(Bipin Joshi) Developers often store confidential information in the configuration files. Database connection strings, user names and passwords are some of the examples. One of the requested feature during ASP.NET 1.x days was to provide some way to easily encrypt and decrypt such information. Thank
Author: SSWUG Research
Deconstructing the Visual Basic Upgrade Wizard
(Bill Sempf) Now that the Visual Basic 2005 honeymoon is over, more developers than ever are looking at their situation and realizing that we have millions of lines of Visual Basic code to convert to 2005 if we expect to utilize the new features of contemporary Windows versions. The Visual Basic Upg
Integrate XML Into Your Reporting Environment
(Bill Wolff) SQL Server Reporting Services is fast becoming the mainstay for custom reporting in Microsoft-based shops. Connecting to relational tables, views, and procedures is easy and productive, and with version 2005 you have new data source options for multidimensional queries (Analysis Service
Oracle CSO Lambastes Faulty Coding
(Jeremy Kirk) Mary Ann Davidson, chief security officer for database giant Oracle, remembers the first time she heard her company’s marketing scheme that advertised its database products as “unbreakable.”
Config file processing with LibXML2
(David Dougall and Nicholas Chase) XML is a great choice for well-developed, highly interoperable applications and, as such, it is becoming more and more common both for data storage and for configuration file management. This article explores an example application that uses XML (Extensible Markup
A Code Protection Framework For .Net
(S. Ying) A software developer may find it necessary to “sell” some of his/her valuable mental skills and labor directly or indirectly to someone in order to make a physical and resulting mental living. The difference is in the “someone”, be it his/her boss, a movement/cause or middle/end customers.
Checking All CheckBoxes in a GridView
(Scott Mitchell) A common website user interface pattern is a list of items with a checkbox in each row. The archetypical example is the web-based email client, which allows a series of messages to be selected by checking that email’s checkbox. Once one or more emails have been selected, the user ca
Relational Databases for Querying XML Documents: Limitations and Opportunities
(Jayavel Shanmugasundaram, Kristin Tufte, Gang He, Chun Zhang, David DeWitt and Jeffrey Naughton) XML is fast emerging as the dominant standard for representing data in the World Wide Web. Sophisticated query engines that allow users to effectively tap the data stored in XML documents will be cr
Understand Oracle 10g’s new Hierarchical Query options
(Scott Stephens) Oracle 10g adds new pseudo columns to the SQL Hierarchical Queries that use START WITH . . . CONNECT BY . . . clauses. For more than a decade, Oracle SQL has had the ability to cause a query to follow a hierarchical relationship. For instance, you could specify a starting condition
An Alternate Method for Installing DB2 V8 on UNIX Platforms
This article describes how to install and configure DB2 Version 8 on UNIX platforms without using the “db2setup” command, as described in the “DB2 Quick Beginnings” manual. There are two good reasons for using an alternate method. (pdf)
