Install OpenBSD to Secure Your Web Server
he OpenBSD team prides itself on producing one of the most?if not the most?secure operating systems in the world. If you are concerned about keeping the sensitive data within your
he OpenBSD team prides itself on producing one of the most?if not the most?secure operating systems in the world. If you are concerned about keeping the sensitive data within your
he Spring framework, a lightweight open source J2EE container previously featured on these pages, is about to introduce a significant new feature as part of its already impressive offering. With
Be careful how you assign data members during initialization. For example, consider the following code: class test{ public: test (int y) : j (y), i(j) { } private: int i;
Suppose you have a table and you need to give styles to all the tags. Using inheritance to do this helps you avoid generating more content to be delivered to
Assume that an application creates a new table every month. The table name can be coined using some pattern, like sales0501, sales0502,, etc. To identify whether a particular table exists
Suppose you have a user control named TestControl in your .aspx page. Further, suppose that TestControl contains a textbox named txtFirstName. To access txtFirstName in your aspx page using JavaScript,
Follow these simple steps to perform a telnet operation from a Java application: Download the free API, jta20.jar. Set the file in the classpath: public class TestTelnet{ public static void
t was the final night of the SD West conference in Santa Clara, CA, as attendees wandered the hotel, seeking the locations of the different BOF (bird of a feather)
or several years now, the use of affiliate networks in e-commerce has grown tremendously. Amazon, the vanguard of this technique, and many companies like it allow anyone who can consume
any applications need to update their components based on information input coming from a single source. It’s often important for these applications to maintain consistency among these components at any
harePoint Portal Server’s search engine is one of its most powerful features, able to search file shares, Exchange public folders, Notes databases, and Web sites; however, the results you get
ew serious applications are considered enterprise-worthy without a core database engine backed by an extensive, normalized, and optimized relational database architecture. Traditionally, such database applications rely on SQL queries and
hen developers connect to a database with JDBC, they receive a plethora of information about the database and any ResultSet objects that they might create using the database connection. This
he first part of this article described how to build the Nano-Sheets spreadsheet engine, and then extended it by adding the following features: Dynamic generation and sizing of cells Automatic
A good way to concatenate strings in a loop or when performing multiple concatenations, is to use the StringBuilder class: String s = “a”s+=”b”; //this is slowStringBuilder sb = new
There are two ways to convert the objects between two different class types. Define a constructor in the target class, which takes an argument from the source class type: class
This code segment returns all the locales supported by the Java Runtime: // ListSupportedLocales.javaimport java.util.*;// other code to go here.Locale[] localeList = Locale.getAvailableLocales( ); for (int i=0; i
Assume Each GridViewRow contains Field1, Field2,…. Button: . . . To access the other items in the same row from inside the button click event, you need to find the
t’s time again to open up your developer’s toolbox and make room for the new must-have tool, virtual machines. As a software consultant, I find myself traveling from customer to
ately I’ve come to notice that no other programming term has more definitions than declarative programming. In this article, I will attempt to explain declarative programming in terms of how
hose new to ColdFusion may be disappointed to find a weaker array of datastructures than those supported by other languages they have used for Web programming, such as Java and
mong the many new features in the forthcoming .NET 2.0 are the revamped System.Configuration namespace and the Visual Studio 2005 configuration editor. The new classes raise configuration for both desktop
he changes to Java’s security implementation have made it more robust and introduced more programmatic hooks for developers to add to Java’s default security mechanisms. Oddly, even with the introduction
ccording to its Web site, Hibernate is a “powerful, ultra-high performance object/relational persistence and query service for Java.” And they’re not just blowing smoke. Hibernate is a key player in
ne of the key tenets of .NET is that it makes developers more productive. And this is basically true?it is easier to build applications, including Web applications. You can build
Use Ctrl+E+C to comment selected text in web.config or the codebehind file. Use Ctrl+E+U to uncomment selected text in web.config or the codebehind file. Note: Neither key is case sensitive.
This tip provides a way to append the items on a dropdown menu?even when the control is binded with the datasource. Assume that the dropdown menu will be showing a
Sick of initializing and assigning values to the base class’s data members? Absolve yourself of this responsibility by overloading the copy constructor and the assignment operator in the derived class.
Suppose you need to make a program to send emails. However, you need the emails to contain attachments, the names of which will be generated when the attachment file has
Many applications require some of their attributes to be initialized much before the application is made available to the user or before it can process a request. Suppose you’ve got