Welcome!

Christopher Frenz

Subscribe to Christopher Frenz: eMailAlertsEmail Alerts
Get Christopher Frenz via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Christopher Frenz

If you watch the news regularly, it is easy to notice that in almost any given week some company seems to have experienced an electronic break-in or in some other way experienced a form of computer or network compromise. While computer security professionals can help to mitigate such risks via the proper configuration of firewalls, careful crafting of Access Control Lists, the application of updates, and the judicious application of file permission, among other measures, it's important that one of the most fundamental ways of improving the security of a computer or network resource not be overlooked - that of a really strong password. To this day passwords remain one of the weaker links in the security of electronic resources, and their potential for exploitation needs to be examined more carefully than ever. With the growing trend of cloud computing-based initiativ... (more)

Creating Mobile Controls with the Mobile Internet Toolkit

The Mobile Internet Toolkit comes prepackaged with a variety of controls that address the most common mobile computing tasks. However, specialized tasks can arise that these generic controls are not powerful enough to address, or for which they simply fail to meet the requirements. In these cases it is beneficial to develop a custom control that is suited to fulfilling the required tasks. In this article, I will concentrate on developing and implementing such custom controls within a mobile application. The primary focus will not be on creating custom user controls and/or inheri... (more)

Demystifying Regular Expressions

The ability to perform pattern-matching operations on text is a skill that is highly useful to any programmer. Whether you are creating a routine to validate data entered into a form, performing parsing and mining on data sets, or searching for sequence similarities in the human genome, chances are that the ability to construct a regular expression will be of great value to you. A single regular expression can often be used to create the same pattern-matching functionality that would otherwise require a lengthy subroutine. Yet despite these apparent benefits, many .NET developer... (more)

Error Prevention in VS.NET

With the release of Visual Studio .NET and the structured error-handling capabilities of the .NET Framework came significant improvements in the way that VS programmers are able to capture and deal with programmatic errors. Yet these more robust abilities do not lessen the importance of one of the most time-tested means of error handling: prevention. In this article I will highlight various methods of data validation that can be used to eliminate potentially problematic errors before they have a chance to occur. Data validation checks any inputted data for potential problems pri... (more)

The Open Source Advantage in Secure Application Development

The security benefits and risks of Open Source code is one of the most debated topics in information security today. The views of proponents of the Open Source model are typified by Eric Raymond's argument that Open Source software is intrinsically more secure since its open nature lets a greater number of programmers view the source code and uncover potential security threats before they're released to the wild. Fewer people see closed source software, on the other hand, and so the odds of uncovering a potential security threat before a system cracker finds it is diminished. Op... (more)