by: j-marvin |
last post by:
hi-
i am going through the process of password protecting a directory using
..htaccess and .htpasswd
i am experiencing difficulty. so my question is without making life
anymore difficult is...
|
by: Mark Reed |
last post by:
All,
I have spent some time looking for an answer on this and as of yet have
not found one. Is there any way in which the username used to log onto a
network can be retrieved using an Access 2000...
|
by: Mark |
last post by:
In this article http://support.microsoft.com/?id=329290 I will have to
perform this in my installation. The question is since the
aspnet_setreg.exe does not automatically grant the asp.net service...
|
by: John Dalberg |
last post by:
I am getting the message below in the event log. This is a development
machine running Windows 2000 Pro.
I have changed userName from machine to SYSTEM in machine.config. I gave
EVERYONE group...
|
by: jason via DotNetMonster.com |
last post by:
i am planning to add something that can capture the windows username in it
and then i will save it to my database for further refference
but how will the coding look like?
i am new in asp.net...
|
by: Jm |
last post by:
Hi All
Is it possible to determine who is logged onto a machine from inside a
service using code in vb.net ? I have found some code that seems to work
under vb6, but doesnt under .NET ? Any help...
|
by: news.microsoft.com |
last post by:
Hello, I want to create a program that will monitor the usage of a
particular file and record the date, time, and username of the person
who modified the file.
The FileSystemWatcher Class...
|
by: %NAME% |
last post by:
When using embedded SQL for db2 under solaris, you do not need to give
username and password since the system will use your unix-login as
default credential. However, with JDBC seems I always need...
|
by: =?Utf-8?B?QWRhbSBNaWxsaWdhbg==?= |
last post by:
Hello all-
I am using visual studio 2008 .net 3.5 and I am trying to send an e-mail
from a web application using SmtpClient (see below, the numbers have been
changed to protect the innocent)
...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|