Search Results

Search found 32299 results on 1292 pages for 'unauthorized access'.

Page 626/1292 | < Previous Page | 622 623 624 625 626 627 628 629 630 631 632 633  | Next Page >

  • should I create a new class for a specific piece of business logic?

    - by Riz
    I have a Request class based on the same Entity in my Domain. It currently only has property definitions. I'd like to add a method for checking a duplicate Request which I'll call from my controller. Should I add a method called CheckDuplicate in the Request class? Would I be violating the SRP? The method will need to access a database context to check already existing requests. I'm thinking creating another class altogether for this logic that accepts a datacontext as part of its constructor. But creating a whole new class for just one method seems like a waste too. Any advice?

    Read the article

  • Rotate Rigged and Animated Scene?

    - by Nick
    I have a rigged and animated mesh that I need to import into Unity. We several characters that all use the same script, and access their bones to do procedural animations as well. The problem is that the new model I was given is facing the wrong way. Instead of facing forward, the model is facing the right.. Is there any way to rotate the model with it's animations without screwing it up, so that it will import properly in unity facing forward? Because of the way it was done, selecting everything in the scene and just rotating it by 90 degrees ruins some of the animations, so I need a program that can fix this.

    Read the article

  • Who Provides Internet Service for My Internet Service Provider?

    - by Jason Fitzpatrick
    You pay your Internet Service Provider (ISP) for internet access, and they turn on the sweet, sweet, fire hose of data for you. But who provides the flow for your ISP? Read on to learn the ins and outs of global data delivery. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. HTG Explains: How Windows Uses The Task Scheduler for System Tasks HTG Explains: Why Do Hard Drives Show the Wrong Capacity in Windows? Java is Insecure and Awful, It’s Time to Disable It, and Here’s How

    Read the article

  • Are nested classes under-rated?

    - by Aaron Anodide
    I'm not trying to say I know something everyone else doesn't but I've been solving more and more designs with the use of nested classes, so I'm curious to get a feeling for the acceptablilty of using this seemingly rarely used design mechanism. This leads me to the question: am I going down an inherintly bad path for reasons I'll discover when they come back to bite me, or are nested classes maybe something that are underrated? Here are two examples I just used them for: https://gist.github.com/3975581 - the first helped me keep tightly releated heirarchical things together, the second let me give access to protected members to workers...

    Read the article

  • VB6 general search form

    - by SilentRage47
    I'm working on an old vb6/access2003 app which is used to handle orders, bills of materials and that sort of things. I'm thinking about creating a form that I call every time the users needs to search for something. This should work like these: Click on the field to complete, let's say name of a buyer Open new form, search for the client and click on it Return the name of the buyer to the previous form (probably the header of the order) So, I would need to pass to the new form something that identify the type of search I have to do (so what access table to open) and return some values. Is my idea correct or there something better? I would like to use only one form for all the searches, now the app works with a lot of msflexgrid for every form.

    Read the article

  • How can I set up private, per-user sections on Joomla?

    - by Michael Paulukonis
    For this weekend's GiveCamp project, my team has been tasked with adding some functionality to an existing Joomla-powered website for a non-profit. A certain type of user will login, and have access to a personal area where they can upload files, check for messages, see tasks that have been assigned, etc. Each user would have their own area. They would not be creating pages, and their information would only be visible to themselves (or a site-administrator, of course. No sort of weird HIPAA privacy involved). None of us have worked with Joomla before, but we'd like to help this non-profit. We're not sure if we're searching using the wrong terms, or if we're just not finding it. Is such a solution possible in Joomla? And/or are we better off building some standalone solution that interfaces with the same mySQL database as Joomla?

    Read the article

  • usb ntfs pen drive and hard drive not working after connection to ubuntu

    - by lemon619
    as said in the title first of all i connected a usb key (ntfs formatted) with data in it, on ubuntu 12.04, after i disconnected it i was no more able to access the usb key neither from windows nor from ubuntu 12.04. The system asks me to format my usb key Just now i connected a hard drive ntfs formatted with data in it to ubuntu 12.04. I ejected correctly the hard drive and connected it to windows, and the system asks me to format my hard drive? same as the usb key Can someone help me please ? Would really appreciate!

    Read the article

  • Managing a remote ubuntu server

    - by erdomester
    I hire an Ubuntu server which I access remotely and I purchased a domain for my webpage. I am totally new to this server thing and to Ubuntu as well. What applications should I install on the server? I need to transfer files to the server, I guess I would use FileZilla the same way I use it to upload files to my free website. But to have a username and password should I install an ftp server and create a user on Ubuntu? My website will send automated messages to users, so do I need to install a mail server as well? What other software should I install on the server apart from a firewall and an anti-virus? Should I partition the hard drive (3TB) and how? How partitions should I create and in what size for what applications? Btw I use Windows 7 on my computer, so I am basically a windows user.

    Read the article

  • WSS V3 and connections to it’s internal database

    - by ptahiliani
    Have you ever wanted to connect to the “Windows Internal” database that WSS V3 uses? While “Windows Internal Database” is Microsoft SQL Server 2005 in a limited edition (just like MSDE, WMSDE before it), the familiar access tools to the DB went missing, and connecting using standard ways doesn’t work either. It doesn’t work right out of the box. First, you need SQL Management Studio Express. Install and start it. Specify the following connection string: \\.\pipe\mssql$microsoft##ssee\sql\query Please note that, as implied by the connection string, this connection only works locally. If you are looking for the connection string than here it is: “Provider=Sqloledb;Data Source=\\.\pipe\MSSQL$MICROSOFT##SSEE\sql\query;Database=SUSDB;Trusted_Connection=yes”

    Read the article

  • Is there a way to determine if a database has been altered, then to push new data to the Application

    - by TeamGB
    All our (my company) currently applications pull information from that database, is their a way to get the following types of databses to either push data or push an event to allow the application to pull data. Access SQL Oracle File systems (Files and folders) The issue today is that most of our application spend a large amount of time constantly looking at databases and file system checking to see if data has changed . It would be better for the database to inform the application when data has changed. Are there tools within Visual studio to allow this or are there tools within the database / filesystem to do this? All ready asked this on stack overflow but go no answer. I've been doing some more research but I cant seem to get any further. My manager has asked to investigate it as it would mean our applications are much quicker and efficient.

    Read the article

  • Multiple vulnerabilities in Pidgin

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2010-4528 Improper Input Validation vulnerability 4.0 Pidgin Solaris 10 SPARC: 147992-02 X86: 147993-02 CVE-2011-1091 Denial of service(DOS) vulnerability 4.0 CVE-2011-2943 Denial of service(DOS) vulnerability 4.3 CVE-2011-3184 Resource Management Errors vulnerability 4.3 CVE-2011-3185 Improper Input Validation vulnerability 9.3 CVE-2011-4601 Improper Input Validation vulnerability 5.0 CVE-2011-4602 Improper Input Validation vulnerability 5.0 CVE-2011-4603 Improper Input Validation vulnerability 5.0 CVE-2011-4922 Information Exposure vulnerability 2.1 CVE-2011-4939 Permissions, Privileges, and Access Controls vulnerability 6.4 CVE-2012-1178 Resource Management Errors vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • why does our network printer not show up on some of our macs, but does show up on others? [on hold]

    - by peter
    We lost power in our building and now cannot get our HP laser jet 5200 to be recognized by half of our computers. We are all Macs, some running OS 10.7.5 can see the printer, others running 10.7.5 cannot, and those running 10.8.5 and 10.9 cannot. We've re-booted the router, turned off and on printer and macs—no go. The printer displays an IP address (dynamically assigned) but we can't access it. Tried to see it using CUPS—same story, can see it on some systems, not on others. Any thoughts?

    Read the article

  • What do you do when one think the code isn't complicated enough?

    - by Chris
    After six months of development on a project, our stakeholders have had a "gut check" and have decided that the path that we've been walking (a custom designed application framework and data access layer) is holding us (the developers) back from quickly developing the features they would like to see. After several days of debate management and the development team have decided to scrap the current incarnation and start over using ASP.net MVC, with Entity Framework as the bases of the a 'quick and dirty', lets just get it done project. In days following, our senior developer who has never worked with MVC or Entity Framework has finally gotten into a sample project and done some work. His take on ASP.net MVC, "this is not software engineering". So my question is this; what do you do, when one doesn't think the code is complicated enough?

    Read the article

  • Overview of XSLT

    - by kaleidoscope
    XSLT (Extensible Stylesheet Language Transformations) is a declarative- XMLbased language used for the transformation of XML documents into other XML documents. Using XSLT , the original document does not changed; rather, a new document is created based on the content of an existing one. XSLT is developed by the World Wide Web Consortium (W3C).   Using XSLT we can transform source xml file into another xml file, word file or Excel file.    XSLT Functions : -   There are the following built - in XSLT functions :   Name Description current() Returns the current node document() Used to access the nodes in an external XML document element-available() Tests whether the element specified is supported by the XSLT processor format-number() Converts a number into a string function-available() Tests whether the function specified is supported by the XSLT processor generate-id() Returns a string value that uniquely identifies a specified node key() Returns a node-set using the index specified by an <xsl:key> element system-property() Returns the value of the system properties unparsed-entity-uri() Returns the URI of an unparsed entity   For more information –   http://www.w3schools.com/xsl/default.asp   Technorati Tags: Ritesh, Overview of XSLT

    Read the article

  • Using "public" vars or attributes in class calls, functional approach

    - by marw
    I was always wondering about two things I tend to do in my little projects. Sometimes I will have this design: class FooClass ... self.foo = "it's a bar" self._do_some_stuff(self) def _do_some_stuff(self): print(self.foo) And sometimes this one: class FooClass2 ... self.do_some_stuff(foo="it's a bar") def do_some_stuff(self, foo): print(foo) Although I roughly understand the differences between functional and class approaches, I struggle with the design. For example, in FooClass the self.foo is always accessible as an attribute. If there are numerous calls to it, is that faster than making foo a local variable that is passed from method to method (like in FooClass2)? What happens in memory in both cases? If FooClass2 is preferred (ie. I don't need to access foo) and other attributes inside do not change their states (the class is executed once only and returns the result), should the code then be written as a series of functions in a module?

    Read the article

  • How to recover disk and files after 10.04 boot failure?

    - by K R Jawaharlal
    I have a 1TB HDD with four Windows XP partitions and a 120GB HDD with 10.04. While working in Ubuntu, due to delay and failure to shutdown, I switched off the system. Next it failed to boot in Ubuntu and stopped at initramfs. After that, I tried to repair from the booting stage. By mistake instead of hdd no I used partition no. This damaged the Windows also. Then Windows XP was reloaded and is running. When I boot with 12.04, it is able to detect the 120GB HDD, but, it is unable to mount. I am unable to access the files. I would like to revive the disk and recover files. Would appreciate any help.

    Read the article

  • Apache FilesMatch regexp: Can it match by the cache buster 10 digit (rails generated) following the filename?

    - by ynkr
    According to the apache FilesMatch docs: The FilesMatch directive provides for access control by filename Basically, I only want to set an expires header for resources that have a 10 digit "cache buster" id appended to the name. So, here is my attempt at such a thing in my httpd.conf <FilesMatch "(jpg|jpeg|png|gif|js|css)\?\d{10}$"> ExpiresActive On ExpiresDefault "now plus 5 minutes" </FilesMatch> And here is an example of a resource I want to match: http://localhost:3000/images/of/elvis/eating-a-bacon-sandwich.png?1306277384 Now obviously my FilesMatch regexp is not matching so I am guessing 1 of 2 things is happening. Either my regexp is wonky or the '?1231231231' cache busting part of the file is not part of what apache considers part of the filename. Can anybody confirm and/or give me a way to cache only those resources that will not persist beyond the next deploy?

    Read the article

  • Is there a way to develop desktop software using PHP?

    - by user1492018
    I have to develop a real estate marketing CRM software for my client - where the application is installed on desktop but can also be accessed from web. 2 reasons why they want the application to run from desktop : So that it can work with/without internet connection They don't want their complete data to be online They want to access few of the data like property listing & inquiries (managed from desktop application) from their website through secure login & password. The data that is entered in desktop application should be automatically synchronized with the website application. I was wondering if there is a way to develop this kind of software using PHP & MySQL. If yes, it will be great if anyone can provide me the referral link.Else please suggest, which language should I use.

    Read the article

  • possible to use an IP derived from Dynamic DNS in htaccess IP allow/deny commands?

    - by user115745
    On a website I manage, I want to use an .htaccess file to allow access to a certain administrative directory only from my home IP address, which is dynamically assigned by my ISP and therefore changes -- not regularly, but it does happen. I also have an account from DynDNS and have one of the auto-update clients making sure it always points to my actual home IP address. I don't actually host anything at home; I just have set up the Dynamic DNS account. Is there any way to combine these features: that is, is it possible write the .htaccess allow/deny commands at my outside webhost in a way that my home IP address is not hard coded into the command, but instead is somehow derived from the Domain Name that the DynDNS has assigned me, by doing a real-time lookup every time the directory's .htaccess file is hit? Thank you.

    Read the article

  • How to completely remove Ubuntu?

    - by les02jen17
    I installed Ubuntu using Wubi installer, but I couldnt boot to it. So I uninstalled it on the Control Panel. Then I tried the full installation wherein it boots to the Ubuntu environment. After installing Ubuntu there, I couldnt boot to my Windows 7 anymore! So in an attempt to salvage the whole thing, I inserted the Ubuntu CD again and chose Erase Ubuntu and Reinstall. (I was wondering, why wasn't there an option to just "Erase Ubuntu"?) I did that though, and I got my Windows 7 back. But upon checking my drives via the "Create your own partition scheme" (not sure if it's the exact words) I saw that one of my partitions still has Ubuntu on it, and there's no way I can delete it if I don't overwrite another Ubuntu! I can't access that partition on windows 7 either! Need help!

    Read the article

  • session persisting problem after system restart

    - by user100124
    Is there a way to prevent session id restore on startup/restart of user's system? We are using a asp.net app and I am able to login and access the site. For the first time session id is created and stored in cookies. Problem: But if I restart my system without signing out, the session is still alive. How can I prevent this? from server side. I can try to delete cookies but it is not practical, as each user will have different preferences.

    Read the article

  • "An upgrade from 'precise' to 'oneiric' is not unsupported with this tool" error while upgrading

    - by tas
    A brief electrical outage interrupted my 12.04 upgrade. After many tries, which included trying to upgrade from a command line, I was able to access Ubuntu screens again. I find that the 12.04 upgrade was indeed not completed; I am still running 11.10. However, Update Manager does not give me the option of installing 12.o4 now. And, when I run Update Manager, I am asked if I want to execute a "partial install." When I answer "yes," I receive the message above. Besides a clean install, any ideas about what can I do to upgrade to 12.4?

    Read the article

  • Desktop Fun: Ocean Life Wallpaper Collection

    - by Asian Angel
    Our oceans are full of beauty and wonder, a separate world waiting for us to explore its’ mysteries and stir our imaginations. Bring the wonders of the underwater world to your desktop with our Ocean Life Wallpaper collection. Note: Click on the picture to see the full-size image—these wallpapers vary in size so you may need to crop, stretch, or place them on a colored background in order to best match them to your screen’s resolution. What is a Histogram, and How Can I Use it to Improve My Photos?How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is Compromised

    Read the article

  • How do I create a wireless ad-hoc network?

    - by Vinaychalluru
    Hello., Whenever i need to copy some files and couldnt find a pen drive, [ i dont have bluetooth enabled in my lap], I create a new ad hoc (wireless) network in windows and share the necessary files on the network and share files with the other system. Now, i want to do the same with Ubuntu. But, i couldn't. I could create a new network, but i am not able to chare or send or even dont know how to access the system connected to the network. So, how can i do this? Thanks

    Read the article

  • Unlock the Value of Big Data

    - by Mike.Hallett(at)Oracle-BI&EPM
    Partners should read this comprehensive new e-book to get advice from Oracle and industry leaders on how you can use big data to generate new business insights and make better decisions for your customers. “Big data represents an opportunity averaging 14% of current revenue.” —From the Oracle big data e-book, Meeting the Challenge of Big Data You’ll gain instant access to: Straightforward approaches for acquiring, organizing, and analyzing data Architectures and tools needed to integrate new data with your existing investments Survey data revealing how leading companies are using big data, so you can benchmark your progress Expert resources such as white papers, analyst videos, 3-D demos, and more If you want to be ready for the data deluge, Meeting the Challenge of Big Data is a must-read. Register today for the e-book and read it on your computer or Apple iPad.  

    Read the article

< Previous Page | 622 623 624 625 626 627 628 629 630 631 632 633  | Next Page >