by: Jonathan Trevor |
last post by:
Hi,
Spent nearly 8 hours googling and trying code on this yesterday without much
success. I'd like to write a .NET application (using .NET primitives, older
Win32 calls, or WMI etc) to work out...
|
by: Next |
last post by:
I have a new domain account to use with my Windows Services.
The account name is WinServ.
I am trying to test my Windows Service on my XP Pro machine.
However the service won't start unless...
|
by: Marina |
last post by:
Hi,
I am trying to find the minimum security settings to allow a windows control
embedded in IE have full trust.
If I give the entire Intranet zone full trust, this works. However, this is...
|
by: Jim Bob |
last post by:
I have a mix environment where most of my user PC are not part of a
domain. They use Term Serv & Citrix to do their work.
I want to push som Group Policy settings to these non domaoin PCs.
I...
|
by: Amongin Ewinyu |
last post by:
Hi,
I'm trying to create a Windows service programmatically that will do the
following:
- When a user logs on, it will automatically run a service that uses BITS
(Background Intelligent...
|
by: Michael |
last post by:
I am running an application that requires "Full Trust" which is declared in
the assembly.
How do I trap for the System.Security.Policy.PolicyException that is raised
by a local machines CAS if...
|
by: Fredo |
last post by:
I know very little about java and javascript, and I'm not really sure if
this is a java or javascript issue.
I'm trying to run an app call jmol in a local browser. jmol is activated by
a...
|
by: Michael Howes |
last post by:
I have some code that manages local user logins.
When I create a new user I want to set the password to expire every x
days and the number of failed login attempts before the account is...
|
by: rrangaprasad |
last post by:
i'm trying to create a 'kiosk' type of workstation, based on a particular login (where the desktop is pretty much locked and the user won't have access to run commands, change taskbar, etc). Now, the...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|