Dont Put any ordinary Password to your any internet account
If you see your password below, STOP!
Do not finish reading this post and immediately go change your password -- before you forget. You will probably make changes in several places since passwords tend to be reused for multiple accounts.
Here are two lists, the first compiled by SplashData:
1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passwOrd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football
Last year, Imperva looked at 32 million passwords stolen from RockYou, a hacked website, and released its own Top 10 "worst" list:
1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123
If you've gotten this far and don't see any of your passwords, that's good news. But, note that complex passwords combining letters and numbers, such as passw0rd (with the "o" replaced by a zero) are starting to get onto the 2011 list. abc123 is a mixed password that showed up on both lists.
Last year, Imperva provided a list of password best practices, created by NASA to help its users protect their rocket science, they include:
It should contain at least eight characters
It should contain a mix of four different types of characters - upper case letters, lower case letters, numbers, and special characters such as !@#$%^&*,;" If there is only one letter or special character, it should not be either the first or last character in the password.
It should not be a name, a slang word, or any word in the dictionary. It should not include any part of your name or your e-mail address.
Following that advice, of course, means you'll create a password that will be impossible, unless you try a trick credited to security guru Bruce Schneir: Turn a sentence into a password.
For example, "Now I lay me down to sleep" might become nilmDOWN2s, a 10-character password that won't be found in any dictionary.
Can't remember that password? Schneir says it's OK to write it down and put it in your wallet, or better yet keep a hint in your wallet. Just don't also include a list of the sites and services that password works with. Try to use a different password on every service, but if you can't do that, at least develop a set of passwords that you use at different sites.
Someday, we will use authentication schemes, perhaps biometrics, that don't require so much jumping through hoops to protect our data. But, in the meantime, passwords are all most of us have, so they ought to be strong enough to do the job.
Interview question of asp.net
1. | Difference between thread and process? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Thread - is used to execute more than one program at a time. process - executes single program | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2. | Explain Namespace. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Namespaces are logical groupings of names used within a program. There may be multiple namespaces in a single application code, grouped based on the identifiers’ use. The name of any given identifier must appear only once in its namespace. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3. | List the types of Authentication supported by ASP.NET. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Windows (default) Forms Passport None (Security disabled) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4. | What is CLR? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Common Language Runtime (CLR) is a run-time environment that manages the execution of .NET code and provides services like memory management, debugging, security, etc. The CLR is also known as Virtual Execution System (VES). | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5. | What is CLI? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The CLI is a set of specifications for a runtime environment, including a common type system, base class library, and a machine-independent intermediate code known as the Common Intermediate Language (CIL). | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6. | List the various stages of Page-Load lifecycle. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
o Init() o Load() o PreRender() o Unload() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7. | Explain Assembly and Manifest. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
An assembly is a collection of one or more files and one of them (DLL or EXE) contains a special metadata called Assembly Manifest. The manifest is stored as binary data and contains details like versioning requirements for the assembly, the author, security permissions, and list of files forming the assembly. An assembly is created whenever a DLL is built. The manifest can be viewed programmatically by making use of classes from the System.Reflection namespace. The tool Intermediate Language Disassembler (ILDASM) can be used for this purpose. It can be launched from the command prompt or via Start> Run. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8. | What is Shadow Copy? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
In order to replace a COM component on a live web server, it was necessary to stop the entire website, copy the new files and then restart the website. This is not feasible for the web servers that need to be always running. .NET components are different. They can be overwritten at any time using a mechanism called Shadow Copy. It prevents the Portable Executable (PE) files like DLLs and EXEs from being locked. Whenever new versions of the PEs are released, they are automatically detected by the CLR and the changed components will be automatically loaded. They will be used to process all new requests not currently executing, while the older version still runs the currently executing requests. By bleeding out the older version, the update is completed. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9. | What is DLL Hell? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
DLL hell is the problem that occurs when an installation of a newer application might break or hinder other applications as newer DLLs are copied into the system and the older applications do not support or are not compatible with them. .NET overcomes this problem by supporting multiple versions of an assembly at any given time. This is also called side-by-side component versioning. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10. | Explain Web Services. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Web services are programmable business logic components that provide access to functionality through the Internet. Standard protocols like HTTP can be used to access them. Web services are based on the Simple Object Access Protocol (SOAP), which is an application of XML. Web services are given the .asmx extension. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11. | Explain Windows Forms. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Windows Forms is employed for developing Windows GUI applications. It is a class library that gives developers access to Windows Common Controls with rich functionality. It is a common GUI library for all the languages supported by the .NET Framework. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12. | What is Postback? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
When an action occurs (like button click), the page containing all the controls within the <FORM... > tag performs an HTTP POST, while having itself as the target URL. This is called Postback. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
13. | Explain the differences between server-side and client-side code? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Server side scripting means that all the script will be executed by the server and interpreted as needed. Client side scripting means that the script will be executed immediately in the browser such as form field validation, clock, email validation, etc. Client side scripting is usually done in VBScript or JavaScript. Since the code is included in the HTML page, anyone can see the code by viewing the page source. It also poses as a possible security hazard for the client computer. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
14. | Enumerate the types of Directives. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
@ Page directive @ Import directive @ Implements directive @ Register directive @ Assembly directive @ OutputCache directive @ Reference directive
|
Disable Right Click of Mouse on Your web Page Using Java Script
<html>
<head>
<script language="JavaScript">
function disable()
{
if (event.button == 2)
{
alert("Sorry no rightclick on this page.\nNow you can not view my source\nand you can not steal my images")
}
}
</script>
</head>
<body onmousedown="disable()">
<p>Right-click on this page to trigger the event.</p>
<p>The event property is not recognized in Netscape.</p>
<p>Note that this is no guarantee that nobody can view the page source, or steal the images.</p>
</body>
</html>
Web Layout in photoshop
Its my another web layout made in Photoshop. in this layout i got 3d look.its was amazing exprience
Reference
http://www.1stwebdesigner.com/
Reference
http://www.1stwebdesigner.com/