by: xmp333 |
last post by:
Hi All,
I am trying to hide my JavaScript source. The method I chose was to
keep all the important source in a password protected folder, and then
use a SRC="folder/script.js" to include it...
|
by: Sorin |
last post by:
Hi all
I have a .NET application that is using few ActiveX DLL wrote in VB6. I
managed to get the most from my previous VB6 controls by using them in .NET
but sometimes when I am using my...
|
by: Howard |
last post by:
I am currently looking at the various packages that are available for
software protection. I have a particular question that I'd welcome
your feedback on.
Background info:
I work for a company...
|
by: SoftComplete Development |
last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20
Software piracy! Cracked serial numbers! Thousands of commercial
products are posted on the warez sites and become available to all who...
|
by: Tom |
last post by:
Can anyone give me any advice on how to secure a folder on a network server
so that documents in the folder can only be opened through an Access
database or by the database admin. I need to store...
|
by: rom |
last post by:
i know it's not exactly the place to post this question
but i didn't find a betrer group. when i send a zipped
folder with an asp.net application i cant use it on the
destination computer. when i...
|
by: Kilicaslan Fatih |
last post by:
When I push a button to trigger the code:
def runCCCC(self, event):
cmd_out = self.A_com()
if App.runF != "":
os.mkdir('C:\copiedFiles')
for item in App.runF:
App.beCopied = str(item)...
|
by: ruffeo |
last post by:
There has been alot on the web about this web.config error that
happens in visual studio .net 2005. Most people think this has to do
with IIS, but .net 2005 doesn't run on IIS but a developer...
|
by: Tulgaa |
last post by:
When i manually create a shared folder, the shared folder was non
password protection.
but when i create a shared folder from a program, the shared folder is
become password protected.
I use...
|
by: sivan1983 |
last post by:
sir my domain users opening sysvol folder and netlogon folder how can i
control this
could u give me how to secure active directory
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|