|
by: RR |
last post by:
The next step after Grant Wagner's simple solution to my "Get computer name"
thread,
is to automatically add the web application's site to the list of trusted
sites in IE.
Obviously, the user should get a popup first that says "Do you want to add
this site?"
I've looked through the Wscript doco in MSDN, but can't find a way of
manipulating this browser setting.
|
by: Dan |
last post by:
Hello to all. Any knowledge that you might have one the following
subject will be GREATLY appriciated.
I am new to Access Pages and I can not get rid of the following errors
when I open my Access pages. The Access pages are for our intranet
only. Once I click past the warning message the pages work fine.
WARNING1
"This website uses a data provider that may be unsafe. If you trust
the website, click OK, otherwise click cancel."
|
by: TrinityPete |
last post by:
Hi all,
We have a web application that uses web services for data access and
retrieval. The web app and web services reside under IIS on the same
server(WIN2003). The virtual directories have been set for windows
authentication and both the ASP web application and the web services are
using windows authentication with impersonation of the logged on user. We
also set the web service credentials to CredentialCache.DefaultCredentials.
...
|
by: cindy |
last post by:
I have a System.Web.UI.HtmlControls.HtmlInputFile control that I use to
submit files. Before the file is successfully submitted I validate another
field on the form, it is the description of the file must be 500 characters.
I am adding the file to a site server library programmatically so if the
field is too long I want to return the user to the form with file still
selected in the HtmlInputFile control. I am using an error label to inform...
|
by: drk.kumar |
last post by:
Hi,
I would like to add an url as a "Trusted" one(Manual way :
Tools->InternetOptions->security->trusted sites). How do I make it
through javascript code. Please let me know any sample code on this.
Thanks in advance
Krishnakumar
|
|
by: Flic |
last post by:
Is this possible?
I know about a bit about ODBC and found how to import an ODBC database
stored on the computer, however I am after accessing an SQL database
stored on a webserver. I'd like to keep it up to date, but that could
probably be done with a macro.
At the moment I'm just considoring possible options, so just need to
know if it can be done, how easy and a rough idea of how.
|
by: SofiaV |
last post by:
Hello,
1.Add site toTrusted Sites List using javascript( programmatically ).
Or
2.How to check it programmatically using javascript, if the specific site is included in the "Trusted Sites"
Thanks in advance
|
by: gpl666666 |
last post by:
I use Microsoft Access to create a webpage
I publish this webpage to our company server, it gives two messages
when I open the webpage, one is:
"This website uses a data provider that may be unsafe. If you trust
the website, click ok, otherwise click cancel"
Another msg is:
"This website is using your identity to access a data source. If you
trust this website click ok to continue, otherwise click cancel"
I have to click OK for both...
|
by: Prabu |
last post by:
Hi,
I am programming for a small computer device which is running on
Windows XP. I need to disable the popup blocker and enable the "Allow
script initiated windows without size or position constraints"
options. To achieve this, I need to add my local intranet sites to
"Trusted Sites" zone. I need to do this from a startup application,
which is a c# application. Please anyone let me know, how to do this
using c#?
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|