by: Kevin Otte |
last post by:
Hi everyone,
I'm pretty new to using the COM functionality in PHP.
I want to administer my PC using PHP together with ADSI.
My first problem is to enumerate the groups in my domain.
I tried...
|
by: Miguel Orrego |
last post by:
Hi,
I have found some code that authenticates users agains a domain using ADSI.
I then redirect to another page and pass the username they have entered as a
string. However, it would be nice to...
|
by: Ryan Ritten |
last post by:
I was wondering if anyone knew how (or if it's even possible) to cache
the results of an ADSI call in asp for a longer period of time.
Basically what I am doing is I have a website that loads the...
|
by: Enigma Webmaster |
last post by:
Hi All,
We've written a couple of functions which, when run in VB6 work fine and
allow AD users to be updated. When we include the code into an ASP Page and
try and update a users information...
|
by: Arran Pearce |
last post by:
Hi,
I am looking for a way to use System.DirectoryServices to find all users on
a domain whos accounts are either locked out or disabled. I have used
ADSIEdit and the mmc schema add-in to try...
|
by: hykim |
last post by:
Hello, everyone.
according to MSDN, there is any constructor of
System.DirectoryServices.SearchResultCollection Class.
if I implement DirectorySearcher.FindAll() method by myself, then how can I...
|
by: Roy Osherove |
last post by:
Hi folks.
I have an ASP.Net application that runs a .Net dll that uses WMI and
ADSI(both managed) to connect to a given IIS root and search through it.
When not using the ASP.Net client, but...
|
by: msnews.microsoft.com |
last post by:
I have ADSI code that I can make work at the command line. I cannot in
any way get it to work in asp.net. Even using Windows authentication,
impersonation on, and providing the credentials...
|
by: chat_devil |
last post by:
hi,
does anyone know if it is possible to remove an attribute that can not
be read into the ADSI property cache/collection.
i'm trying to do an eDirectory password change from .net directory...
|
by: LittlePython |
last post by:
I am a little confused on why I can not detect an object that does not exist
with a try and except. If I understand ADSI correctly from what I have read
you do not create these objects but rather...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|