Version numbers are important. Semantic Versioning 2.0 is a simple yet well defined method for describing the change of your software.
NServiceBus 4.0 is out and running at major customers. Stop by for a Happy Meal and watch your order flow through the service bus. The new version has better modeling tools, debugging functionality, and can use RabbitMQ and MSSQL Server as transports. There are also online labs to help you get up to speed without needing to set up your own systems.
Nuget is a powerful tool for dependency management, but using it in the enterprise is frequently discussed because it can be problematic.
CloudFlare is a really neat company that provides caching, scaling, and attack tolerance capabilities for internet http sites. They recently blogged on the details of and remediation for the recent vulnerabilities in RC4 encryption.
If you’d like to polish your coding skills, but cannot think of a good, simple program to write, try one of Martyr2’s project ideas. Also take a look at thekarangoel’s github repo where’s he’s started doing ALL of them.
Described variously as one of the most accessible introductions to crypto….and as the instigator of more bad crypto implementations by newly minted cocky ‘experts’, the Handbook of Applied Cryptography stands alone.
It shouldn’t come as a big surprise that Microsoft makes their development tools with a certain customer set in mind…but this presentation on the Psychology of C# is a little bit scary in the way it pigeonholes the stereotypical C# developer. Many good insights here too.
Visual Studio 2013 has a pile of cool new development goodness for Web developers.
People have asked me a couple of times why TFS Source Control is put down so much. Recently I read that it’s an ‘inferior version of Perforce’ (which would make sense, since MS licensed Perforce’s code before making TFS). So, how do I find out what is ‘wrong’ with TFS? How about the Perforce/TFS feature comparison published by Perforce? It should have the dirty low-down on what TFS is missing!
Did you wish you had a professional exploit kit to deploy your malicious code? Styx Exploit Pack can make your personal botnet shine, or get you that extra Microsoft Surface by running a little ransomware. $3000 gets you the exploit kit with multiple drive-by vulnerabilities, malware obfuscation, and access to the vendor’s 24/7 help desk. Want to learn more about the world of exploit kits? Malware don’t need Coffee is the site for you.