Plug the Security Holes
We all know to keep the sa password secret and to share it with as few people as necessary. However, users see no problem with registering their server in Enterprise
We all know to keep the sa password secret and to share it with as few people as necessary. However, users see no problem with registering their server in Enterprise
The const qualifier guarantees that the value of an object cannot be changed directly by the program. However, it may be altered asynchronously–that is, by a way unknown to the
You may already know how to replace the default gray form submit button with an image (see Tip “Replace Form Buttons With Images”), but do you know how to replace
The default behavior for a java.awt.TextArea is to scroll the text you enter to the left once the length of the line of text exceeds the displayable area. When this
When you need to process each character in a string, you can assign the string to a byte array and iterate on its elements (remember: each Unicode character corresponds to
Sometimes you want to know if the desktop is in Active Desktop mode-for example, to set an HTML wallpaper. I couldn’t find a function to accomplish this, but this hack
At times, you might want to retrieve the current system font settings, such as the font being used for window title bars, or the menu or message box font. You
When using bound controls, data is updated automatically when you Move to a different record. Data is not updated when you close the form. To ensure that data is saved
When debugging Java Database Connectivity (JDBC) problems, it can be difficult to locate the source of errors. However, one facility that can be used to accomplish this is the logging/tracing