by: Tim Marshall |
last post by:
I'm starting to work with connection strings and Oracle. The connection
string syntax is pretty much the same as MS SQL (based on one of Lyle's
posts in response to a question I had about a jmonth...
|
by: com |
last post by:
MS Access 2000 Password Recoverer 4.2 Screenshot - Soft30.com
MS Access 2000 Password Recoverer will display the password to a MS
Access
database (*.mdb). This program works for MS Access files...
|
by: feng |
last post by:
For a HTTP textbox with a Type of "password", the default
behaiver is that the field will be cleared out when the
page is posted back. This make sense in most of the cases.
But in some situation,...
|
by: kthiagar |
last post by:
Hi
I am trying to connect to a password protected access file from VB.NET.
I have no problem in connecting to Access, if I remove the password.
This is what I am doing:
In the server explorer,...
|
by: Jozef |
last post by:
Hello,
I've set up VS2003 on my laptop which is running Win XP pro in a stand alone
situation, no domain or dc. When I try and "Create a blank solution", I use
the Laptop IP address since...
|
by: Benny Ng |
last post by:
Dear all,
The following is the source. The password is encrypted and saved into the
Binary in SQL2K.
Now I want to create a new page to compare the existed password and the
password that in the...
|
by: Eugene Anthony |
last post by:
Is this method of validation for password and username considered to be
secured. In my previous post I was given a solution that uses command
object and the values are parsed by parameters. But the...
|
by: Chester |
last post by:
I'm working on an app that records data collected by service
technicians (VB.Net front-end, SQL Server 2000 back end). The
technicians need to record numbers with varying scale and precision.
For...
|
by: pawan123 |
last post by:
Hi,
I am using VB6 and SQL Server 2000.
I want to design a logon form. In this form, how can I use a Password field to store in encrypted form in tbluser table and how can I compare password...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|