Security for the global Internet
Introduction In this article I’ll move away from COM security to provide an overview about that vast subject generally referred as “Internet security”. As you will see, providing an effective
Introduction In this article I’ll move away from COM security to provide an overview about that vast subject generally referred as “Internet security”. As you will see, providing an effective
By taking advantage of the functionality of two Microsoft Message Queuing libraries, you can minimize the time it takes to create MSMQ objects during testing or deployment of your messaging
Object and component technology has brought us a way of composing new functionality of existing parts. MTS and COM+ has extended this to include transaction handling. But can we, with
INTRODUCTION In my latest article here at VB2TheMax, I showed my code structure for COM+ components (Example of code structure for COM+ component) in preparation for a couple of debug
Trying to figure out how to use the Oracle OLE DB Provider under MTS or COM+ and with Oracle’s OS Authentication? This article explains how these parts fit together and
Introduction In my previous article [1], published atVB2TheMax site, I’ve described briefly how COM+ security and role-based securitywork. I promised you to discuss in the next article about web/IIS security;still
was studying the excellent Francesco Balena book, “ProgrammingVisual Basic 6.0,” edited by Microsoft Press, the cost of which iswidely compensated by both the book and the enclosed CD contents—:when Iran
In this article I show you my ordinary code structure for COM+ components. I show this in preparation for further articles about debugging tips. When I show this example, I
When you use JIT activation in particular there is a special situation that you have to be prepared for. While discussing that issue, I will also show a trap when