Click here to Skip to main content
916 members (52 online)
post an article ask a question Search our articles

Set your site filter

 Latest Articles

Featured article
13-Sep-13 9:23am by Michael Haephrati (new) 
Michael Haephrati brings a new angle to some questions about today's Internet
30-Mar-15 15:30pm by ProgramFOX (new) 
This blog describes how to use Batch files to add to your PATH if you have two executables with the same name you'd like to access without having to type the full path.
6-May-14 17:32pm by ledtech3 (new) 
Or, Why is the event log maxing out the log with useless user information. Anyone that has the Catalyst Control Center may have noticed the Ace Event Log. Mine seems to stay full of errors and if you clear the … Continue reading →
4-Mar-14 9:54am by Marco Bertschi (new) 
Short and easy description on how you get your own, private Git server running on your Raspberry Pi
10-Dec-13 13:36pm by ledtech3 (updated) 
Rootkits have become the most devious method of hiding malware on a system. They are being employed to every sector from the home user to government to private industry.The monetary and information losses along with infrastructure disruption will continue to … Continue reading →
4-Oct-13 15:40pm by Michael Haephrati (new) 
An example of a small and easy to implement monitoring application
4-Oct-13 15:39pm by Michael Haephrati (new) 
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it
13-Sep-13 14:26pm by Michael Haephrati (updated) 
Michael Haephrati explains how keyboard capturing should be done
13-Sep-13 14:02pm by Alex Marbus (updated) 
Ethernet connections
13-Sep-13 12:33pm by Michael Haephrati (new) 
Michael Haephrati describes the Shopping List and how it is used
13-Sep-13 9:24am by Michael Haephrati (new) 
Michael Haephrati describes how a hardware copy protection dongle was developed.

 Our Community

2Code Project Down - The Lounge
2They found this site. - The Lounge
4Workspaces - The Lounge
8I've got five seconds - The Lounge
4All other forums are broken. - The Lounge
9Ads on this site - The Lounge

Showcase Product Showcase

by Paramesh Gunasekaran
Implementing Reverse Proxy Server in C# .NET v2.0 through HTTP Handler...
by Suvendu Banik
How to Restore SQL Server 2005 Suspect Database
by srivatsan24
This article will tell how to use Microsoft Enterprise Library...
by Pavan K Kulkarni
This article looks at all the options available and trades-off each of...
by rob tillaart
A line printer daemon in C#

News Latest News

Discussions Latest Discussions

by Roger Wright
At work we have a local network with 15 or so PCs and a couple of network printers connected to a 24 port switch, thence connected to the outside world via a SonicWall firewall. Since the SonicWall includes several VPN licenses, and I often travel, I thought it would be a snap to construct a...
by ledtech3
I'm thinking about a project for a set of remote temp sensors for where my dog sleeps in the garrage under my workbench.The outside temps here can range from near -10 to +115 give or take.My electronic project skills are kind of limited but would like to see how I may do this.It...
by Michael Haephrati
What are the advantages of binary search trees over hash tables?
by Michael Haephrati
I would like to add a function to a static library which will get the full path of this library. Is that possible. There are ways to do that when it comes to a DLL, but I couldn't find out a solution for finding the path of a static library at runtime.
by Michael Haephrati
Many of my customers often ask me which environment is better for web sites and web applications: PHP with MYSQL, or ASP.NET with MS SQL. Which environment is better?

Top articles Latest Best Picks

by Michael Haephrati  5.00/5 (2 votes)
An example of a small and easy to implement monitoring application
by Michael Haephrati  5.00/5 (2 votes)
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it

Advertise | Privacy | Mobile
RA-Web1 | 2.8.150624.2 | Last Updated 2 Jul 2015
Copyright © RootAdmin, 1999-2015
All Rights Reserved. Terms of Service
Layout: fixed | fluid