devxlogo

VB-2-the-Max

Security for the global Internet

Introduction In this article I’ll move away from COM security to provide an overview about that vast subject generally referred as “Internet security”. As you will see, providing an effective

Automate MSMQ Object Creation

By taking advantage of the functionality of two Microsoft Message Queuing libraries, you can minimize the time it takes to create MSMQ objects during testing or deployment of your messaging

MTS black box or white box perspective

Object and component technology has brought us a way of composing new functionality of existing parts. MTS and COM+ has extended this to include transaction handling. But can we, with

COM+ centric Assert

INTRODUCTION In my latest article here at VB2TheMax, I showed my code structure for COM+ components (Example of code structure for COM+ component) in preparation for a couple of debug

Oracle OLE DB and MTS

Trying to figure out how to use the Oracle OLE DB Provider under MTS or COM+ and with Oracle’s OS Authentication? This article explains how these parts fit together and

COM(+) Security: Follow-up

Introduction In my previous article [1], published atVB2TheMax site, I’ve described briefly how COM+ security and role-based securitywork. I promised you to discuss in the next article about web/IIS security;still

Forms, Formats, and Contents

was studying the excellent Francesco Balena book, “ProgrammingVisual Basic 6.0,” edited by Microsoft Press, the cost of which iswidely compensated by both the book and the enclosed CD contents&#151:when Iran

Example of Code Structure for COM+ Component

In this article I show you my ordinary code structure for COM+ components. I show this in preparation for further articles about debugging tips. When I show this example, I

An error that must be trapped

When you use JIT activation in particular there is a special situation that you have to be prepared for. While discussing that issue, I will also show a trap when