(Ed Tittel) As we mentioned in the preceding tip, you can learn a lot about XML in the Windows environment by executing the following command sequence on any modern Windows (2000 or newer) desktop or server PC: cd c:dir *.xml /s >> xmlfiles.txt (R)
Author: SSWUG Research
MustInherit and NotInheritable in VB.NET
(Dan Mabbutt) Rather than being just “Object Oriented,” VB.NET is totally object driven. In VB.NET, everything is an object. Even variables. One way to get the total impact of this is to simply glance at the complete, expanded class view of a standard VB.NET form. There are thirteen levels of inheri
Get Control
(David Baum) The trend is inescapable: Networks get faster, computers get more powerful, clustering technologies get more effective, and storage devices get more efficient. These advances pave the way for software applications that are more capable and intelligent, automating a diverse array of busi
Online restore feature in SQL Server 2005
(Greg Robidoux) Microsoft has added its new online restore option to SQL Server 2005, which allows you to restore a backup while the database is still online. In the past you needed exclusive access to the database in order to restore, but that’s not the case with SQL Server 2005. Before you get too
The Art & Science of Storing Passwords
(gtamir) Almost every website nowadays needs to maintain a list of users and passwords. Many multi-user applications require a way to authenticate users, and passwords seem like a natural.
The basics of asynchronous processing
(Julian Skinner) In Windows Forms applications, we often need to perform some complex processing in the background, while still continuing with other tasks, such as monitoring user input and updating the user interface. For example, if you think of a web browser, it fetches and renders a web page wi
Authentication and Authorization in ASP.NET
(Joydip Kanjilal) Authentication is the process of identification and validation of a user’s credentials. After the identity is authenticated, a process called authorization determines whether that identity has access to a particular resource. This article discusses both these concepts in detail.
APAR update for the zIIP specialty engine
(Willie Favero) Over the last few months I have made a few posts about the zIIP specialty engine that DB2 V8 will be able to take advantage of. (See post 01/24/2006, 02/01/2006, 02/09/2006, 02/23/2006, and 04/27/2006). This post is an update on the enablement APARs.
Data Encryption/Decryption using RijndaelManaged and PasswordDeriveBytes classes
(Nidheesh T Mani) This article gives an insight into Symmetric Encryption and how it can be implemented in .Net. In the sample explained below we are using the Rijindal symmetric encryption algorithm, which is available in System.Security.Cryptography name space.It also illustrates the making of s
Report Solution Patterns and Recipes: Greenbar Reports
(Paul Turley) As we have endeavored to solve various business problems, we’ve learned to do some interesting things with Reporting Services. On consulting engagements, I often find myself in front of a client who is asking questions like “can you do this or that?” Almost inevitably, the answer is “y
