by: Jeremy |
last post by:
In my ASP.NET web applications I would like to
use "integrated security=SSPI" instead of supplying a SQL
Server account credentials.
From what I understand there are security policy settings...
|
by: John J. Hughes II |
last post by:
I have "Computer A" which is running Win2K3 and MS SQL server. And
"Computer B" which is running a service that I have created. If I change
the service on "Computer B" to run as a user my program...
|
by: Patrick |
last post by:
I have an ASP.NET application that connects to a SQL Server database.
The SQL Server resides on a seperate development server from the IIS5.1 on
Windows XP SP2 on development PCs which host the...
|
by: Matt Dockerty |
last post by:
Hi,
I'm trying to connect to a network share using a username / password /
domain of my choosing.
I've tried the WindowsIdentity.Impersonate route but can only impersonate
the users on the...
|
by: josef |
last post by:
This seems like a bad idea, but I'm having trouble identifying why.
With an ASP.NET application I am using Windows Integrated
Authentication. The aspnet_wp.exe runs as 'machine' per the...
|
by: J-T |
last post by:
We are using **NTLM** as the authentication type.If I use this in my ASP.NET
application :
<identity impersonate="true" username="MyUser" password="123"/>
<authentication mode="Windows" />
...
|
by: Patrick F |
last post by:
Hi, i have SQL Server 2005 and a database set that is called, myCompany
the problem is that i cant connect from my page to it,
here is from the web.config: ( i have got this connectionstring from...
|
by: avinashibs |
last post by:
using socket :-
how i use the socket for connecting the domain server,
e,g :-
i have an account on gmail
emailid :- xyx@gmail.com
pass:- 1354
how i will check my account is exit on that...
|
by: =?Utf-8?B?QWRyaWFuTW9ycmlz?= |
last post by:
Hello!
I'm trying to copy a file from another computer on the network that I do not
have permission with my current logon details to access.
If I open the folder using the Windows file manager...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|