by: Sylvie Stone |
last post by:
Hi group -
I have an html form for that uses username and password to login to a
specific area of the website. The "area" the user wants to go to is
based on a pull down menu. Becasue the...
|
by: |
last post by:
My questions concerns building a login system based on checking for the
existence of the user's email address only....
1. Is it ok for me to use IP address to allow user to bypass all login and...
|
by: Kigunda Mbogo |
last post by:
Hi,
I am having a windows 2003 ADS with exchange 2003. I do have OWA running on
the same box.
I would like to create a form based login page that would appear on a
different virtual...
|
by: TK |
last post by:
What's the best way to implement roll-base access control with forms
authentication?
I have a IIS6+ASP.NET server which hosts some ASP.NET web applications as
separated path that's like...
|
by: Andre |
last post by:
I've got the basic forms based authentication going. A user has to go to my
login page before they can access any other pages. The issue is that there
are a sub-set of pages on which I don't...
|
by: |
last post by:
One thing I did a lot of in Classic ASP involved showing page elements
conditionally based on whether a user was logged in or not. Logged in users
or "superusers" would get more content and/or more...
|
by: Friends |
last post by:
Hi
I need to set security for row level but not based on Database user's
login. It should be based on the user table login. For the particular
user I need to allow only the particular records to...
|
by: Marty |
last post by:
I have created a web site and defined 3 rolls: Admin, Manager,
Employee
I would like to add all users to the Employee roll automatically when
they register.
Anybody have a suggestion or material...
|
by: Nalaka |
last post by:
Hi,
I have a asp.net application with forms authentication enabled.
Users create private (database driven) messages (pages; like a message
board) that is only viewed by logged in users.
Now I...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|