by: jake |
last post by:
How can I copy a file securely (encryption) from remote computers easily
(Mac and Linux) to my Win 2000 Server once a day?
|
by: John Dalberg |
last post by:
With ftp, username and password are transmitted in clear text. I would like
to send files using ftp programmatically in a secure way. What's the best
way to do this?
--
John Dalberg
|
by: Guadala Harry |
last post by:
What are my options for *securely* storing/retrieving the ID and password
used by an ASP.NET application for accessing a SQL Server (using SQL Server
authentication)? Please note that this ID and...
|
by: Tony Hedge |
last post by:
Hello,
A .NET 1.1 web app...
I create a hyperlink with a complete filename, and the target is for a new
window to open. Right now the filenames are all PDF files.
Everything works fine, the...
|
by: va |
last post by:
I love Web Apps in ASP.NET 2.0 because you can easily deny users access to
pages by role or user.
But for desktop client to webservice methods, I am not sure what to do....
I am looking for...
|
by: Daniel Di Vita |
last post by:
I have three separate applications setup on an IIS server. Let’s call them
AppA, AppB, and AppC. On AppA (the Default application) the user is presented
with a login window. The login information...
|
by: dino d. |
last post by:
hi everyone- my subject pretty much says it all- is there a secure way
to do this? the non-secure ways are, as i understand it, to populate
a listbox with indices as names, or maybe use a hidden...
|
by: xkenneth |
last post by:
Hi All,
I'll shortly be distributing a number of python applications that
use proprietary. The software is part of a much larger system and it
will need to be distributed securely. How can i...
|
by: Terry Chapman |
last post by:
I have a 2003 Access .mda add-in which I can sign using my Thawte digital
certificate.
I am now migrating this add-in to Access 2007 and when I try to add my
Thawte digital signature Access 2007...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|