by: Pflanzen Gold |
last post by:
Hi,
When entering a password we don't really see the characters - we see
**** instead. How can I write such a routine in C? How can I 'echo
off' the inputs? How can I get a characters/strings...
|
by: torno |
last post by:
Hi,
Can someone guide me as to how I can modify the code below to hide
characters from displaying on the screen as they are entered? If there is
a better way of achieving this, please let me know....
|
by: Rolf Barbakken |
last post by:
We have a case where users who are encouraged to have good passwords with
norwegian characters and other special characters cannot login to a ASP.NET
1.0 app.
This problem is discussed in the...
|
by: Simple Java Drinker |
last post by:
I decided to reinstall the Windows XP on my computer by using the
Repair Option. After typing "R" as required I am requested to input an
administrator password. The problem is that no administrator...
|
by: Robert Hilkene |
last post by:
Hi there
I want to hide output characters in my py program. I found that for
Macintosh you implement 4.12 quietconsole -- non-visible stdout output...
|
by: V_S_H_Satish |
last post by:
Dear Friends
In db2, is it possible to put password security policy.
Like password must contain with all mixed characters (alphabets,
special characters, numerics) and password should not be...
|
by: =?Utf-8?B?am1obWFpbmU=?= |
last post by:
I'm trying to create a process that allows me to limit the non-alphanumeric
characters generated with the PasswordRecovery control. Specially I want to
suppress some characters for security...
|
by: DarthPeePee |
last post by:
Hello everyone.
I am working on a Password Strength Meter and I am running into 1 problem that I would like to fix.
When pressing the "Clear Password & Try Again" button, the password clears...
|
by: Debadatta Mishra |
last post by:
Introduction
In this article I will provide you an approach to manipulate an image file. This article gives you an insight into some tricks in java so that you can conceal sensitive information...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|