473,769 Members | 3,232 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Credentials not passed on when using ASP.NET

Hi there,

I am having trouble getting an ASP.NET web application to connect to another
computer and passing the proper credentials and I hope someone can help me.

I have a stand-alone Windows 2003 Server, ServerA, running as a Web Server
that uses ASP.NET. The default.aspx file tries to access a file in a share
on another computer, ServerB. ServerA and ServerB are on the same domain and
are both running Windows 2003 Server.

The Domain Controller is running Windows 2000 Server. I want to use
Integrated Windows Authentication to access the file. When I connect to the
Web site and then check the event viewer on ServerB, I can see that ServerA
is using the Anonymous Logon to connect to ServerB instead of passing
through my windows credentials. On ServerA, I have done the following:

In IIS, set the authentication to Integrated Windows Authentication and
deselected Allow Anonymous logon

Did the following according to
http://support.microsoft.com/default...b;en-us;871179

In my application pool, I set the Identity to a domain user,
MyDomain\SvcAcc t

Added the user, MyDomain\SvcAcc t to the IIS_WPG group

As the domain administrator, I ran Setspn on ServerA . When this didn't
work, I repeated it on the Primary Domain Controller of the domain and that
didn't work either. How I ran the command is listed below:

Setspn -A HTTP/<netbios nameMyDomain\Sv cAcct

Then I followed the instructions at
http://technet2.microsoft.com/Window....mspx?mfr=true
and on the Primary Domain Controller of the domain I also went into Active
Directory Services Users and Groups and selected the "Trust this computer
for delegation" option for ServerA and I also followed the instructions at
http://technet2.microsoft.com/Window....mspx?mfr=true
and I selected the "Account is trusted for delegation" option for the
MyDomain\SvcAcc t user.

Following http://support.microsoft.com/kb/215383/, on ServerA, I ran the
following:

Cscript adsutil.vbs set w3svc/1/NTAuthenticatio nProviders "Negotiate,NTLM "

I signed in to my client computer as MyDomain\UserA

In IE 6.0, on the client computer, as instructed in
http://support.microsoft.com/kb/810572/, I selected the "Enable Integrated
Windows Authentication (requires restart)" option on the Advanced tab and
then cleared my cache and close my IE 6.0 session and started another.

In my web.config file for the website, I added the following line after the
</authorizationcl osing tag:

<identity impersonate="tr ue" />

When I connect to the Website on ServerA from the client computer, I am not
prompted for credentials and that is what I would expect. When I turn on
auditing, I can also see that UserA is accessing the default.aspx file for
the Website and that is also what I would expect. However, the event viewer
on ServerB shows that the Anonymous Logon is what is being used to connect
to it.

When I run the Auth Diagnostics 1.0 tool from Microsoft that is refered to
in http://support.microsoft.com/default...b;en-us;871179 on my
Website on ServerA, I see the message, "Service Principal name (SPN) for
user 'MyDomain\SvcAc ct' not found in Active Directory"

Anything I see on the Internet says to run Setspn for this problem but we
have done this. Am I doing something wrong when I do this? Is there another
reason why the credentials are not being passed on?

When I try this with a straight html file, I am able to access the file.

What am I doing wrong when setting up my spn?

Thanks,

Jennifer
Jul 12 '06 #1
3 2621
With your environment (Win2K AD), you'll need a pure Kerberos authentication
path to get delegation to work as S4U will not be an option. As such, the
keys to getting this to work are:

- Ensure that the browser client is authenticating with IIS using Kerberos,
not NTLM
- Ensure that the web server can access the file share using Kerberos auth,
not NTLM

If those two things happen and your IIS app pool identity is trusted for
delegation (and impersonation is enabled in ASP.NET), then this will work.

I'd start by concentrating on getting Kerberos auth between the browser and
IIS. You can tell if this is working by enabling logon event auditing in
local security policy and checking the security event log to see how the
user was authenticated.

If you are getting NTLM instead of Kerberos, you need to make sure that the
SPN on the app pool identity account is correct and *has not been duplicated
in AD anywhere* and you need to make sure that IIS is configured for
Negotiate authentication and not just NTLM. There is a metabase property
that controls this. You can see what types are requested from the server by
the values in the WWW-authenticate header that the server sends back with
its 401.1 response.

This probably goes without saying, by the server name in the URL used to
access the site must match the SPN.

The same process applies for the file share. Make sure the computer account
on the second machine has a valid CIFS SPN (although HOST should work was
well) that matches the name used to access the file share. Check the event
logs to see what type of authentication is being negotiated.

Troubleshooting Kerberos delegation can be painful, but my experience is
that it really does work the way the documentation says it does.
Unfortunately, the documentation is fairly complex and there are quite a few
variables.

Joe K.

--
Joe Kaplan-MS MVP Directory Services Programming
Co-author of "The .NET Developer's Guide to Directory Services Programming"
http://www.directoryprogramming.net
--
"Jay-nospam" <ja*******@beyo nd2020.comwrote in message
news:Ce******** *************** *******@magma.c a...
Hi there,

I am having trouble getting an ASP.NET web application to connect to
another
computer and passing the proper credentials and I hope someone can help
me.

I have a stand-alone Windows 2003 Server, ServerA, running as a Web Server
that uses ASP.NET. The default.aspx file tries to access a file in a share
on another computer, ServerB. ServerA and ServerB are on the same domain
and
are both running Windows 2003 Server.

The Domain Controller is running Windows 2000 Server. I want to use
Integrated Windows Authentication to access the file. When I connect to
the
Web site and then check the event viewer on ServerB, I can see that
ServerA
is using the Anonymous Logon to connect to ServerB instead of passing
through my windows credentials. On ServerA, I have done the following:

In IIS, set the authentication to Integrated Windows Authentication and
deselected Allow Anonymous logon

Did the following according to
http://support.microsoft.com/default...b;en-us;871179

In my application pool, I set the Identity to a domain user,
MyDomain\SvcAcc t

Added the user, MyDomain\SvcAcc t to the IIS_WPG group

As the domain administrator, I ran Setspn on ServerA . When this didn't
work, I repeated it on the Primary Domain Controller of the domain and
that
didn't work either. How I ran the command is listed below:

Setspn -A HTTP/<netbios nameMyDomain\Sv cAcct

Then I followed the instructions at
http://technet2.microsoft.com/Window....mspx?mfr=true
and on the Primary Domain Controller of the domain I also went into Active
Directory Services Users and Groups and selected the "Trust this computer
for delegation" option for ServerA and I also followed the instructions at
http://technet2.microsoft.com/Window....mspx?mfr=true
and I selected the "Account is trusted for delegation" option for the
MyDomain\SvcAcc t user.

Following http://support.microsoft.com/kb/215383/, on ServerA, I ran the
following:

Cscript adsutil.vbs set w3svc/1/NTAuthenticatio nProviders "Negotiate,NTLM "

I signed in to my client computer as MyDomain\UserA

In IE 6.0, on the client computer, as instructed in
http://support.microsoft.com/kb/810572/, I selected the "Enable Integrated
Windows Authentication (requires restart)" option on the Advanced tab and
then cleared my cache and close my IE 6.0 session and started another.

In my web.config file for the website, I added the following line after
the
</authorizationcl osing tag:

<identity impersonate="tr ue" />

When I connect to the Website on ServerA from the client computer, I am
not
prompted for credentials and that is what I would expect. When I turn on
auditing, I can also see that UserA is accessing the default.aspx file for
the Website and that is also what I would expect. However, the event
viewer
on ServerB shows that the Anonymous Logon is what is being used to connect
to it.

When I run the Auth Diagnostics 1.0 tool from Microsoft that is refered to
in http://support.microsoft.com/default...b;en-us;871179 on my
Website on ServerA, I see the message, "Service Principal name (SPN) for
user 'MyDomain\SvcAc ct' not found in Active Directory"

Anything I see on the Internet says to run Setspn for this problem but we
have done this. Am I doing something wrong when I do this? Is there
another
reason why the credentials are not being passed on?

When I try this with a straight html file, I am able to access the file.

What am I doing wrong when setting up my spn?

Thanks,

Jennifer

Jul 12 '06 #2
Thanks for the information. My server name didn't match my SPN. When I fixed
that, it worked fine.

Do you know why I am still getting an error message from the Auth
Diagnostics tool on the 1st server (my WebServer)? The message is:
"Service Principal name (SPN) for user 'MyDomain\SvcAc ct' not found in
Active Directory"
This message gives me the impression that I haven't set up the SPN properly
on the Web Server but it seems to work now and I don't know what I have done
incorrectly. Any suggestions?

Thanks,

Jennifer

"Joe Kaplan (MVP - ADSI)" <jo************ *@removethis.ac centure.comwrot e
in message news:eb******** ******@TK2MSFTN GP04.phx.gbl...
With your environment (Win2K AD), you'll need a pure Kerberos
authentication path to get delegation to work as S4U will not be an
option. As such, the keys to getting this to work are:

- Ensure that the browser client is authenticating with IIS using
Kerberos, not NTLM
- Ensure that the web server can access the file share using Kerberos
auth, not NTLM

If those two things happen and your IIS app pool identity is trusted for
delegation (and impersonation is enabled in ASP.NET), then this will work.

I'd start by concentrating on getting Kerberos auth between the browser
and IIS. You can tell if this is working by enabling logon event auditing
in local security policy and checking the security event log to see how
the user was authenticated.

If you are getting NTLM instead of Kerberos, you need to make sure that
the SPN on the app pool identity account is correct and *has not been
duplicated in AD anywhere* and you need to make sure that IIS is
configured for Negotiate authentication and not just NTLM. There is a
metabase property that controls this. You can see what types are
requested from the server by the values in the WWW-authenticate header
that the server sends back with its 401.1 response.

This probably goes without saying, by the server name in the URL used to
access the site must match the SPN.

The same process applies for the file share. Make sure the computer
account on the second machine has a valid CIFS SPN (although HOST should
work was well) that matches the name used to access the file share. Check
the event logs to see what type of authentication is being negotiated.

Troubleshooting Kerberos delegation can be painful, but my experience is
that it really does work the way the documentation says it does.
Unfortunately, the documentation is fairly complex and there are quite a
few variables.

Joe K.

--
Joe Kaplan-MS MVP Directory Services Programming
Co-author of "The .NET Developer's Guide to Directory Services
Programming"
http://www.directoryprogramming.net
--
"Jay-nospam" <ja*******@beyo nd2020.comwrote in message
news:Ce******** *************** *******@magma.c a...
>Hi there,

I am having trouble getting an ASP.NET web application to connect to
another
computer and passing the proper credentials and I hope someone can help
me.

I have a stand-alone Windows 2003 Server, ServerA, running as a Web
Server
that uses ASP.NET. The default.aspx file tries to access a file in a
share
on another computer, ServerB. ServerA and ServerB are on the same domain
and
are both running Windows 2003 Server.

The Domain Controller is running Windows 2000 Server. I want to use
Integrated Windows Authentication to access the file. When I connect to
the
Web site and then check the event viewer on ServerB, I can see that
ServerA
is using the Anonymous Logon to connect to ServerB instead of passing
through my windows credentials. On ServerA, I have done the following:

In IIS, set the authentication to Integrated Windows Authentication and
deselected Allow Anonymous logon

Did the following according to
http://support.microsoft.com/default...b;en-us;871179

In my application pool, I set the Identity to a domain user,
MyDomain\SvcAc ct

Added the user, MyDomain\SvcAcc t to the IIS_WPG group

As the domain administrator, I ran Setspn on ServerA . When this didn't
work, I repeated it on the Primary Domain Controller of the domain and
that
didn't work either. How I ran the command is listed below:

Setspn -A HTTP/<netbios nameMyDomain\Sv cAcct

Then I followed the instructions at
http://technet2.microsoft.com/Window....mspx?mfr=true
and on the Primary Domain Controller of the domain I also went into
Active
Directory Services Users and Groups and selected the "Trust this computer
for delegation" option for ServerA and I also followed the instructions
at
http://technet2.microsoft.com/Window....mspx?mfr=true
and I selected the "Account is trusted for delegation" option for the
MyDomain\SvcAc ct user.

Following http://support.microsoft.com/kb/215383/, on ServerA, I ran the
following:

Cscript adsutil.vbs set w3svc/1/NTAuthenticatio nProviders
"Negotiate,NTL M"

I signed in to my client computer as MyDomain\UserA

In IE 6.0, on the client computer, as instructed in
http://support.microsoft.com/kb/810572/, I selected the "Enable
Integrated
Windows Authentication (requires restart)" option on the Advanced tab and
then cleared my cache and close my IE 6.0 session and started another.

In my web.config file for the website, I added the following line after
the
</authorizationcl osing tag:

<identity impersonate="tr ue" />

When I connect to the Website on ServerA from the client computer, I am
not
prompted for credentials and that is what I would expect. When I turn on
auditing, I can also see that UserA is accessing the default.aspx file
for
the Website and that is also what I would expect. However, the event
viewer
on ServerB shows that the Anonymous Logon is what is being used to
connect
to it.

When I run the Auth Diagnostics 1.0 tool from Microsoft that is refered
to
in http://support.microsoft.com/default...b;en-us;871179 on my
Website on ServerA, I see the message, "Service Principal name (SPN) for
user 'MyDomain\SvcAc ct' not found in Active Directory"

Anything I see on the Internet says to run Setspn for this problem but we
have done this. Am I doing something wrong when I do this? Is there
another
reason why the credentials are not being passed on?

When I try this with a straight html file, I am able to access the file.

What am I doing wrong when setting up my spn?

Thanks,

Jennifer


Jul 12 '06 #3
I'd use an LDAP query tool to check the SPN (ldp.exe, adfind, etc.). Either
query the forest by servicePrincipa lName=HTTP/xxxx or query the forest by
the user (sAMAccountName =xxxx) and look at the servicePrincipa lName
attribute. I have no idea what the auth diagnostics tool is doing, so I
don't know if that info is misleading or not.

If the security event log on the IIS box says you are getting Kerberos auth,
you are getting Kerberos auth.

Joe K.

--
Joe Kaplan-MS MVP Directory Services Programming
Co-author of "The .NET Developer's Guide to Directory Services Programming"
http://www.directoryprogramming.net
--
"Jay-nospam" <ja*******@beyo nd2020.comwrote in message
news:wr******** *************** *******@magma.c a...
Thanks for the information. My server name didn't match my SPN. When I
fixed that, it worked fine.

Do you know why I am still getting an error message from the Auth
Diagnostics tool on the 1st server (my WebServer)? The message is:
"Service Principal name (SPN) for user 'MyDomain\SvcAc ct' not found in
Active Directory"
This message gives me the impression that I haven't set up the SPN
properly on the Web Server but it seems to work now and I don't know what
I have done incorrectly. Any suggestions?

Thanks,

Jennifer

"Joe Kaplan (MVP - ADSI)" <jo************ *@removethis.ac centure.comwrot e
in message news:eb******** ******@TK2MSFTN GP04.phx.gbl...
>With your environment (Win2K AD), you'll need a pure Kerberos
authenticati on path to get delegation to work as S4U will not be an
option. As such, the keys to getting this to work are:

- Ensure that the browser client is authenticating with IIS using
Kerberos, not NTLM
- Ensure that the web server can access the file share using Kerberos
auth, not NTLM

If those two things happen and your IIS app pool identity is trusted for
delegation (and impersonation is enabled in ASP.NET), then this will
work.

I'd start by concentrating on getting Kerberos auth between the browser
and IIS. You can tell if this is working by enabling logon event
auditing in local security policy and checking the security event log to
see how the user was authenticated.

If you are getting NTLM instead of Kerberos, you need to make sure that
the SPN on the app pool identity account is correct and *has not been
duplicated in AD anywhere* and you need to make sure that IIS is
configured for Negotiate authentication and not just NTLM. There is a
metabase property that controls this. You can see what types are
requested from the server by the values in the WWW-authenticate header
that the server sends back with its 401.1 response.

This probably goes without saying, by the server name in the URL used to
access the site must match the SPN.

The same process applies for the file share. Make sure the computer
account on the second machine has a valid CIFS SPN (although HOST should
work was well) that matches the name used to access the file share.
Check the event logs to see what type of authentication is being
negotiated.

Troubleshootin g Kerberos delegation can be painful, but my experience is
that it really does work the way the documentation says it does.
Unfortunatel y, the documentation is fairly complex and there are quite a
few variables.

Joe K.

--
Joe Kaplan-MS MVP Directory Services Programming
Co-author of "The .NET Developer's Guide to Directory Services
Programming"
http://www.directoryprogramming.net
--
"Jay-nospam" <ja*******@beyo nd2020.comwrote in message
news:Ce******* *************** ********@magma. ca...
>>Hi there,

I am having trouble getting an ASP.NET web application to connect to
another
computer and passing the proper credentials and I hope someone can help
me.

I have a stand-alone Windows 2003 Server, ServerA, running as a Web
Server
that uses ASP.NET. The default.aspx file tries to access a file in a
share
on another computer, ServerB. ServerA and ServerB are on the same domain
and
are both running Windows 2003 Server.

The Domain Controller is running Windows 2000 Server. I want to use
Integrated Windows Authentication to access the file. When I connect to
the
Web site and then check the event viewer on ServerB, I can see that
ServerA
is using the Anonymous Logon to connect to ServerB instead of passing
through my windows credentials. On ServerA, I have done the following:

In IIS, set the authentication to Integrated Windows Authentication and
deselected Allow Anonymous logon

Did the following according to
http://support.microsoft.com/default...b;en-us;871179

In my application pool, I set the Identity to a domain user,
MyDomain\SvcA cct

Added the user, MyDomain\SvcAcc t to the IIS_WPG group

As the domain administrator, I ran Setspn on ServerA . When this didn't
work, I repeated it on the Primary Domain Controller of the domain and
that
didn't work either. How I ran the command is listed below:

Setspn -A HTTP/<netbios nameMyDomain\Sv cAcct

Then I followed the instructions at
http://technet2.microsoft.com/Window....mspx?mfr=true
and on the Primary Domain Controller of the domain I also went into
Active
Directory Services Users and Groups and selected the "Trust this
computer
for delegation" option for ServerA and I also followed the instructions
at
http://technet2.microsoft.com/Window....mspx?mfr=true
and I selected the "Account is trusted for delegation" option for the
MyDomain\SvcA cct user.

Following http://support.microsoft.com/kb/215383/, on ServerA, I ran the
following:

Cscript adsutil.vbs set w3svc/1/NTAuthenticatio nProviders
"Negotiate,NT LM"

I signed in to my client computer as MyDomain\UserA

In IE 6.0, on the client computer, as instructed in
http://support.microsoft.com/kb/810572/, I selected the "Enable
Integrated
Windows Authentication (requires restart)" option on the Advanced tab
and
then cleared my cache and close my IE 6.0 session and started another.

In my web.config file for the website, I added the following line after
the
</authorizationcl osing tag:

<identity impersonate="tr ue" />

When I connect to the Website on ServerA from the client computer, I am
not
prompted for credentials and that is what I would expect. When I turn on
auditing, I can also see that UserA is accessing the default.aspx file
for
the Website and that is also what I would expect. However, the event
viewer
on ServerB shows that the Anonymous Logon is what is being used to
connect
to it.

When I run the Auth Diagnostics 1.0 tool from Microsoft that is refered
to
in http://support.microsoft.com/default...b;en-us;871179 on my
Website on ServerA, I see the message, "Service Principal name (SPN) for
user 'MyDomain\SvcAc ct' not found in Active Directory"

Anything I see on the Internet says to run Setspn for this problem but
we
have done this. Am I doing something wrong when I do this? Is there
another
reason why the credentials are not being passed on?

When I try this with a straight html file, I am able to access the file.

What am I doing wrong when setting up my spn?

Thanks,

Jennifer



Jul 12 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
2204
by: Grind Boy | last post by:
Hi, I'm writing this off the top of my head as I don't have the exact information to hand. We are attempting to set up a secure internet site using ASP.NET on IIS5. We are having some authentication problems early on in the project. The plan is to have 1 ASP.NET (IIS) forms application serving user requests and another ASP.NET (IIS) webservice interfacing to the database.
1
5259
by: jadher | last post by:
I try to access an asp page in a machine that has windows integrated authentication turned on. I use System.Net.Networkcredentials as well as System.Net.Webrequest and Webresponse. I receive a response but when I try to use Response.Redirect(), a popup windows appears asking me for user, password, domain. Is there a way to pass the credentials to the Reponse.Redirect function so I
3
8416
by: cmueller | last post by:
Hey all - I'm in a bit of a bind concerning web services and integrated authentication. I'll give you a little background as to what I'm trying to do ... I have a client application that calls a web service. The web service uses integrated windows authentication (with identity impersonation = true in Web.Config) with anonymous authentication turned off in IIS. Calling the web service works as expected - users that can get to it
3
13710
by: Wild Wind | last post by:
Hello, I have an application which calls a web service across the Internet from a client machine. The site that I have deployed the application to is such that to browse the Internet using a web browser, a person needs to do the following: (a) ensure that a proxy server address is specified;
0
1546
by: Jim_H | last post by:
I am trying to set the Credentials property of my web service proxy and I cannot seem to get anything to work. I am calling a remote asmx page from an aspx and they each reside on different web servers. My application keeps throwing a 401 Access Denied error. Most web sites say to set the proxy.Credentials property to “CredentialCache.DefaultCredentials” which works fine when I run the aspx page from my local IIS on my development...
3
10926
by: Dmitry | last post by:
I am trying to figure out how to pass set of credentials to System.IO Challenge is: App is running under one set of credentials, but via GUI user have a chance to enter another set. I would like to be able to use supplied credentials with System.IO versus using default credentials that app is running under. So far I am forced to use WMI which is less convenient and slower then System.IO, but it's providing me with "Connection Options"
2
5979
by: mbrand | last post by:
When trying to connect to my web service from a client application, the System.Net.CredentialCache.DefaultCredentials doesn't authenticate properly. I can see in the event viewer on the server (windows server 2003) that my domain/username are getting passed properly but it gives a 529 error. If I hard code in my credentials using: Service.Credentials = new System.Net.NetworkCredential("Username", "Password", "Domain") it authenticates...
3
6768
by: antonyliu2002 | last post by:
I have a website (call it WinAuthWeb) that uses Integrated Windows Authentication. In my ASP.NET web application, I collect user name, password and domain info and pass them to WinAuthWeb for authentication (formerly known as NTLM). I construct the user credentials like this: theUserCredential = New NetworkCredential(username, userpassword,
0
1166
by: Fresno Bob | last post by:
This is a little off topic but I am finding security in a non domain environment totally mystifying Can anyone help me. I work in a workgroup environment as opposed to domain controlled. The minute I do anything with reporting services or analysis services that is between machines I get problems. Can anyone give me an overview of how credentials are passed in a non domain environment.
0
9590
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10223
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10051
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10000
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
5310
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5448
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3968
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3571
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2815
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.