by: FISH |
last post by:
Ever have one of those days when you're not sure if it's you who's gone
mad, or the rest of the world?
I have an Open Source project on SourceForge for communication with YSMG
- Yahoo's IM...
|
by: Hallvard B Furuseth |
last post by:
Now that the '-*- coding: <charset> -*-' feature has arrived,
I'd like to see an addition:
# -*- str7bit:True -*-
After the source file has been converted to Unicode, cause a parse
error if a...
|
by: Monica Ferrero |
last post by:
Hi!
I'm not sure if this is the most adequate mySQL list for this post. If not,
please indicat me which one I should use...
I'm using Tomcat 4.1.24 with Apache 2 and MySQL 4.0.13. I have the...
|
by: Luis Carvalho |
last post by:
Hi!!
I'm developping a web app that uses the windows
authetication to manage it's permissions. In other words,
I want only the users that can get in my win2000 machine
to be able to access the...
|
by: Sunny |
last post by:
Hi,
I am new in development. I want to develop a application which send
email from yahoo acoount to rediffmail acount I am trying following
Code But its giving Server 530 Authetication...
|
by: galaxy_vincent |
last post by:
Anyone can share with me how to conduct an Active Directory
Authetication in Dot Net Application?
Thanks.
*-----------------------*
Posted at:
www.GroupSrv.com
*-----------------------*
|
by: Eli Allen |
last post by:
So now that MS04-004 is out breaking the ability to pass in a
password/username through the URL how can we pass in a username and password
using SHDocVw in c#?
I'm launching IE like this:...
|
by: User |
last post by:
Are there ways to do http authetication?
Or able to emulate .htaccess
For eg: User reach a directory, there will be a pop up asking the user to
enter a user id and password
pls advise....
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|