<rss version="2.0" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
    <channel>
        <title>Dynamisys</title> 
        <link>https://www.dynamisys.co.uk</link> 
        <description>RSS feeds for Dynamisys</description> 
        <ttl>60</ttl> <item>
    <comments>https://www.dynamisys.co.uk/Articles-Downloads/Articles/ID/106/Allow-access-to-IIS-Express-over-the-network#Comments</comments> 
    <slash:comments>0</slash:comments> 
    <wfw:commentRss>https://www.dynamisys.co.uk/DesktopModules/DnnForge%20-%20NewsArticles/RssComments.aspx?TabID=723&amp;ModuleID=1621&amp;ArticleID=106</wfw:commentRss> 
    <trackback:ping>https://www.dynamisys.co.uk:443/DesktopModules/DnnForge%20-%20NewsArticles/Tracking/Trackback.aspx?ArticleID=106&amp;PortalID=22&amp;TabID=723</trackback:ping> 
    <title>Allow access to IIS Express over the network</title> 
    <link>https://www.dynamisys.co.uk/Articles-Downloads/Articles/ID/106/Allow-access-to-IIS-Express-over-the-network</link> 
    <description>I can never remember how to do this.

(I used&amp;nbsp;VS2017)&amp;nbsp;Go&amp;nbsp;into the .vs directory and edit applicationhost.config.

Find the binding for the site you are interested in and change localhost to *.&amp;nbsp; So from&amp;nbsp;bindingInformation=&amp;quot;*:58904:localhost&amp;quot; to&amp;nbsp;bindingInformation=&amp;quot;*:58904:*&amp;quot;

That&amp;#39;s it done!&amp;nbsp; Of&amp;nbsp;course you need to open suitable&amp;nbsp;holes in any firewalls, but that is it for IIS Express&amp;nbsp;

Same ideas mentioned&amp;nbsp;here&amp;nbsp;https://johan.driessen.se/posts/accessing-an-iis-express-site-from-a-remote-computer&amp;nbsp;- his article seems to spell out the machine&amp;#39;s IP address every time.&amp;nbsp; That seems not to be required for the binding (use&amp;nbsp;the *).&amp;nbsp; Not sure about the other places.&amp;nbsp; I didn&amp;#39;t need anything to allow access to the URL and I just turned off the firewall temporarily through sheer laziness.
</description> 
    <dc:creator>RichardHowells</dc:creator> 
    <pubDate>Thu, 17 Jan 2019 16:37:00 GMT</pubDate> 
    <guid isPermaLink="false">f1397696-738c-4295-afcd-943feb885714:106</guid> 
    
</item>
<item>
    <comments>https://www.dynamisys.co.uk/Articles-Downloads/Articles/ID/91/Speed-up-for-Visual-Studio-Slow-Builds#Comments</comments> 
    <slash:comments>0</slash:comments> 
    <wfw:commentRss>https://www.dynamisys.co.uk/DesktopModules/DnnForge%20-%20NewsArticles/RssComments.aspx?TabID=723&amp;ModuleID=1621&amp;ArticleID=91</wfw:commentRss> 
    <trackback:ping>https://www.dynamisys.co.uk:443/DesktopModules/DnnForge%20-%20NewsArticles/Tracking/Trackback.aspx?ArticleID=91&amp;PortalID=22&amp;TabID=723</trackback:ping> 
    <title>Speed up for Visual Studio Slow Builds</title> 
    <link>https://www.dynamisys.co.uk/Articles-Downloads/Articles/ID/91/Speed-up-for-Visual-Studio-Slow-Builds</link> 
    <description>The Windows Defender Antimalware executable slowed things a lot

I ran task manager. As VS starts; Antimalware uses more CPU than VS. About 20x as much.

Further research found Visual Studio&amp;#39;s &amp;#39;slave&amp;#39; processes, used to execute a build, also trigger Antimalware activity.&amp;nbsp; I configured Antimalware to not scan VS and it&amp;#39;s slave processes.

For those who prefer not to type them all into the ui; start a PowerShell prompt (I used elevated - not certain if that is required); and paste this in:

Set-MpPreference -ExclusionProcess devenv.exe, TE.ProcessHost.Managed.exe, csc.exe, iisexpress.exe, msbuild.exe, vshost32-clr2.exe, vshost-clr2.exe, vshost32.exe, VBCSCompiler.exe, w3wp.exe

Use completely at your own risk. Further information here Set-MpPreference.
&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;
I saw it reduce a small project build from 0m38s (no exclusions) to 0m06s (exclusions listed above).

If you prefer using the Windows GUI; Go to Update &amp;amp; Security -&amp;gt; Settings -&amp;gt; Windows Defender. Open Defender and in the Settings selection, choose Exclusions, add the process names individually.
</description> 
    <dc:creator>RichardHowells</dc:creator> 
    <pubDate>Sat, 14 Jan 2017 13:22:00 GMT</pubDate> 
    <guid isPermaLink="false">f1397696-738c-4295-afcd-943feb885714:91</guid> 
    
</item>

    </channel>
</rss>