(Lymington) This DLL provides routines to manipulate UTF-8 encoded XML files. The set provided is not all-singing-and-dancing but a useful, small collection. Several co-operating executables, living off a common UTF-8 encoded XML file, may find their operating parameters and set parameters for other
Author: SSWUG Research
Install Oracle RAC 10g on Oracle Enterprise Linux Using VMware Server
(Vincent Chan) Introduced at Oracle OpenWorld 2006 in October, Oracle Unbreakable Linux aims to offer enterprise-class support services for Red Hat Linux, quicker bug fixes, and a significantly lower support prices. And Oracle’s own Enterprise Linux, which is based on Red Hat Advanced Server Release
Transaction And Locking Modes
(Assaf Arkin) In order to understand how the JDO transaction model affects applications performance and transactional integrity, you must first understand the semantics of the Java Data Objects. Java Data Objects are objects loaded from and stored to the database, but are disassociated from the data
Demonstrating the Consequences of Cross Site Scripting (XSS) Vulnerabilities
(Nitesh Dhanjani) High risk vulnerabilities such as SQL Injection can be easily demonstrated by security analysts to developers or business executives. For example, a xp_cmdshell request injected into an application vulnerable to SQL Injection can be used to demonstrate how an attacker can abuse SQL
Personalize ASP.NET 2.0 sites with profiles
(Tony Patton) Personalization is a key component of most Web applications these days. TechRepublic and Amazon are good examples of sites that remember certain user attributes. Providing such functionality with ASP.NET 1.x required some extra work and the use of the Session object, but version 2.0 si
The Only Data Access Layer You’ll Ever Need?
(Paul Kimmel) Audacity and hyperbole are great attention grabbers. Do I really think the data access layer (DAL) I discuss in this article is the only one you will ever need? In a sense, yes. The sample in this article can work in most situations, so you may not have to spend much time in the future
The SqlDataSource Control in ASP.NET 2.0
(Praveen Kumar) In earlier version of ASP.NET 1.x we have to write data access code to generate the rowset of data that we want to use in our pages. However with the induction of data source control this task of fetching data is much easier.
SQL Server 2005 Integration Services – Part 39 – Send Mail Task
(Marcin Policht) Following presentation of the most popular Data Flow transformations in SQL Server 2005 Integration Services, we are revisiting the topic of Control Flow tasks, in order to make our coverage more complete. Among the most common tasks that have not yet been discussed in our series is
FIX: You may receive an access violation error message when you import data by using the ‘Bulk Insert’ command in SQL Server 2000
When you import data by using the Bulk Insert command in Microsoft SQL Server 2000, you may receive the following access violation error message: ODBC: Msg 0, Level 19, State 1 SqlDumpExceptionHandler: Process 53 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is termi
Relational Databases 101
(William R. Vaughn) Many of my readers come from backgrounds that don’t include formal training on the best ways to design and create efficient, business-class relational databases. If you arrive here with Microsoft Access or FoxPro experience, you’re at an advantage—you know that, for the most part
