- 博客(35)
- 资源 (2)
- 收藏
- 关注
转载 How to Insert Word Image at Specific Location with C#, VB.NET
http://www.dotnetfunda.com/blogs/lacy/2560/how-to-insert-word-image-at-specific-location-with-csharp-vbnet
2014-04-24 10:40:07 2372
转载 Insert OpenXmlElement after word bookmark in Open XML SDK
http://stackoverflow.com/questions/1612511/insert-openxmlelement-after-word-bookmark-in-open-xml-sdk
2014-04-23 12:59:39 2159
转载 OpenXML: How do I?
http://www.codeproject.com/Tips/548908/OpenXML-How-do-IIntroduction OpenXML is the de facto means for working with Office Documents, and it provides a real power-house of functionality. Bu
2014-04-22 10:39:19 1340
转载 使用 Open XML SDK 2.0 从 Word 2010 文档中提取样式
http://msdn.microsoft.com/zh-cn/library/gg615380(v=office.14).aspx虽然可利用 Open XML 文件格式检索 Microsoft Word 文档中的内容快,但执行此操作需要做一些工作。Open XML SDK 2.0 添加了将简化对 Open XML 文件格式的访问的强类型类:SDK 将简化检索任务,例如,检索包含文档样式或
2014-04-22 10:35:49 3517 1
转载 Creation of a Word 2007 document using the Open XML Format SDK
IntroductionOn April 2009, Microsoft published the Open XML Format SDK 2.0 CTP. Open XML is an open ECMA 376 standard, and is also approved as the ISO/IEC 29500 standard that defines a set of XML sc
2014-04-21 17:28:26 1851
转载 使用 Open XML 操作文档模板自动生成报表
http://www.cnblogs.com/kesalin/archive/2012/04/18/open_xml_word.html
2014-04-21 16:59:39 2544
转载 Creating a new Microsoft Word document from a template using OpenXml
http://blogs.msdn.com/b/mcsuksoldev/archive/2010/04/09/creating-a-new-microsoft-word-document-from-a-template-using-openxml.aspxWhen working with Microsoft Word automation there is often the r
2014-04-21 16:07:02 1352
转载 ADO.NET 如何取得 Stored Procedure 的回傳值 (如何获得Stored Procedure 的Last inset id?)
若使用 ADO.NET 連接資料庫並呼叫預儲程序(Stored Procedure)的話,基本上有三種方式可以取得執行後的結果,分別如下:在預儲程序中最後一行直接用 SELECT 語法回傳表格資料在預儲程序中使用輸出參數(Output Parameter)的方式回傳資料在預儲程序中使用 RETURN 語法回傳一個整數型別(Int32)的狀態碼若是呼叫的預儲程序不需要回傳值,基本上可以用
2014-04-16 10:26:09 1360
转载 ASP.NET Error:Adding the specified count to the semaphore would cause it to exceed its maximum count
http://jwcooney.com/2012/08/13/asp-net-error-adding-the-specified-count-to-the-semaphore-would-cause-it-to-exceed-its-maximum-count/
2014-04-14 10:32:13 2456
翻译 MySQL IF Statement
Summary: in this tutorial, you will learn how to use MySQL IF statement to execute a block of SQL code based on conditions.The MySQL IF statement allows you to execute a set of SQL statements base
2014-04-13 21:04:06 1699
翻译 MySQL Stored Procedure Parameters
Summary: in this tutorial, we will show you how to write MySQL stored procedures with parameters. We will also give you a couple of stored procedure examples to help you understand how to use differ
2014-04-13 20:42:04 1908
翻译 MySQL Stored Procedure Variables
Summary: in this tutorial, you will learn about variables in stored procedure, how to declare, and use variables. In addition, you will learn about the scopes of variables.A variable is a named da
2014-04-13 19:09:19 1928
翻译 Getting Started with MySQL Stored Procedures
Summary: in this tutorial, we will show you step by step how to develop the first MySQL stored procedure by using CREATE PROCEDURE statement. In addition, we will show you how to call the stored p
2014-04-13 18:39:28 1759
翻译 Introduction to MySQL Stored Procedures
http://www.mysqltutorial.org/introduction-to-sql-stored-procedures.aspx
2014-04-13 17:44:49 1365
转载 Discover clues in th HTML
Developers are notorious for leaving statements like FIXME's, TODO's, Code Broken, Hack, etc... inside the source code. Review the source code for any comments denoting passwords, backdoors, or some
2014-04-13 13:46:23 1130
翻译 5 XSS Exploits You Should Know About
http://deadlytechnology.com/web-development/xss/
2014-04-12 22:30:45 1619
翻译 JSON INJECTION (OWASP Bangalore- Dec 15 2012)
What is JSON- JavaScript Object Notation?JSON is a is a lightweight, text-based, language-independent data interchange format with parsers available for many languages JSON has been used to
2014-04-11 10:25:40 3592
转载 How to read data from csv file in c#
http://www.morgantechspace.com/2013/08/how-to-read-data-from-csv-file-in-c.html
2014-04-10 16:56:16 1814
转载 Analyzing PDF Malware - Part 3D
http://blog.spiderlabs.com/2012/07/analyzing-pdf-malware-part-3d.htmlThis is part 3D, the final point in the Analyzing PDF Malware constellation. If you haven’t read any of the preceding pos
2014-04-10 11:21:03 1642
转载 Analyzing PDF Malware - Part 3C
Let me explain, no there is too much, let me sum up…This is part 3C in the ongoing saga of the Analyzing PDF Malware series. If you haven’t read any of the preceding posts you can find them all righ
2014-04-10 11:19:27 1127
转载 Analyzing PDF Malware - Part 3B
Down that dusty trail…As the big blue letters above state, this is part 3B of the Analyzing PDF Malware series. If you haven’t read any of the preceding posts you can find them here: Part1, Part2,
2014-04-10 11:17:24 1474
转载 Analyzing PDF Malware - Part 3A
When we last left our heroes…This is the third part of the Analyzing PDF Malware series. If you haven’t read the first and second parts you can find them here and here respectively. We will be bui
2014-04-10 11:15:50 1670
转载 Analyzing PDF Malware - Part 2
Where were we?As the title states, this is the second part of Analyzing PDF Malware. If you haven’t read the first part you can find it here. Go ahead and read it now if you haven’t already, we’ll
2014-04-10 11:11:47 1852
转载 Analyzing PDF Malware - Part 1
BackgroundI’d like to think that security awareness has gotten to the point where the average end user thinks twice before opening an ‘exe’ file sent to them as an email attachment. I like to think
2014-04-10 11:08:33 1116
翻译 DOM Based Cross Site Scripting or XSS of the Third Kind
SummaryWe all know what Cross Site Scripting (XSS) is, right? It’s that vulnerability wherein one sends malicious data (typically HTML stuff with Javascript code in it) that is echoed back later by
2014-04-09 14:45:47 2044
翻译 Reflected DOM Injection
Reflected DOM Injection (RDI) is an evasive XSS technique which uses a third party website to construct and execute an attack. This technique can be implemented on websites that use a user-provide
2014-04-09 11:38:36 1274
翻译 Testing: Review Webserver Metafiles for Information Leakage (OTG-INFO-003)
SummaryThis section describes how to test the robots.txt file for Information Leakage of the web application's directory/folder path(s). Furthermore the list of directories that are to be avoided by
2014-04-08 21:40:43 1790
翻译 Blind XPath Injection
Introducing XPath XPath 1.0 is a well-supported and fairly old query language for selecting nodes in an XML documentand returning a computed value from the selected nodes. There are plenty of li
2014-04-08 11:28:03 2036
翻译 XPATH Injection
DescriptionSimilar to SQL Injection, XPath Injection attacks occur when a web site uses user-supplied information to construct an XPath query for XML data. By sending intentionally malformed infor
2014-04-06 14:16:47 2954
原创 Blind SQL injection sample
WebGoat中的Blind Numeric SQL Injection 和 Blind String SQL Injection 两个例子
2014-04-06 11:07:30 2156
翻译 Login spoofing
http://en.wikipedia.org/wiki/Login_spoofingLogin spoofings are techniques used to steal a user's password. The user is presented with an ordinary looking login prompt for username and password
2014-04-05 10:35:14 934
翻译 Command Injection
DescriptionThe purpose of the command injection attack is to inject and execute commands specified by the attacker in the vulnerable application. In situation like this, the application, which execu
2014-04-04 11:26:52 3583
转载 【WebGoat笔记】之五 --- Injection Flaws
http://www.cnblogs.com/jonniexie/articles/1761819.html
2014-04-03 22:00:44 1247
翻译 Testing for Bypassing Authorization Schema (OWASP-AZ-002)
https://www.owasp.org/index.php/Testing_for_Bypassing_Authorization_Schema_(OWASP-AZ-002)Brief SummaryThis kind of test focuses on verifying how the authorization schema has been implemented f
2014-04-01 09:39:11 1938
驱动开发资料
2012-07-06
PE文件格式详解
2012-07-06
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人