You may someday need to hack into, edit and repackage a SharePoint WSP file. This article explains how.
We often get email from people we don’t know. Such emails are usually unwanted or unsolicited. But in some cases, you may just need to figure out who the person behind the email address is. This article examines a number of ways to do reverse email search.
This article explains in detail how to use NSIS to create an application setup package for a Windows solution that includes both a Windows service and a Windows forms application. I start from the basics and then proceed to cover very advanced Windows application creation concepts to help you get up to speed on using NSIS.
My previous article on the subject of adding a swap file to an Amazon EC2 instance focused on adding the swap file to the instance storage (also known as ephemeral storage) that comes with certain Amazon EC2 instances. This article discusses how you can still leverage the concept of swap files even on “EBS only” Amazon EC2 instances.
You can be the victim of identity theft from malicious mobile apps in the same way desktop computer viruses steal information. Malware writers have moved on to mobile devices as a way to steal data from unsuspecting iPhone, Android, iPad or other tablets and smartphones users. This article gives you three signs that your mobile device has a virus and what you can do to protect your device.
Orphaned users in SharePoint are users that have been disabled or completely deleted from active directory but are still referenced in list items and sites, and especially in the SharePoint people picker control. This article explains how to remove them using PowerShell.