by: Dathon |
last post by:
I have an application that is comprised of multiple dll's and exe's, all with
strong names. Let's say that all of these applications use a utility library
Utility.dll, and let's say the version of...
|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data...
|
by: Susan Baker |
last post by:
We are currently developing a commercial application which we are
writing mostly in C# (at least the front end).
The apparent ease at which code is reverse engineered gives me sleepless
nights...
|
by: Maxim Vexler |
last post by:
Hello
I'm looking for reading materials to educate myself on the security
measures that should be taken to build a secure web site.
What I'm referring to is web sites like the following :
1....
|
by: cs5b |
last post by:
I am looking for the official javascript security specification for web
browsers. EMCAScript and DOM spec does not seem to contain a section on
security, so I assume none exists and the security...
|
by: OFM |
last post by:
I am running an oracle database with the application written in PHP.
I would like to be able to have the option to encrypt data residing in
certain columns in certain tables i.e. encrypt the SSNO...
|
by: shivalikaom |
last post by:
I have deloped a web-app using java servlet, html, oracle, tomcat web-server. I have applied form based login.but don't know other security measures. pl tell me such using scripting.
o.p.sinha
|
by: PayPal Security Measures! |
last post by:
<P><A href="http://www.paypal.com/cgi-bin/webscr?cmd=_home" target=_blank><IMG src="https://www.paypal.com/en_US/i/logo/paypal_logo.gif" border=0></A</P>
<TABLE cellSpacing=0 cellPadding=0...
|
by: abhinav2104 |
last post by:
I am making a website in Ms V Studio 2005 using C# and asp.net. I want to make a security measure such that the information entered by the user is encrypted and can only be accessed by the person...
|
by: munkee |
last post by:
I opted not to use the built in security management within access 2003. I have created my own authentication this typically comprises of a userID and password with a user assigned to a group.
...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|