|
by: J Peaks |
last post by:
All,
We are soon to be hosting a very important system but are currently having
some problems with setting this up on our Redhat Linux environment. We
are running the following:
Redhat 9 (all updated using up2date)
kernel 2.4.20-20.9
Apache 2 (specifically 2.0.40-21.5, the current default for Redhat 9)
Tomcat 4 (I do not know exactly which version, this has been installed on
|
by: rjames.clarke |
last post by:
I am developing an online application and the last thing I need to get
a handle on is security.
This app is very heavy with forms. Business critical data will be
entered via forms and inserted in to a database (mysql).
I've google "php security" and from what I've read, I should:
1) Filter all form data by stripping all non-alpha/numeric characters
out,
|
by: Bob Altman |
last post by:
Hi all,
Is there any way in an unmanaged C++ project to have the FILEVERSION
property in the version resource automatically get a larger value each time
I rebuild my project?
|
by: walid |
last post by:
Hi all,
I was wondering if anybody knows why Image.save(pathstring) is allowed in
ASP.net without any security permissions . the user can create an image and
save it in the web page directory, but if we try to write a file to hard
disk in asp.net it needs permission. Isn't it less secure to allow images to
be saved?
Any feedback is appreciated
thnx
|
by: Randy Yates |
last post by:
Is opening up port 5432 (R/W both directions) all that is required
of a firewall in order to access a postgres database outside the
firewall?
--
% Randy Yates % "My Shangri-la has gone away, fading like
%% Fuquay-Varina, NC % the Beatles on 'Hey Jude'"
%%% 919-577-9882 %
%%%% <yates@ieee.org> % 'Shangri-La', *A New World Record*, ELO
http://home.earthlink.net/~yatescr
|
|
by: Juan R. |
last post by:
I have updated some basic requirements for a generic mathematical
markup language for scientific requirements at the next link.
http://canonicalscience.blogspot.com/2006/04/scientific-language-canonml-is.html]
Some requirements fit into the XML model and could be considered for
debate for the future mathML specifications. Other requirements do not
fit and will be developed in alternative mathematical approaches to
those from the w3c...
|
by: Jason Tost |
last post by:
Good afternoon,
I was wondering if there is a way you can determine what the security
requirements are of a control. I have an application that throws a
security exception if there is a WebBrowser control on my main form.
The exception simply states "Request Failed". If I remove the
WebBrowser control from the form, it works fine. The application is a
full trust application, and I have set the URL property of the
WebBrowser to...
|
by: snapcount |
last post by:
Hi,
I downloaded PHP 5.1.4 and Apache 2.2.2 and tried to install on Windows
XP.
Apache works ok, but when I try to restart it with PHP enabled, I get
this message:
Syntax error on line 115 of httpd.conf: Cannot load
C:/PHP/php5apache2.dll into server: The specified module could not be
|
by: Workaholic |
last post by:
Hi,
I have a problem that I have now seen on two different servers.
I have a VB.Net application that is installed on the servers. It works
fine on both servers. If I make a change to the application on my
development PC, recompile it and test it on the local development
machine, it still works fine. However, if I then copy the new EXE file
from the development PC to the target servers (and overwrite the
original EXE on the servers),...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|