Thursday, July 29, 2010
Thursday, July 22, 2010
User Impersonation
Example: http://www.codeproject.com/KB/system/UserImpersonation.aspx
How to pass security token between processes: http://social.msdn.microsoft.com/Forums/en-SG/windowssecurity/thread/9bd4bce0-033a-431b-abb8-2c10438e6283
Thursday, July 8, 2010
Wednesday, July 7, 2010
Reading const
From: http://stackoverflow.com/questions/487048/difference-between-const-declarations-in-c
I always keep in mind this easy rule:
const
always applies on the thing at the immediate left of it, if this thing doesn't exists, it applies to the thing on the immediate right.