|
by: Mike Wasilewski |
last post by:
I created a (real estate) site which has an area that is used by the agent
to post and edit property listings. They have the ability here to upload
pictures.
If the listing is new, it is assigned an ID, info posted to database and a
directory created using the ID to hold the uploaded pics.
The problem I have is that when they add a listing and the directory gets
created, it is uid/gid apache/apache, and this should work fine for web...
|
by: Shelly |
last post by:
I have a new server and I have my files up there. The files are in
/var/www/html/. In this directory I have another directory that I created
called "users". I am unable to figure out how to set permissions on this
directory, and what those permissions should be. I am using ShieldHost.
When there is a new user, and he enters his desired name and password, as
part of the process I want to create a small directory tree under "users"...
|
by: Fran Tirimo |
last post by:
I am developing a small website using ASP scripts to format data retrieved
from an Access database. It will run on a Windows 2003 server supporting
FrontPage extensions 2002 hosted by the company 1&1 with only limited server
configuration via a web based control panel.
My query relates to the ASP security model and how it relates to FrontPage
options for setting file access on a database file. If you know of any
online documentation...
|
by: Fran Tirimo |
last post by:
I am developing a small website using ASP scripts to format data retrieved
from an Access database. It will run on a Windows 2003 server supporting
FrontPage extensions 2002 hosted by the company 1&1 with only limited server
configuration via a web based control panel.
My query relates to the ASP security model and how it relates to FrontPage
options for setting file access on a database file. If you know of any
online documentation...
|
by: jamie.fraser |
last post by:
We are trying to create a system where our users will navigate to a web
page, and this web page will reference a Windows User Control which is
then downloaded and run on the users machine.
The User Control is referenced on the web page in the following way
<OBJECT id="RegistryReaderCtrl"
classid="http://localhost/CustomerRegistration/UserCtrlRegistry.dll#UserCtrlRegistry.RegistryReader"
VIEWASTEXT></OBJECT>
|
|
by: middletree |
last post by:
I have two separate questions that are closely related enough that I am
going to package them here.
1. On an Intranet app which tracks tickets for the Tech Support department,
I have the word "Files" hyperlinked like this: <a href=\\servername\files\
target="_blank"> and it points to a server on the network where files
relating to tickets are located.
I'd like to be able to point that link directly to the folder, which has the
same...
|
by: Mark MacRae |
last post by:
I've been trying to implement an online payment component into a web
application. Instructions are to put the DLL into the web application's bin
folder and everything is supposed to work.
Well I had been running into some problems with a weird exception being
thrown. I checked on the permissions of the bin folder (using IIS's control
panel), and found that they were set to "None". This seemed really wrong to
me, so I set it to...
|
by: Dave Kolb |
last post by:
If I make ASPNET a member of the admins group it can launch my COM+ object
but I do not want to do that.
What permissions do I need to set for the lowly ASPNET user so that it can
launch a COM+ object. I tried playing with COM+ roles in the MMC but not
with any luck. My COM+ object itself does not do any role checking.
Thanks,
Dave
|
by: paquer |
last post by:
Database Users need to have Read/Write etc... permissions to the
folder where the Database resides in order to create the lock file.
I have read only users.
I have set up the Shortcut that links to the 'Workgroup Info File'
with permissions for said database.
Within this 'WIF' File I have "Read Only" user's who are only provided
access to the DB only so they can view the data.
Now if I give them full permissions to the folder where...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|