As mentioned previously, assembler directives are instructions to the assembler, and are not translated into machine instructions.
The use of directives gives the programmer some control over the operation of the assembler, increasing flexibility in the way programs are written. The following is a list of the common pseudo-ops. Continue reading “Assembly Language : Directives”
For years now, internet banner advertising has captured the World Wide Web for it has become a large help in saving an amount of money while reaching beyond territories. Banner advertising played a major part in market trafficking all over the internet and many individuals and companies have bought themselves these cheap internet banner advertising. Some made use of it financially; others have no idea on what to do with it. Continue reading “How to Make Use of Cheap Internet Banner Advertising”
Best things in life are free, as many would say. This especially holds true with efforts in advertising one’s products or services. With free Internet marketing services, one can save a lot. Instead of shelling out for the marketing aspect of your product or services, that chunk of money could be put to other important elements of your business since many information websites now offer knowledge regarding Internet marketing services that comes with no price tag at all. Continue reading “Free Internet Marketing Methods that will Save your Internet Business”
People opt for internet advertising methods because practically half of the world’s population knows HTML. If you have your own business, you have to decide on what internet advertising method works for you. Ask yourself what are you going to avail of: the expensive internet advertising methods or the cheap ones? Others will pipe in “expensive!” immediately, but they don’t know cheap internet advertising method attracts great benefits as well. Continue reading “All About Internet Advertising Methods”
Microsoft Azure offers many services and resource offerings. For example, you can use the Azure Virtual Machines compute services to build a network of virtual servers to host an application, database, or custom solution, which would be an IaaS based offering.
Continue reading “Uses for Microsoft Azure”
OWIN middleware to apply limits to an OWIN pipeline:
- Max bandwidth
- Max concurrent requests
- Connection timeout
- Max query string
- Max request content length
- Max url length
- Min response delay
Continue reading “Limit the simultaneous requests served by the ASP.NET Web API”
There are a number of laws regarding hacking a computer you don’t have authorization to hack, the CFAA in the USA, the CMA in Great Britain, the CHM in Australia, and the list goes on. All of which make it illegal to do what you want to do, and in some cases have pretty strict penalties for even the smallest of actions.
The term most often used to describe what you’re talking about is Hacking Back. It’s part of the Offensive Countermeasures movement that’s gaining traction lately. Some really smart people are putting their heart and soul into figuring out how we, as an industry, should be doing this. There are lots of things you can do, but unless you’re a nation-state, or have orders and a contract from a nation-state your options are severely limited.
There’s always an “Abuse” email address on the whois of a netblock for reporting misuse of an IP address.
You can use http://whois.domaintools.com/ to do a whois lookup to get the address.
If you are using WordPress, use Wordfence! They are really good!
Continue reading “How can I report a person attempting to hack me?”