by: Yoandy Rodriguez |
last post by:
I'm developing a J2EE aplication and the project leader told me to
investigate about the Data Access Object design pattern. I did some
research at Sun's blueprints for the enterprise site but there...
|
by: rparimi |
last post by:
Hi,
I have encrypted data stored in a table on a DB2 database. The
encryption algorithm used to store data in the table is not important.
Using a perl script and the DBI module, I was able to...
|
by: Nico |
last post by:
My database have 20 tables and many users. I wish to store encrypted
data in 3 tables and have only 3 users have access to them, walking
into tables or using forms.
Can someone point me a direct...
|
by: Burke Atilla |
last post by:
While encrypting data with DES through CryptoStream makes encrypted data bigger than original string. if we have 8 byte key and 8 byte of data then the mode is ECB. output encrypted data is 16 bytes...
|
by: Todd Gruben |
last post by:
I am trying to send some encrypted data from a php application to be
decoded in a .Net application. Both apps encode/decode a given string
but generate different encrypted results. Anyone have...
|
by: hansyin |
last post by:
HI, I got a problem about restoring data in mysql:
I have 2 or more PCs installed with mysql database, with same or almost
same table structure, but with different data. Can I combine those
data...
|
by: Microsoft |
last post by:
Im trying to do a new app where i can store most of my passwords, basically
another "Password Keeper" style tool....
Question about this is what is the best way to store the data, as a plain
XML...
|
by: lovesehuang |
last post by:
need some help for source codes about Keep Data Secret Management
System baseed on C/S Architecture.The other thnics we need is
SQL,C++,VC++,can u tell me where can i get them or download them.it's...
|
by: wassssup |
last post by:
hi guys..im new to datagridview and im wondering is there a way to convert an encrypted data in access and show it in a datagridview? im using C# and microsoft access
normally this is how to show...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|