by: pembed2003 |
last post by:
Hi All,
I am trying to restrict access of PHP script to a single directory
only. How can I do that? I am running Apache 1.3 and PHP 4 in Linux. I
think I need to use the Directory and SetHandler...
|
by: theodp |
last post by:
--> From http://www.techdirt.com/articles/20040406/1349225.shtml
Microsoft Patents Saving The Name Of A Game
Contributed by Mike on Tuesday, April 6th, 2004 @ 01:49PM
from the...
|
by: Jaydeep |
last post by:
Hi,
I want to restrict any user if he types url directly in the browser
without logging to my site. Like for example user should not see any listing
page of my web site by typing url...
|
by: Dave |
last post by:
We have an intranet application that is under Integrated security. So in
theory, anyone who has an Active Directory account in the company can access
my app.
So, to allow only certain users, I...
|
by: c_shah |
last post by:
how to save outlook email attachments using VB.net?
|
by: datta.adsule |
last post by:
How To acess Adam from IIS server service provider...
|
by: paullofthouse |
last post by:
I have an Acess database with a lookup field, the lookup is working correctly on the form, it accesses another table called raw materials for the information.
=DLookUp("","","=")
The Dlookup...
|
by: phpnoob |
last post by:
I have a php script that processes a form and then posts the user
input to a data file on the server in a comma delimited format. For
simplicity call the file "data.csv." The script is working...
|
by: miztaken |
last post by:
Hi there,
My C# application opens a directory and deals with the files inside
it. But at the mean time i can delete the directory from windows.
Is there any way i can restrict the deletion of that...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The...
|