|
by: jenny |
last post by:
Hi, I am trying to find a VB way that would create a folder on all
existing drives - the folder name would be the same on each drive. ie
c:\backup, d:\backup, etc. But the folders would only be created if
they don't already exist, and if the drive happens to be one a folder
cannot be created on (ie a cdrom drive) it would just be skipped
without the code generating any errors.
your help on this would be most appreciated. jenny
|
by: flat_ross |
last post by:
Hi,
I am in a shop where developers are required to work off of a network
share. This is so that code is backed up nightly.
So I am testing running an ASP.NET Web application with a Class
assembly all on a shared drive.
I have the solution working perfectly. However, I have run into a
hiccup. In order to map IIS Virtual Dir to a network drive, you need
|
by: ASP.NET User |
last post by:
Hi
I am in a shop where developers are required to work off of a networ
share. This is so that code and other documentation is backed up nightly. This is outside the realm of Visual SourceSafe which we also use for code control. The network drive is used as the working folder. This is a configuration this shop has used for 6 years and I do not see it changing any time soon
So I am testing running an ASP.NET Web application with a Clas...
|
by: George |
last post by:
VS.NET 2002/VB
My IIS permissions and folder settings show Read and Execute only. Why is it that I can use any
browser and link directly to my DLL file in my BIN folder on my Web site and download it to my
harddrive (as could anyone else who wanted to)? I don't see any other settings in my host's Control
Center Panel that will let me set any other properties for those folders.
How do I prevent this from happening?
Thanks,
|
by: itamtodd |
last post by:
How Do I License & Protect My Software?
I am in the process of developing a small program that I will be trying
to sell to different institutions. The program is written in VB and
uses an Access database.
Now how do I go about selling people a license for my software? And
also how do I protect my software from just being ripped off, i.e.
Encrypt it?
|
|
by: Pallas |
last post by:
Hi all,
I've produced some high-def videos and I want people
to be able to watch them on my website, but I may want
to prevent downloads and I certainly want to prevent
them from editing them.
How can I impose such limitations?
I have asked Google Video if they will ever permit
|
by: Simon |
last post by:
Dear Access friends,
How can I load a string with his own folder address.
The following code addressed to the system folder of MS programs.
|
by: biganthony via AccessMonster.com |
last post by:
Hi,
I have the following code to select a folder and then delete it. I keep
getting a Path/File error on the line that deletes the actual folder. The
line before that line deletes the files in the folder but I get the error
message when the procedure attempts to delete the folder selected in the
BrowseforFolderbyPath function.
How can I get it to delete the folder that the user has selected in the
Browse for Folder dialog?
|
by: paitoon |
last post by:
Helle
I have problem about .htaccess in my site. My purpose is i want to protect a folder name's IMAGES in my site then i put .htaccess into that folder. But instead of the IMAGES folder will be protected but i could not open my site at all.seems like it not only protect the IMAGES folder but it protects to open my site also.
what should i do ? and what is the actually syntext to do this?
I use this systext;
AuthUserFile...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|