Daily Archives

Articles indexed Sunday March 21 2010

Page 34/85 | < Previous Page | 30 31 32 33 34 35 36 37 38 39 40 41  | Next Page >

  • How to ensure DB security for a Windows Forms application?

    - by Vilx-
    The basic setup is classic - you're creating a Windows Forms application that connects to a DB and does all kinds of enterprise-y stuff. Naturally, such an application will have many users with different access rights in the DB, and each with their own login name and password. So how do you implement this? One way is to create a DB login for every application user, but that's a pretty serious thing to do, which even requires admin rights on the DB server, etc. If the DB server hosts several applications, the admins are quite likely not to be happy with this. In the web world typically one creates his own "Users" table which contains all the necessary info, and uses one fixed DB login for all interaction. That is all nice for a web app, but a windows forms can't hide this master login information, negating security altogether. (It can try to hide, but all such attempts are easily broken with a bit of effort). So... is there some middle way? Perhaps logging in with a fixed login, and then elevating priviledges from a special stored procedure which checks the username and password?

    Read the article

  • JQuery .html() method and external scripts

    - by Marco
    Hi, i'm loading, using the JQuery ajax() method, an external page with both html and javascript code: <script type="text/javascript" src="myfile.js"></script> <p>This is some HTML</p> <script type="text/javascript"> alert("This is inline JS"); </script> and setting the results into a div element, using the html() method. While the html() method properly evaluates the inline JS code, it doesn't download and evaluate the external JS file "myfile.js". Any tip for this issue?

    Read the article

  • LInux C++: how do profile time wasted due to cache misses?

    - by anon
    I know that I can use gprof to benchmark my code. However, I have this problem -- I have a smart pointer that has an extra level of indirection (think of it as a proxy object). As a result, I have this extra layer that effects pretty much all functions, and screws with caching. Is there a way to measure the time my CPU wastes due to cache misses? Thanks!

    Read the article

  • Haskell Cons Operator (:)

    - by Carson Myers
    I am really new to Haskell (Actually I saw "Real World Haskell" from O'Reilly and thought "hmm, I think I'll learn functional programming" yesterday) and I am wondering: I can use the construct operator to add an item to the beginning of a list: 1 : [2,3] [1,2,3] I tried making an example data type I found in the book and then playing with it: --in a file data BillingInfo = CreditCard Int String String | CashOnDelivery | Invoice Int deriving (Show) --in ghci $ let order_list = [Invoice 2345] $ order_list [Invoice 2345] $ let order_list = CashOnDelivery : order_list $ order_list [CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, CashOnDelivery, ...- etc... it just repeats forever, is this because it uses lazy evaluation? -- EDIT -- okay, so it is being pounded into my head that let order_list = CashOnDelivery:order_list doesn't add CashOnDelivery to the original order_list and then set the result to order_list, but instead is recursive and creates an infinite list, forever adding CashOnDelivery to the beginning of itself. Of course now I remember that Haskell is a functional language and I can't change the value of the original order_list, so what should I do for a simple "tack this on to the end (or beginning, whatever) of this list?" Make a function which takes a list and BillingInfo as arguments, and then return a list? -- EDIT 2 -- well, based on all the answers I'm getting and the lack of being able to pass an object by reference and mutate variables (such as I'm used to)... I think that I have just asked this question prematurely and that I really need to delve further into the functional paradigm before I can expect to really understand the answers to my questions... I guess what i was looking for was how to write a function or something, taking a list and an item, and returning a list under the same name so the function could be called more than once, without changing the name every time (as if it was actually a program which would add actual orders to an order list, and the user wouldn't have to think of a new name for the list each time, but rather append an item to the same list).

    Read the article

  • Facebook Style YUI Tabs

    - by Amaç Herdagdelen
    Does anyone know how to style YUI Tabview component [1] so it will look like Facebook tabs [2]? I am using YUI 2. A very crude attempt is below (I modified the example code given in Devtacular [3]). But it does not handle the spacing between the tabs, nor the outer lines around the selected tab. http://developer.yahoo.com/yui/tabview/ http://dl.dropbox.com/u/121472/facebook_tab.jpg http://devtacular.com/articles/bkonrad/how-to-style-an-application-like-facebook/ Thanks! .yui-navset .yui-nav a { padding: 8px; background-color: #d8dfea; color: #3b5998; font-weight: bold; font-size: 12px; float: left; margin-right: 4px; text-decoration: none; cursor: hand; } .yui-navset .yui-nav a:hover { background-color: #3b5998; color: #ffffff; text-decoration: none; } .yui-navset .yui-nav .selected a { background-color: #ffffff; color: #333333; text-decoration: none; }

    Read the article

  • Vista: "Change date and time" causes permissions error

    - by alexsome
    I double-click on the time in the bottom right to open the date and time panel. Then I click on the "Change date and time..." button (which has a shield) and I get the UAC dialog. I click "Continue", then am presented with an error that reads: Unable to continue You do not have permission to perform this task. Please contact your computer administrator for help. I will mention I have Comodo installed, but I have turned it off to test this out and I get the same results. All that I've found while googling were suggestions to turn UAC off, but I am interested in learning what the actual problem is. Thanks in advance.

    Read the article

  • Missing Driver in Win7 x64 ? (Texas Instruments PCIxx12 Integrated FlashMedia Controller)

    - by Mohammad
    I have Win7 x64 built 7600 on my Vaio laptop (VGN-AR890U) In my Device Manager there is a device that I've not found its driver yet! http://www.picfront.org/d/7vCf I've followed Update Driver button's instructions and below is the result, but it doesn't resolve the problem. I was searching the web for the driver but I couldn't find anything special that resolved my problem. http://www.picfront.org/d/7vCg Could you please guide me, how I can solve it ?

    Read the article

  • Tackle Wi-Fi Security Issues Proficiently

    In today?s world, Wi-Fi has become a convention and as a matter of fact, many big business giants are coming forward for offering service and gadgets for wireless communication. As an immediate effec... [Author: Susan Brown - Computers and Internet - March 21, 2010]

    Read the article

  • DotNetNuke Web Hosting

    DotNetNuke (DNN) is one of the most sought after Content Management System (CMS) for the net market. It is applied on numerous websites and by several companies from across the globe. What makes this... [Author: scheygensmith - Computers and Internet - March 21, 2010]

    Read the article

  • The Desirable Intervention of CNC Machining

    Industries find many uses of CNC machining. Woodworking shops and some other industrial settings make use of the Computer Numerated Control technology behind these machines. Large, repetitive tasks r... [Author: Scheygen Smiths - Computers and Internet - March 21, 2010]

    Read the article

  • CNC Information - Data Storage and Transfer

    A CNC machine must be tried when there is need to improve speed and accuracy. The machine performs better in doing repetitive tasks and getting large jobs done quicker. Woodworking shops or industria... [Author: Scheygen Smith - Computers and Internet - March 21, 2010]

    Read the article

  • Quality End Products With CNC Lathes

    A part of wood or metal can be shaped or worked on the lathe with the aid of a cutting machine. CNC lathes can be tried when best cutting tools or equipment are desired. Cylindrical or symmetrical m... [Author: Scheygen Smith - Computers and Internet - March 21, 2010]

    Read the article

  • Download Joomla Templates

    Joomla is a highly sophisticated and advanced Content Management System (CMS) that helps businessmen and web developers to create websites with highly efficient online features. Many of its attribute... [Author: Scheygen Smith - Computers and Internet - March 21, 2010]

    Read the article

  • Drupal Webhosting

    Drupal is often regarded as one of the most popular Content Management System (CMS) that manages web contents pages, and other online projects such as online publications for writers, graphic designe... [Author: Scheygen Smith - Computers and Internet - March 21, 2010]

    Read the article

  • Designs For Emerald Cut Rings

    Step Cut type of the emerald cut stones appears to be like steps engraved into the jewel. Particularly, emerald cutting was rectangular in shape with little cropped corners. At first, this cut was bu... [Author: Scheygen Smith - Computers and Internet - March 21, 2010]

    Read the article

  • Network Inventory Software

    The necessary condition of a company successful operation is a good state of computer assets. That is why all the company?s software and hardware should be inventoried on the regular basis. A system ... [Author: Dmitriy Stepanov - Computers and Internet - March 21, 2010]

    Read the article

< Previous Page | 30 31 32 33 34 35 36 37 38 39 40 41  | Next Page >