by: grahamd |
last post by:
Who are the appropriate people to report security problems to
in respect of a module included with the Python distribution?
I don't feel it appropriate to be reporting it on general mailing
lists.
|
by: Stephen Cairns |
last post by:
I have a small security problem. I have a number of pages on a server and I want things set-up so as the user can't get into other pages without going to the index page and logging in first. At...
|
by: jmev7 |
last post by:
I have heard of security issues with IIS while on a T1 line or on a
cable modem, etc. I learned of a "break in" at a state office, and it
was traced to an "open door" while using IIS. Due to that...
|
by: Bob Alston |
last post by:
Could develop web pages that would interact with the access/jet database
- like DAP but without the security flaw???
One of Access' competitors (Filemaker Pro as I recall) touts its EASY
way to...
|
by: Sanjay Poojari |
last post by:
Hi All,
Need some advice on some of the security issues in my ASP.Net application.
There are certain tasks that I need to implement so need advice/guidance on
them as well as safeguards that I...
|
by: Ken North |
last post by:
Microsoft's Dan Rogers will be one of the panel members in an important
discussion of Web services security.
On August 10, the San Diego Software Industry Council (SDSIC) is sponsoring a
panel...
|
by: gundam.f0rtre55 |
last post by:
Hi everybody,
for a new release of our J2EE Webapplication, our customer wish to
allow the usage of bookmarklets. The application must be able to
register URLs with several protocol types, one of...
|
by: Worku Yohannes |
last post by:
I am happy to join you.
Hellow, By proffession I am an economist(ethiopian), but when I observed the challenges of microfinance institutions, I had decided to develop a software to manage their...
|
by: prognoob |
last post by:
I have searched online, and what I mostly come across is what these security issues are...
for example, Worms, Backdoor Trojan Horses, Hijacking and Impersonation, Denial of Service etc.
but I...
|
by: amjad905 |
last post by:
Hi,
I have created some dynamic labels and some dynamic linkbuttons... those linkbuttons have addhandlers assigned to them... but in postback those buttons gets deleted...
the code is shown...
|
by: CloudSolutions |
last post by:
Introduction:
For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome former...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|