Paul talks with Tim Parnell, creator of several Xojo add-ons and active Xojo forum contributor.
To listen to this podcast, download the mp3 now.
Comments closedBlog about the Xojo programming language and IDE
Paul talks with Tim Parnell, creator of several Xojo add-ons and active Xojo forum contributor.
To listen to this podcast, download the mp3 now.
Comments closedMaybe you’ve heard the term SQL injection and how it can allow unintended database access. Here’s how a SQL Injection works and what you can do to avoid it.
1 CommentA couple years ago I wrote a post about Going Rogue with Xojo. It proved to be rather popular and I got some great stories back from how people were able to use Xojo in their organizations.
Comments closedHow do you format and organize your code? I’m here to tell you that your way is wrong and my way is right 🙂
Comments closedIn the blog post Smartphone Encryption is a Red Herring, I pointed out the folly of requiring an encryption back door for the Good Guys to use. So the question arises- “What can be done? If we don’t want a global encryption back door that can be used by anyone, can we still track the Bad Guys?”
The answer is yes. There are plenty of options that don’t require a global back door. I’m not passing judgment on whether these are inherently good or bad options, just that they are available when there is a reason to track a Bad Guy.
Comments closed