|
by: Martinh |
last post by:
Hi
After invoking RetrieveData in a WebService I recieve the following
response in a new window...
I am running Microsoft .NET Framework Version:1.1.4322.573; ASP.NET
Version:1.1.4322.573 on IIS6 on Server 2003 Enterprise. Does anybody
has a working solution for me?
Martin
|
by: Peter Afonin |
last post by:
Hello,
I'm using this code to access a network share from an asp.net page:
Dim dir As DirectoryInfo = New DirectoryInfo("\\10.0.0.150\FormLib\")
Dim files() As FileInfo = dir.GetFiles("*.eps")
When I try to do it, I get this error:
System.UnauthorizedAccessException: Access to the path
|
by: Benny Ng |
last post by:
Hi,All,
When i deploy Enterprise library with my application ,i used XCOPY to
deploy it into my test server. But when application runs, shown some error
related registry. (But actually I haven't any method or component to wrote
registry)
After I used "InstallUtil" to registry Enterprise Library (those DLLs)
to the deployment server, the...
|
by: EP |
last post by:
When running my asp.net hosting service (asp.net without IIS), on server
2003 with IIS not installed, I get the following when trying to process a
request.
"System.DllNotFoundException: Unable to load DLL (aspnet_isapi.dll)."
Of course the dll is able to be found, it's still in the framework directory
and for grins I even put it in my...
|
by: Nicholas Then |
last post by:
I have just written a COM object which ties into a roaming user profile so
that I may use DPAPI on many machines and have the same encryption and
decryption. When I install it on 2 of my servers it works great one server
can decrypt the other server's data. That tells me that the roaming profile
is being used properly. Now if I put the same...
|
|
by: Michael Primeaux |
last post by:
I have a simple .NET 2.0 web service created with VS.NET 2005 with a single
web method with the following signature:
void HelloWorld(Guid parameter1);
When calling this method I receive the following error:
System.IndexOutOfRangeException: Index was outside the bounds of the array.
at...
|
by: =?Utf-8?B?QmVu?= |
last post by:
Hi,
I was wondering whether the Enterprise Library replaces Enterprise Services
as a framework for providing services for enterprise apps,
or it supplements it. I know nothing of either of these technologies, but
from just looking at their feature set,
I noticed that they don't exactly share the same features, for example ES
offers...
|
by: =?Utf-8?B?QnJpYW4gTmllbHNlbg==?= |
last post by:
Hi
I'm trying to use the Cryptography application block within a web
application and have encountered a problem that I hope you can help resolve.
1. When I create a key file through "Enterprise Library Configuration", I
select e.g the 3DES provider and goes through the wizard of creating a key.
A part of the wizard wants to further...
|
by: Brent White |
last post by:
We're looking into building an in-house integrated enterprise system
to manage inventory, work-in-process, and finances, among others. I
am somewhat familiar with VB.NET (veteran VB 6 programmer) and think
that using the .NET framework would be best.
What programming language is ideal for programming in the .NET
framework, just overall,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it. ...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
|
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|