The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,854 other subscribers

Archive for 2018

Nick Craver on Twitter: “GDPR Erasure is fun, because you are required to disassociate the fact it happened as well, or at least disassociate it from the person. So when a regulator audits you, how can you prove you did it? Yeah let’s just ignore those pesky details.”

Posted by jpluimers on 2018/05/10

GDPR is vague, so you bump into things like [WayBackNick Craver on Twitter: “GDPR Erasure is fun, because you are required to disassociate the fact it happened as well, or at least disassociate it from the person. So when a regulator audits you, how can you prove you did it? Yeah let’s just ignore those pesky details.”

This seems to be a viable solution: [WayBackAdam Surak on Twitter: “We’re removing everything and keeping hash of login/email… “

–jeroen

Read the rest of this entry »

Posted in Development, Software Development | Leave a Comment »

fremag/MemoScope.Net: Dump and analyze .Net applications memory ( a gui for WinDbg and ClrMd )

Posted by jpluimers on 2018/05/10

It’s a great too, so I need to invest more time into using MemoScope.Net – Dump and analyze .Net applications memory ( a gui for WinDbg and ClrMd )

Way too manny features to describe here, so get that at the GitHub repository below.

  • Heap statistics
  • Query instances
  • Instance content and references
  • Compare dumps
  • Threads and stacks
  • Deadlocks
  • Delegates
  • Dump process memory

Source: [Archive.is/WayBackfremag/MemoScope.Net: Dump and analyze .Net applications memory ( a gui for WinDbg and ClrMd )

Via Matthijs ter Woord.

–jeroen

Read the rest of this entry »

Posted in .NET, Development, Software Development | Leave a Comment »

Multi-threading in C#: Back to Basics (Part 1 of N) – CodeProject

Posted by jpluimers on 2018/05/10

Hopefully by now the ToC has gotten bigger at [WayBackMulti-threading in C#: Back to Basics (Part 1 of N) – CodeProject.

At the time of writing it was this:

–jeroen

Posted in .NET, Development, Software Development | Leave a Comment »

Procedural Programming: It’s Back? It Never Went Away – Kevlin Henney [ACCU 2018] – YouTube

Posted by jpluimers on 2018/05/09

If you haven’t been in the software development arena for the last 50 years, then watch this and learn all “modern” stuff has been around for ages:

Most if it comes from the era of Algol, make, AWK and the famous Structured Programming book (which is not about procedures, but about control flow).

So watch Procedural Programming: It’s Back? It Never Went Away – Kevlin Henney [ACCU 2018] – YouTube

Slide deck: Sideshare: Procedural Programming: It’s Back? It Never Went Away – Kevlin Henney [ACCU 2018]

Then read [WayBack] ISBN 9780122005503 – Structured Programming (A.P.I.C. studies in data processing, no. 8)

Via: [WayBack] Kevlin Henney – Google+

–jeroen

Read the rest of this entry »

Posted in Agile, Conference Topics, Conferences, Development, Event, Paradigms, Software Development | Leave a Comment »

When a site creates way too many cookies, you get a “Bad Request – Request Too Long”

Posted by jpluimers on 2018/05/09

I a while ago, I had this error:

Bad Request – Request Too Long


HTTP Error 400. The size of the request headers is too long.

It happened because over time, Microsoft had managed to store 100+ cookies data locally, making the request some 8k in size. Which they could not handle.

Bad Request - Request Too Long HTTP Error 400. The size of the request headers is too long.

Bad Request – Request Too Long HTTP Error 400. The size of the request headers is too long.

Posted in Power User | Leave a Comment »

Some links on how Windows detects if a program “is not responding”

Posted by jpluimers on 2018/05/09

For my research list:

–jeroen

Posted in Development, Software Development, The Old New Thing, Windows Development | Leave a Comment »

I’m looking for 12V G4 LED bulbs with a 30mm maximum length (including pins),…

Posted by jpluimers on 2018/05/08

I’m still looking for 12V G4 LED bulbs with a 30mm maximum length (including pins), preferably:

  • dimmable
  • more than 1W power
  • wide angle
  • no flickering

I found near angle ones at https://www.calex.nl/product/LEDG4-1-5W-3000/ (see picture below).

The G+ link has a suggestion, but I’m looking for more options so I can compare.

Via: [WayBackI’m looking for 12V G4 LED bulbs with a 30mm maximum length (including pins),… – Jeroen Wiert Pluimers – Google+

PS: That G+ thread revealed

http://www.supersunled.com/product/1-watt-g4-led-bulb/. This bulb is dimmable, height is 30mm, 360 degree beam angle, 110-130lm.

[WayBack] Omni-directional G4 LED Bulb – 12V 1W G4 Light Bulb

–jeroen

Read the rest of this entry »

Posted in LifeHacker, Power User | 4 Comments »

How to create a folder that inherits its parent’s ACL, and then overrides part of it – The Old New Thing

Posted by jpluimers on 2018/05/08

create the directory without an explicit security descriptor and let the experts create it with the default security descriptor, which takes into account all the inheritance rules. And then modify the security descriptor post-creation to include the new ACE you want. Fortunately, MSDN has sample code for how to add an ACE to an existing security descriptor.

via: [WayBackHow to create a folder that inherits its parent’s ACL, and then overrides part of it – The Old New Thing

–jeroen

Posted in Development, Software Development, The Old New Thing, Windows Development | Leave a Comment »

Containers, totally not a lightweight VM, and also not a hype.

Posted by jpluimers on 2018/05/08

If you start doing stuff with containers, be sure to read the below parts of a series “Containers, totally not a lightweight VM, and also not a hype.” by Kristian Köhntopp, Senior Scalability Engineer at Booking.com.

Be sure to read all the links below, including the comment threads as there is a wealth of information in them.

I’ve tried to summarise parts further below, but there is so much information in the links that you really should long read all the links.

Further reading, all by or via Kristian:

Some highlights of the parts

Read the rest of this entry »

Posted in Cloud Development, Development, Software Development | Leave a Comment »

Windows Firewall: Block rules take precedence over Allow rules

Posted by jpluimers on 2018/05/07

Reminder to self for Windows Firewall: Block rules take precedence over Allow rules (see * below as actually it is even more complex); [WayBackFirewall Rule Properties Page: General Tab has

Firewall rules are evaluated in the following order:

  1. Allow if secure with Override block rules selected in the Customize Allow if Secure Settings dialog box.
  2. Block the connection.
  3. Allow the connection.
  4. Default profile behavior (allow or block as specified on the applicable Profile tab of the Windows Firewall with Advanced Security Properties dialog box).

Within each category, rules are evaluated from the most specific to the least specific. A rule that specifies four criteria is selected over a rule that specifies only three criteria.

Which means that this will block TCP port 1024 traffic to bar.exe:

The Block rules are inserted by Windows if you click “Cancel” on a dialog like this (note the lowercase path, despite the application being at C:\Program Files (x86)\Foo\Bar.exe):

Read the rest of this entry »

Posted in Firewall, Infrastructure, Power User, Windows | 1 Comment »