by: chris |
last post by:
im just starting to learn how sessions work and how to use them
my question is if im geting a username and password from a visitor is it
secure to store that information in a session variable or...
|
by: Sean Newton |
last post by:
I am absolutely bewildered by now by the Microsoft.Samples SSPI and Security
assemblies. I've been trying to set these up in a very straightforward
harness in the way that I'd like to be able to...
|
by: Namratha Shah \(Nasha\) |
last post by:
Hey Guys,
Before we start with our sample app we need to view the security
configuration files on the machine. You will find them under
<drive>\WInNT\Microsoft.NET\FrameWork\<version>\Config
...
|
by: Glenn M |
last post by:
is it bad practice for vendors to supply a machine level
security.config file in an msi package with their installations to
chnage security settings. Would i be right in thinking that this msi (...
|
by: Steve B. |
last post by:
Hi,
I've build an application based on some Web Services.
Web Services are separated across some asmx files, according the business
service it provides.
In each web service, there are some...
|
by: WebMatrix |
last post by:
Hello,
I have developed a web application that connects to 2 different database
servers. The connection strings with db username + password are stored in
web.config file.
After a code review,...
|
by: John Kotuby |
last post by:
Hello all,
Note: This is the full version of a Post that I inadvertently sent before it
was complete.
About a year ago I wrote a VB.NET 2003 solution that consists of a number
of assemblies...
|
by: David++ |
last post by:
Hi folks,
So I have implemented a Web service which provides several Web Methods.
Before the client can use the WebMethods they must first be authenticated and
authorized i.e. they login, obtain...
|
by: Ronald S. Cook |
last post by:
Hi,
Some users on our domain can run our WCF application no problem. Some get
an unhandled exception error re: SOAP security negotiation. I'm wanting the
service to not be secure.. I just want...
|
by: Kemmylinns12 |
last post by:
Blockchain technology has emerged as a transformative force in the business world, offering unprecedented opportunities for innovation and efficiency. While initially associated with cryptocurrencies...
|
by: Naresh1 |
last post by:
What is WebLogic Admin Training?
WebLogic Admin Training is a specialized program designed to equip individuals with the skills and knowledge required to effectively administer and manage Oracle...
|
by: antdb |
last post by:
Ⅰ. Advantage of AntDB: hyper-convergence + streaming processing engine
In the overall architecture, a new "hyper-convergence" concept was proposed, which integrated multiple engines and...
|
by: AndyPSV |
last post by:
HOW CAN I CREATE AN AI with an .executable file that would suck all files in the folder and on my computerHOW CAN I CREATE AN AI with an .executable file that would suck all files in the folder and...
|
by: WisdomUfot |
last post by:
It's an interesting question you've got about how Gmail hides the HTTP referrer when a link in an email is clicked. While I don't have the specific technical details, Gmail likely implements measures...
|
by: Matthew3360 |
last post by:
Hi,
I have been trying to connect to a local host using php curl. But I am finding it hard to do this. I am doing the curl get request from my web server and have made sure to enable curl. I get a...
|
by: BLUEPANDA |
last post by:
At BluePanda Dev, we're passionate about building high-quality software and sharing our knowledge with the community. That's why we've created a SaaS starter kit that's not only easy to use but also...
|
by: Johno34 |
last post by:
I have this click event on my form. It speaks to a Datasheet Subform
Private Sub Command260_Click()
Dim r As DAO.Recordset
Set r = Form_frmABCD.Form.RecordsetClone
r.MoveFirst
Do
If...
|
by: ezappsrUS |
last post by:
Hi,
I wonder if someone knows where I am going wrong below. I have a continuous form and two labels where only one would be visible depending on the checkbox being checked or not. Below is the...
|