Detecting Attackers using Honeypots on the UniFi Dream MachineLike most teams, we have been working from home a lot more over the last year, and looking at ways to protect our work devices whilst away…Apr 25, 2021Apr 25, 2021
C# String vs string — more than just style?A common question when working with C# is whether to use String or string. C# supports both versions as the language provides keywords…Apr 13, 20212Apr 13, 20212
C# Target Platforms | x64 vs x86 vs AnyCPUDifferent architectures can cause unexpected behavior. This article looks at how .NET handles x64 vs x86 platforms and applications.Aug 22, 20202Aug 22, 20202
Keeping secrets while developing C# ApplicationsThousands of passwords and API keys are accidently uploaded to GitHub every day, putting users and businesses at risk. Managing sensitive…Jul 13, 2020Jul 13, 2020
TCP Message CoalescingIt is a common misconception that because TCP guarantees packet order your messages will be delivered individually, this is not always the…Jul 9, 2020Jul 9, 2020
Hello .NET 5 | Do we need a new .NET?The next evolution of .NET is just around the corner. We’re going to look at how it is set to unify the .NET platform after nearly 20…Jul 3, 2020Jul 3, 2020
C# Implicit Types: Dynamic, Var and ObjectC# provides several different ways to represent variable types. This article explores the differences between var, dynamic and object and…Jun 21, 20203Jun 21, 20203
Dynamically Invoking C# MethodsUsing reflection to find and invoke methods at runtime is simple in C#. This article provides a basic example to get going and some common…Jun 14, 2020Jun 14, 2020