by: Andrzej |
last post by:
Hi,
I have to figure out why we have a problem with special characters in
encrypted usernames and passwords.
Case:
Username: r&bgeorge
Password: tigger
|
by: user |
last post by:
Hello
Is there any other class for generating random numbers (beside Random) ?
Thanx
Michal
|
by: Ebert |
last post by:
hi I am just trying out some example in the help, however, it is stranged
that I can't imports system.security.cryptography.Xml namespace, I only have
cryptography.X509 and the rest but not .XML,...
|
by: MartyNg |
last post by:
I am running a system that has both Classic ASP applications and a
smattering of ASP.NET applications. We want to store passwords on a SQL
Server table as their MD5 hashes.
What is the safest...
|
by: segue |
last post by:
I have VS 2005, .NET 2.0, no girlfriend and this article:
http://msdn2.microsoft.com/en-us/library/ms278836.aspx.
Yet, I can't successfully import this namespace.
...
|
by: muthu |
last post by:
Hi,
I have two web applications running on my machine.The
application is developed using asp.net 1.1 and vb.net.When i try to run
both the applications in the same browsers, i get the following...
|
by: lavu |
last post by:
I am trying to provide some security to text files, by adding a
signature
at the end of each text file.
this signature needs to be generated by some kind of
hashing algorithm. so while sending...
|
by: =?Utf-8?B?ZGF2aWQ=?= |
last post by:
Hi, everybody here.
I am implementing data encryption/decryption, and try to use
System.Security.Cryptography.TripleDESCryptoServiceProvider.
But I can not find it in MS Visual Studio when I...
|
by: Eric Simmons |
last post by:
Hello,
I am trying to run a .NET 2.0 application that I developed and I am
getting the following error:
Key not valid for use in specified state
I am attempting to retrieve the...
|
by: Amelyan |
last post by:
Why does this happen? How to fix it?
Once in a while I get error in ~/ScriptResource.axd?d=...
System.Reflection.TargetInvocationException: Exception has been thrown by
the target of an...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|