by: Fran Tirimo |
last post by:
I am developing a small website using ASP scripts to format data retrieved
from an Access database. It will run on a Windows 2003 server supporting
FrontPage extensions 2002 hosted by the company...
|
by: |
last post by:
I think that I start to understand this .NET security.
Basically it comes to this:
* You use strong names in the dll and exe, so the application user must
configure this application with key...
|
by: icb |
last post by:
Hi I have a front-end/back-end setup. The front-end utilises all
unbound forms populating the back-end via the code I have written. All
fine so far.
Prior to splitting the database I ran the...
|
by: mar10 |
last post by:
I am creating a database in Access 2002 for a small firm that would
like security on the tables. They want some employees to have write
access only to tables, while others read-only.
I have not...
|
by: TechBoy |
last post by:
I am trying to learn on the fly about Access Security for an app we are
developing. I realize Access security is an advanced subject with many
details. I wanted to share a scenario and ask a...
|
by: TechBoy |
last post by:
I had a useracct called xxx123 I had set up.
Now there is a problem in that **every single** .mdb file I open now on
my PC (regardless of age of the file, location of the file, etc) now
asks for...
|
by: Sam Vanderstraeten |
last post by:
Hi all,
My situation:
- VB.net & Visual Studio 2002
- IIS 6.0 - Windows XP Pro (development) and Windows 2000 server (release)
I created a test-application (before I started to develop the...
|
by: Rocky |
last post by:
My Access 2007 file fails to open on a machine with the 2007 Access
runtime version installed. It comes up with a Security alert message.
Is there a security setting in the Access Database that...
|
by: =?Utf-8?B?ZWQ=?= |
last post by:
I had this exact problem using a vb.net client accessing a Java web service.
The solution takes 3 steps:
1.) Create custom ClientOutputFilter
2.) Create a custom Assertion that uses filter from...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|