043 – Kyle Baley on ALT.NET after ALT.NET Beers II

One of Twelve Podcasts of Christmas 2008!


Kyle Baley: follow Kyle on Twitter

Earlier this year I was priviledged to be able to record a short podcast with Kyle Baley. I’m not usually so slow at getting content such as this produced and published online. 2008 has been different, I’ve spent a lot of time in London and as such have enjoyed / endured the travel that goes with that. I’ve also endured my first dental work in many years, costly financially and in time too. All things told, everything mounts up and something has to give…finding time has been hard! FWIW, a 15 minute podcast like this one takes roughly an hour to produce.

Kyle is one of the many well-respected CodeBetter.com bloggers. Recorded live outside Italian Graffiti (their web-site does need a face lift, yes?) near Soho, London, just after ALT.NET Beers 2, organised by Sebastien Lambla. There is some traffic noise, please grin and bear it, one has to grab podcasts with superstars as and when they arise, rarely is there a quiet room to hide in!

Photos of the event can be found here.

Kyle Baley and Donald Belcham are working on a book, Brownfield Application Development in .NET, published by Manning. This podcast was recorded in June 2008, the dates given in this podcast were accurate at the time of recording! Please visit the Manning web-site for further release information.

Podcast feed – subscribe here!

This podcast: http://www.craigmurphy.com/podcasts/043-Kyle-Baley.mp3

Resources
Kyle’s blog (and on Twitter)
Kyle and Donald’s book
CodeBetter (and on Twitter)
Joel on Software

StructureMap
StructureMap is a Dependency Injection tool written in C# for .NET development. StructureMap is also a generic “Plugin” mechanism for flexible and extensible .NET applications.

Ninject
Stop writing monolithic applications that make you feel like you have to move mountains to make the simplest of changes. Ninject helps you use the technique of dependency injection to break your applications into loosely-coupled, highly-cohesive components, and then glue them back together in a flexible manner. Dependency Injection: The Manning book can be found here. Follow Nate Kohari, creator of Ninject, on Twitter.

LLBLGen
LLBLGen Pro, the #1 O/R mapper and data-access tier generator for .NET, generates a complete data-access tier and business façade/support tier for you (in C# or VB.NET), using an existing database schema set. In seconds. The generated .NET code is compiler-ready and can, being compiled by the .NET C# or VB.NET compiler, be used immediately by other applications.

Skillsmatter
Skills Matter supports the Agile and Open Source developer community, by organising free events, training courses, conferences and by publishing thousands of podcasts on ideas and technologies that drive innovation.

The Twelve Podcasts of Christmas 2008
01 – Kyle Baley on ALT.NET and Brownfield Development in .NET
02 – Aaron Parker on Microsoft Application Virtualisation
03 – Caroline Bucklow from IT4Communities: charitable software development
04 – Eileen Brown on IT Professionals, TechNet, Women In Technology & Girl Geek Dinners
05 – Stephen Lamb on security, community, Linux and Twitter
06 – Cristiano Betta on Geek Dinners
07 – David Yack and Jonathan Carter on ALT.NET, MVC and Community
08 – Andrew Fryer on SQL Server 2008 and “upgrade”
09 – Viral Tarpara on Collaboration, SharePoint, Open Source (Port 25) and Community
10 – Guy Smith Ferrier on Internationali[s|z]ation, VS2008, .net 3.5, C# language features
11 – Matt Dunstan on event management, “engagement” and life as an Application Platform Manager
12 – Stephen Lamb on his new role in marketing / PR

Technorati Tags: , , , , , , , , , , , ,

The Twelve Podcasts of Christmas!

Ho ho ho!

Starting today, Friday 12th and running up to the 23rd, I will be posting a podcast each day for 12 days!

What to expect: a mix of community chats with speakers and guests at the likes of Heroes Happen Here, VistaSquad event speakers, Microsoft staffers, and ALT.NET evangelists.

If it’s safe for broadcast (after edit), you might hear what happens when you put a handful of Microsoft MVPs around a table and throw in some beer! We have tried this mixing MVPs and beer before, it worked rather well, check out podcast number 15!

Here’s the first one, Kyle Baley on ALT.NET and Brownfield Development in .NET.

The second podcast of Christmas 044 – Aaron Parker on Microsoft Application Virtualisation

The third podcast of Christmas 045 – Caroline Bucklow from IT4Communities: charitable software development

The fourth podcast of Christmas 046 – Eileen Brown on IT Professionals, TechNet, Women In Technology & Girl Geek Dinners

The fifth podcast of Christmas 047 – Stephen Lamb on security, community, Linux and Twitter

The sixth podcast of Christmas 048 – Cristiano Betta on Geek Dinners

The seventh podcast of Christmas 049 – David Yack and Jonathan Carter on ALT.NET, MVC and Community

The eighth podcast of Christmas 050 – Andrew Fryer on SQL Server 2008 and “upgrade”

The ninth podcast of Christmas 051 – Viral Tarpara on Collaboration, SharePoint, Open Source (Port 25) and Community

The tenth podcast of Christmas 052 – Guy Smith Ferrier on Internationali[s|z]ation, VS2008, .net 3.5, C# language features

The eleventh podcast of Christmas 053 – Matt Dunstan on event management, “engagement” and life as an Application Platform Manager

The twelfth podcast of Christmas 054 – Stephen Lamb on his new role in marketing / PR

Technorati Tags: , , ,

Sky+ built-in COPY failed during November, Star Trek DVD mountain!

[As quoted in the Guardian SKY HASSLES: http://www.guardian.co.uk/technology/blog/2008/dec/14/technology-letters-blogs-full]

If you caught my tweets last month, you may have noticed that I noted that my Sky+ box was generating copy protection signals preventing my DVD recorder from recording the episodes of Star Trek from Virgin One and Bravo. Without going into huge amounts of detail, I figured that any time a “What’s on next” caption appeared and occasionally during advert breaks, a Macrovision-like signal was issued causing my DVD recorder to stop recording.

Whatever you may be thinking, I believe that I am entitled to record these episodes for a number of reasons. Firstly, I don’t have time to watch them live – I have a day job, a wife and a kid, time is in short supply. Secondly, the Sky+ hard drive is woefully small at 160GB, of which we get 80GB of personal space, whoopee (yes, I will be doing something about that later). Thirdly, I am simply recording what I would have watched anyway, I’m not recording it to keep per say…I’m happy to buy the DVD boxed set for that. And to be honest, Star Trek is *all* that I watch via Sky, all other programmes I could get via Freeview (if we had a decent signal where I live, moot point).

Courtesy of Liam Westley, today’s copy of the Guardian carried this article by George Cole. Sky could be so good for you…I don’t think so (sorry, couldn’t resist that, Gary!) This explains a lot.

In my humble opinion this is a huge FAIL for Sky. I had even gone to the lengths of buying one of these cables in order to normalise the signal from the Sky+ box to the DVD recorder. Sadly that cable failed miserably, dead on arrival…now I’m embroiled in the returns and refund process, more hassle…all thanks to Sky.

I will of course be testing the COPY feature again this month. However in the meantime, I have some 20+ episodes of Deep Space Nine to catch up on…and I can’t dump them to DVD as I have been doing most nights for the last 8-9 months. Yes, I do have 100+ DVDs chock full of Star Trek to catch up on!

Technorati Tags: , , , , , , , ,

Antivirus 2009 seems to be doing the rounds…

A colleague brought his XP-based laptop into the office today. Through a quirk of fate, Antivirus 2009 had managed to install itself. It’s a pretty swish looking piece of malware that looks very much like leading anti-virus programs, even giving you the feel-good factor that it has found infected files and has cleaned them for you. It is, of course, a confidence trick, smoke and mirrors.

It’s most likely to have come from the same stable as WinAntivirus did, as noted here.

I’m repeating myself, however my advice is simple: if a web page pops up a dialog box telling you that your computer is infected and offers a free clean-up, ignore it. Never install software that offers itself via a web page pop-up, go to a reputable download site (ideally a vendor site) and download from there.

Or, if you are in any doubt, use a search engine to get some more information. Here’s what Google returns for Antivirus 2009 and here’s what Live Search returns. These result should be the first clue that Antivirus 2009 isn’t all it’s cracked up to be.

I still promote the use of these tools for cleaning up: Crap Cleaner, Spybot and HijackThis.

[Update 03/12/2008]
As part of this infection Spybot discovered Win32.TDSS, which includes a rather invasive rootkit. I used ComboFix.exe and Smitfraudfix.exe as discussed over in the Spybot forums.

Technorati Tags: , , , ,

DDD7 – where’s my badge?

A number of DDD7 folks have been asking me “where’s my badge?”

In the past Microsoft Events have sent out the badges. Attendees bring the badge with them on the day, the lovely events staff then “click” the badge to a clip and entry is permitted!

For DDD7 the badges will be issued on the day. Confirmed attendees should receive an e-mail advising them of this process. It’s probably worth bringing your confirmation e-mail with you…but this is just me being totally paranoid!

Hopefully this makes sense.

Technorati Tags: , ,

SharePoint User Group UK (SUGUK) – Edinburgh Meeting, November 27th

Who/What:
Spencer Harbar SharePoint MVP – MythBusters – debunking common SharePoint Farm Misconceptions

Andrew Woodward SharePoint MVP – Test Driven Development – Contrary to popular belief it can be done on SharePoint projects

When:
November 27th

Where:
Edinburgh – The Scottish Parliament building is located in the Holyrood area of central Edinburgh at the foot of the Royal Mile near to the Palace of Holyroodhouse – http://www.scottish.parliament.uk/vli/visitingHolyrood/howToFindUs.htm

Further Information:
http://harbar.net/archive/2008/11/16/SUGUK-Edinburgh-Meeting-November-27th.aspx

Register here:
http://suguk.org/forums/thread/15096.aspx

Technorati Tags: , , ,

Screencast – Word 2007 Content Controls

At the end of October 2008 I delivered an introductory presentation about the Open XML file formats and how we might use them from within C#, i.e. programmatically. Part of that presentation demonstrated the use of Word 2007 content controls and whilst it was the primary demonstration of the evening, it was one that prompted the most discussion. To that end, I have recorded an improved version of that demonstration, you can watch it here!

During this demonstration, I was using Visual Studio 2008 SP1, the Open XML SDK 2 CTP 1 and the Word 2007 Content Control Tookit.

I would recommend viewing this full-screen, double click on the video below to “go full-screen”. Pressing Escape cancels full-screen mode.

I recorded this screencast in one sitting, however during playback I noticed a minor issue with drag’n’drop inside the Word Content Control Toolkit. It wasn’t a show-stopper, however I decided to record the offending piece a second time – you may notice a slight change in background noise during that transition.

If you have any problems viewing the video below, please let me know.

Word 2007 Content Controls – demo from Craig Murphy on Vimeo.

Need the C# source code? Here you go: get the source.

Further Reading:
http://blogs.msdn.com/mikeormond/archive/2006/08/10/694173.aspx
http://msdn.microsoft.com/en-us/library/ms406053.aspx
http://blogs.msdn.com/modonovan/archive/2006/05/23/604704.aspx

Technorati Tags: , ,

[Event] AgileMalta – 5th December 2008

I’m pleased to see AgileMalta running its second conference. I have a soft spot for Malta having essentially lived there on and off for many years. It has probably changed a lot, but I still like to think I know Malta and Gozo almost as well as I know the back of my hand. I can’t think of a better mix, the islands of Malta, Gozo and Comino, their people and an agile development conference…

What: Talks given by people who have had a hands-on experience with Agile with international clients. The Key Note speaker is Joakim Ohlrogge. Local speakers are two local persons who actively participate in Agile projects, Aldo Cauchi Savona and Dave Sammut.
Date: Friday, December 5th 2008
Location: Hilton Hotel, St. Julians
Duration: Half-day conference
Price: T.B.A.

Further details can be found here:
http://www.agilemalta.com/events/agile-conference-december-2008/

Overview:
Success in today’s software industry requires a process, an environment and people that are able to achieve business goals within tighter deadlines, without compromising quality or reducing employee moral. Your process needs to be able to be attractive to foreign investment, your employees need the skills to deliver and sustain the process.

Whether you are interested in Agile or seeing how you can improve your own development process, the AgileMalta Conference is a great opportunity for people at all levels to gather together to learn about and share experiences on Agile software development process.

In our first conference we provided talks and discussion sessions for people at all levels to come into contact and learn about Agile. In the upcoming conference we will build upon feedback from the 1st conference and from our website. We decided to provide you with talks on implementing Agile and dealing with common issues when using such a process.

Join the AgileMalta Facebook group here!

Technorati Tags: , , , , , ,

Passwords alone, are not enough. Even if they were, are they hard to break?

[As quoted in the Guardian: http://www.guardian.co.uk/technology/blog/2008/nov/23/technology-letters-blogs]

Relying on a single password for more than one purpose, e.g. logging on to your web-mail, instant messaging service, Facebook, Bebo, etc. is probably very commonplace.  Indeed, exposés such as Twitterank, and even it’s parody site TwitterAwesomeness, highlight the ease at which folks will essentially surrender their username and passwords.  Twitterank didn’t just catch the unsuspecting Internet user, they also caught a number of people who really should have known better. 

Sites that do need your Twitter username and password, such as BrightKite, use it in order to post tweets on your behalf.  In BrightKite’s case, it tweets each time you “check in” to their “where am I” service.  The check-in process involves you telling BrightKite where you are, it then sends out a Tweet telling the world.  Such sites make their intentions very clear in the Terms Of Use, Code of Conduct and Privacy pages. 

However, so did Twitterank. The site made it clear what it wanted you to believe it was doing with your username and password.  Even if you didn’t read the Twitterank terms of service or FAQ, it was embedded within the source code, as Barry Dorrans carefully points out.  The speed at which the Twitter population flocked to Twitterank suggests that were there any ulterior motives, the site would be well placed to exploit a significant portion of the Twitter accounts that it had opportunity to harvest.

Twitterank was different.  It relied on our instinctual want to graded or rank ourselves amongst our peers.  No matter how hard we try, we’re all competitive by nature.  We want to know where we stand/sit in relation to our peers.  Some services, such as Twitter Grader have managed to achieve this without the need for a Twitter password.  Granted there’s only so much Twitter Grader can do, however it’s a polite service that has introduced me to a number of Twitter users in Scotland – users that I may not have discovered.

There was little indication whether a Twitterank of 100 was good or bad.  Some users reported ranks of over 200, others, as we’ve seen already, received a rank of zero.  The mathematics behind the site were reported via a comment in this blog as being “Real Math(tm)” and were comparable in accuracy to Google’s PageRank mechanism.  I’m not a mathematician so I won’t be debunking any formula, algorithm or approaches.  Well, not just yet at least.  For Twitterank to have been useful, it would need to allow us to determine whether our rank was better or worse than other Twitterankers (there it is again, I do apologise).

Twitterank didn’t really try to hide its intentions, however because of the the site’s ease of use, instant gratification and rapid publicity, its uptake was huge (it trended TweetStats and Twitter Search, and at the time of writing, continues to do so – outdoing “Obama” and “James Bond”).  The publicity was part of what made it so popular – it sent out a Tweet announcing your Twitterank, including a link back to the site thus encouraging users to discover their own ranking.  In most cases, this would probably be fine, however spare a thought for the Twitter folks who received a ranking of zero – and there where many of them!  Indeed, many Twitterankers (can I really get away with saying that?  Too late now!) tweeted their dissatisfaction at their ranking. 

Amusingly, Twitterank’s creator (@ryochiji) reported on his Twitter feed that low rankers should try again tomorrow.  Oh, so that’s how it works – everybody’s Twitterank will improve over time, that’ll work, great system, yes?  Further information may be found on the Twitterank blog, assuming WordPress haven’t deemed it necessary to close it down.

It’s not all about gullible users though
This morning, at the time of writing, a few hours after Twitterank was exposed for the social experiment that it probably is (or was), saw me reading Bruce Schneier‘s Read me first column in the Technology section of The Guardian.  Bruce writes a great piece explaining how passwords don’t need to be broken per say, but that they are inherently easy to guess.

Without spoiling the article too much, assuming that you are going to read it, Bruce highlights our password selection techniques.  One such method, and one that is certainly very familiar to this writer in his corporate environment, is the keyword+appendage approach.  Users often take their child’s name, their dog’s name, etc. and add a numeric digit or two after the name, e.g. frank01 or rover12. 

Today’s processing power means that software can intelligently guess huge combinations of keyword+appendage passwords in a relative short and acceptable period of time.  Gone are the days when passwords would take days or weeks to crack.  If you need more convincing, think about how long it takes the average WiFi hacker to crack your wireless router/modem WEP encryption keys.  Or even your WPA encryption?

Bruce makes the suggestion of using a personal sentence as your password.  Not the sentence itself, but an obfuscated version of the sentence.  His example (yes I’m spoiling the original article, sorry) uses “This little piggy went to market” – it creates an obfuscated password of tlpWENT2m.  Such as password would take a significant amount of time to be guessed using processing power alone.  Just in case you were tempted, Bruce rightfully advises that we don’t use tlpWENT2m ourselves…oddly enough.

Increasing security, some options
With the ease at which Twitterank coaxed visitors into typing in their username and password, it seems the days of the password as a single source of authentication are numbered.  We need to be considering more secure alternatives that involve “levels of authentication”.  Usablity is the key to widespread acceptance, any product in this space must be easy to use; its interface must be fundamental such that selection of a secure-level authentication token requires little more effort than offering a basic-level token. 

With Twitterank-like incidents becoming more common, I predict that during 2009 we will see the general acceptance and widespread uptake of such authentication mechanisms such as OpenID, and CardSpace (further reading here and here).  You should familiarise yourself with these mechanisms because major web-sites such as Yahoo are gradually introducing them as part of their login process.  Indeed, even the likes of Facebook, where you can be whoever you want to be, may have to succumb and implement a more secure user registration and identity verification process.

Beyond authentication into verification
Going beyond authentication, we need to consider verification, particularly of identity.  The internet has little in the way of process that can help us confirm an individual’s authenticity and identity – how do you know that the person your are tweeting with or Facebooking is the person they say they are?  Twitter had the great fake Sarah Silverman incident of October 2008.  Facebook has many impersonation cases, a few of which I discuss in elsewhere on this blog

Firms, such as NetIDme are well placed to take advantage of the needs of the authentication and identity verification marketplace.  Identity verification through NetIDme processes involves a combination of stages, if you’re in the UK or US they boast a 95% “automatic verification” rate. The remaining 5%, or if you are a child, requires some form of personal contact with the NetIDme team – whether it is a fax or a phone call.  However, prior to the personal contact, you are invited to provide such things as your Driving Licence Number, National Insurance number, Social Security Number or Passport number in order for third party checks to take place.  Obviously this is much more involved and potentially more invasive than a simple username/password combination. The fact we are now able to authenticate and verify who we are, including how old we are, is a key step forward in the growth and maturity of the Internet.

And finally…
At the time of writing Twitterank is still up and running, whilst there appears to be no malicious intent on the creator’s part, the whole debacle in the social engineering space has left a bitter taste in the mouths of many people.  I am sure that no ill intent was ever on the cards, however Twitterank has proven that everybody needs to think about their own on-line security and the implications of password surrender. 

Just think what might have happened to your Twitter feed? “Ah,” you say, “but it’s just my Twitter feed, I don’t really care if somebody hacks it and owns it.”  That’s fine, but a lot of users have a single password, and that is where the problem stems from.  Identity theft often starts from the smallest thing.  I have a colleague whose identity was stolen simply because she left her name on the door bell of her previous house. The house had been sold to a gentleman who then let / rented the house.  The new tenants used the knowledge of the previous owner’s name to start off the identity theft process.  It is that simple.

I’ll leave you with advice that is mentioned elsewhere in this blog:

  1. Don’t use the same password for social networking sites and services that are more important to you such as your on-line bank or your web-mail.  If your password is harvested, as Twitterank could have done, you may find yourself compromised in more than one way.
  2. Avoid simple passwords such as “password”, “itsasecret” or “letmein”.  Amazingly, during my university days somebody actually told me their password was “itsasecret”.  Indeed it was…I logged in and was later accused of cracking the said password.  A little trouble ensued but it was soon dropped when I explained that i had actually been given the password in the first place! 
  3. Consider “upping” your levels of security your OpenID – there are plenty of providers.  Yahoo, MyOpenID and NetIDme to name just a few.  Any progress in this direction, is good progress. Of course, you could always demand OpenID!

Safe and happy surfing!

Further reading:

Password security – even big names fail
Twitterank – celeb or peon? @t_rank

Craig Murphy: author, blogger, community evangelist, developer, speaker, runner