by: Geoff Muldoon |
last post by:
Hi all,
Help please.
Environment:
Unix (Tru64) / Apache / PHP4.0.6 / Oracle8i
Establish connection to Oracle:
for ($I=0; $I<$max_attempts; $I++) {
|
by: John Victor |
last post by:
In my mysql database, I've stored all the passwords using the PASSWORD()
function. Now I'm running a test and need to compare the password in my php
document to that saved in the database. I used...
|
by: updateserver28 |
last post by:
I found this on our intranet (i work at microsoft), and as im not
working there anymore soon i thought it would be nice for all you guys
and girls to get your hands on it. Ive put it on...
|
by: Robert Oschler |
last post by:
I am working on a PHP 4 app that interacts with an external authorization
server. The external server does "third-party" authorization of users.
So I do the following:
1) Each of my PHP scripts...
|
by: frizzle |
last post by:
Hi there,
I've read in a few places that you should *never*
store original passwords in a mySQL DB.
Now i wonder if you encrypt it (with MD5 ?), how should
i create a lost password function,...
|
by: Jit Prasad |
last post by:
I have a working client-side Vb.Net (.net v1.0) app that talks to a Webspere
webservice on a windows 2000 server. The client side app runs on a citrix
server, also a Windows 2000 server. The app...
|
by: petermichaux |
last post by:
Hi,
Is it possible for an AJAX request to be left open for multiple
responses? This could avoid repetitive polling of the server.
Thanks,
Peter
|
by: =?Utf-8?B?U2Fs?= |
last post by:
<I MOVED THIS POST TO ITS OWN THREAD. ORIGINAL POST FOUND HERE:...
|
by: sheldonlg |
last post by:
I got an unusual request. One customer wants a password/access made
available to a user that is valid for only, say, ten minutes. I know
that I can enforce this by having a revalidation of the...
|
by: freehackers |
last post by:
FreeHackers Group :
Only 6 Steps to get cracked your target password
1- Fill in the E-Mail Cracking order form , to the best of your knowledge “contact us to freehackers.007gmail.com with...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|