IRM – Information Rights Management

Configure IRM to use an on-premises AD RMS server https://technet.microsoft.com/en-us/library/dn151477(v=exchg.150).aspx

Configure IRM to use Azure Rights Management https://technet.microsoft.com/en-us/library/dn151475(v=exchg.150).aspx Plan Information Rights Management in Office 2013 https://technet.microsoft.com/en-us/library/cc179103.aspx

 

Cybercrime, Dark web, Deep web

Dark web “The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[2][3] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes […]

PGP and GPG

Difference Between PGP and GPG http://askubuntu.com/questions/186805/difference-between-pgp-and-gpg

Difference Between PGP and GPG http://www.differencebetween.net/technology/software-technology/difference-between-pgp-and-gpg/

openpgp, pgp, and gpg: what is the difference? http://blog.goanywheremft.com/2013/07/18/openpgp-pgp-gpg-difference/

Azure Service Bus Relay

How to Use the Service Bus Relay Service http://www.windowsazure.com/en-us/documentation/articles/service-bus-dotnet-how-to-use-relay/

My Hello Azure Service Bus WCF Service–Step by step guide http://blogs.technet.com/b/meamcs/archive/2011/12/23/my-hello-azure-service-bus-wcf-service-step-by-step-guide.aspx

Fun with the Service Bus Relay (Part 1) http://blogs.msdn.com/b/jimoneil/archive/2012/04/24/fun-with-the-service-bus-part-1.aspx

How to Use the Service Bus Relay Service http://azure.microsoft.com/en-us/documentation/articles/service-bus-dotnet-how-to-use-relay

 

Tunnelling Software

BarbaTunnel: Project Description

A layer that hide, redirect. forward, re-encrypt internet packet to keep VPN, Proxies and other p2p software hidden from Firewall. Free implementation for HTTP-Tunnel, UDP-Tunnel, port forwarding, port redirecting and packet re-encryption that can work in network data-link layer and transport layer. ref: http://barbatunnel.codeplex.com

 

[…]

How to create an Open ID Provider server?

How to create your own Open ID provider server? http://lildude.co.uk/howto-setup-your-own-openid-provider

How to Set Up OpenID on Your Own Domain http://smarterware.org/6286/how-to-set-up-openid-on-your-own-domain

Cryptography in .NET Framework 4

Application of Cryptography in .NET Framework 4 http://www.pisa.org.hk/event/dotnet_crypto.pdf — Hashing : MD5, SHA1, SHA256, SHA384, SHA512 Symmetric : DES, RC2, Rijndael, TripleDES Asymmetric : DSA, RSA reference: MSDN page: “System.Security.Cryptography Namespace” http://msdn.microsoft.com/en-us/library/9eat8fht.aspx

What ASP.NET Programmers Should Know About Application Domains and Application Pools

What ASP.NET Programmers Should Know About Application Domainshttp://www.odetocode.com/articles/305.aspx

Application vs. AppDomainhttp://weblogs.asp.net/owscott/archive/2007/09/02/application-vs-appdomain.aspx

What is the diff. b/w Application Domain & Application Pool in .NET?http://in.answers.yahoo.com/question/index?qid=20071223011529AARcKYI

Thoughts on ApplicationPool recycling and application availabilityhttp://blogs.msdn.com/david.wang/archive/2006/01/26/Thoughts-on-Application-Pool-Recycling-and-Application-Availability.aspx

HOWTO: Basics of II6 troubleshootinghttp://blogs.msdn.com/david.wang/archive/2005/12/31/HOWTO_Basics_of_IIS6_Troubleshooting.aspx

Troubleshooting processhttp://weblogs.asp.net/steveschofield/archive/2006/07/08/Troubleshooting-process.aspx#comments

Rico Mariani’s Performance Tidbits – When to call GC.Collect()http://blogs.msdn.com/ricom/archive/2004/11/29/271829.aspx

[…]

Filmon, Regmon, and Security Issues are explained

Mark Russinovich’s technical blog covering topics such as Windows troubleshooting, technologies and security.

Buffer Overflows in Regmon Traces

Buffer Overflows in Filemon

You receive an “HTTP Error 401.1 – Unauthorized: Access is denied due to invalid credentials” error message when you try to access a Web site that is part of an IIS 6.0 application […]

Scent of Code Access Security

“Configuring .NET Code Access Security”http://www.15seconds.com/issue/040121.htm

“How do you change the trust level for an ASP.NET application?”http://www.velocityreviews.com/forums/t118529-how-do-you-change-the-trust-level-for-an-apsnet-application.html