »

.NET/C#: what is the meaning of “Comparing two IEnumerables for equality”?

Posted by jpluimers on 2013/01/09

Until I realized that comparing two IEnumerables needed some extra thought, I wondered why Assert.AreEqual would not support them.

jrista pointed me in the right direction answering a question about c# – How does Assert.AreEqual determine equality between two generic IEnumerables?

The correct answer is “it doesn’t”, but that is really dense.

IEnumerables are just that: being generic or normal, they allow you to enumerate things. They can get you an enumerator (generic or not) that has a notion of Current (generic or normal) and such, but no knowledge of the underlying data.

Comparing them needs you to think about the enumeration and the underlying data at the same time. You can get two kinds of comparisons: Read the rest of this entry »

Posted in .NET, .NET 3.5, .NET 4.5, C#, C# 2.0, C# 3.0, C# 4.0, C# 5.0, Development, Software Development | Leave a Comment »

WordPress idea of Responsive (yech) UI Themes

Posted by jpluimers on 2013/01/08

Not sure why unresponsive sites claim to use Responsive UI Themes, but WordPress has a whole new twist on it:

Black bands around your screen...

Black bands on your screen are so last century…

Luckily most other sites have better ides, see this Google Image Search.

–jeroen

via: A Week of Responsive Themes — Blog — WordPress.com.

Posted in Opinions | Leave a Comment »

Delphi Code Monkey: Why Delphi developers should learn Objective-C and XCode

Posted by jpluimers on 2013/01/08

I’ve requested the feed of Delphi Code Monkey by Warren Postma to be added to DelphiFeeds.

In the mean time, read this post, it is awesome: Delphi Code Monkey: Why Delphi developers should learn Objective-C and XCode.

–jeroen

Posted in Delphi, Development, Software Development | Tagged: , , , , | 4 Comments »

Delphi and C# compiler oddities

Posted by jpluimers on 2013/01/08

When developing in multiple languages, it sometimes is funny to see how they differ in compiler oddities.

Below are a few on const examples.

Basically, in C# you cannot go from a char const to a string const, and chars are a special kind of int.

In Delphi you cannot go from a string to a char. Read the rest of this entry »

Posted in .NET, ASCII, C#, C# 1.0, C# 2.0, C# 3.0, C# 4.0, C# 5.0, Delphi, Delphi 2009, Delphi 2010, Delphi XE, Delphi XE2, Development, Encoding, Software Development, Unicode | Leave a Comment »

Amended steps for converting a GPT partitioned USB stick to MBR (via Convert GPT Disk to MBR Disk – Windows 7 Forums)

Posted by jpluimers on 2013/01/07

Experimenting with ESXi5, I accidentally got a GPT formatted USB stick that no XP systems could handle.

I used Convert GPT Disk to MBR Disk – Windows 7 Forums to convert it back to MBR.

I needed to perform these DiskPart steps on a Windows 7 machine, as

  • the disk management UI in Windows 7 wouldn’t list “convert to MBR” (probably it shows this option only on non-removable media)
  • the DiskPart Windows XP doesn’t recognize GPT (should have been obvious to me, but still)

–jeroen

Posted in ESXi5, Power User, VMware, VMware ESXi, Windows, Windows 7, Windows XP | Leave a Comment »

TURKTRUST Incident Raises Renewed Questions About CA System | threatpost

Posted by jpluimers on 2013/01/05

A small quote from the very interesting  TURKTRUST Incident Raises Renewed Questions About CA System | threatpost article:

“Subordinate certificates have long been identified as a point of weakness in the CA system. They are typically granted unconstrained power to issue certificates for any domain name. Thus, a leak of one subordinate certificate is seen as equivalent to a leak of authority equivalent to all CAs combined. Worse, subordinate certificates need not be explicitly trusted by the software that authenticates encrypted SSL connections typically your web browser. They inherit their trust from the explicitly trusted CAs that have been vetted by your browser vendor,” Steve Schultze, associate director of the Center for Information Technology Policy at Princeton University, wrote in an analysis of the TURKTRUST incident.

A CA (Certificate Authority) issues certificates, most of which are used for domain validation by web-browsers, email and applications. This allows you to make sure when you communicate with your bank (through a web browser or banking app on your phone) to verify the server of the bank is in fact the server of your bank. Or your email program really talks to the server of your email provider and not some intermediate that spoofs your mails.

If fraudulent certificates get issued for certain domains (sometimes specific like http://www.google.com, sometimes generic like *.yahoo.com, or *.*.com), then you cannot trust those domains any more, nor your communication with them. So communication with your bank could be intercepted and changed, thereby loosing money.

That’s exactly what happened in 2011 and late 2012:

The heart of the problem is twofold:

  1. if a CA somehow (by mistake, hacking or whatever) issues a rogue certificate, it takes a relatively long time to find out it is rogue. In the mean time, everyone trust the rogue certificate, and a lot of damage can be done.
  2. it takes a relatively long time for people to patch their systems making the window of opportunity even bigger (heck, I regularly see systems that have not been patched for months or years).

While a IETF proposal to log all intermediate and end-entity certificates tries to fix 1., make sure you fix 2. by keeping your systems patched.

–jeroen

via TURKTRUST Incident Raises Renewed Questions About CA System | threatpost.

Posted in Opinions | Tagged: , , , , , , , , , , , , | Leave a Comment »