tag:blogger.com,1999:blog-74752580304964248052024-02-19T20:26:22.908+10:00Aakash Sharmaakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.comBlogger961999tag:blogger.com,1999:blog-7475258030496424805.post-63754360991507964822024-02-15T09:47:00.003+10:002024-02-15T09:59:51.911+10:00Azure Updates This Week (Week of February 14, 2024)Welcome to another week of exciting updates from Azure! This week, we have several features moving to general availability and public preview. Let's dive into the latest enhancements across Azure services:Updates Overview:Azure Blob Storage Cold Tier support on Change Feed and Object Replication
Availability: GA
Tags: Storage Accounts, Azure Blob Storage, Features
Summary: Azure Blob Storage Coldakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-65351137091871992202024-01-30T13:07:00.005+10:002024-02-01T09:09:01.726+10:00Navigating the Cloud: A Comprehensive Guide to Azure NetworkingNote: This post was originally posted on medium.Welcome to this series on Azure Networking, where we embark on a journey to explore the intricacies of networking in the cloud. Azure Networking plays a pivotal role in establishing robust connections, securing data, and optimizing performance within the Azure environment.In this series, we’ll dive deep into various aspects of Azure Networking, akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-66590215371479030182024-01-01T09:38:00.091+10:002024-01-30T10:02:23.866+10:00Understanding Reserved Instances: Maximizing Utilization and CoverageCloud computing offers unparalleled flexibility, but optimizing costs can be a complex endeavour. One powerful tool in the arsenal of cloud cost management is Reserved Instances (RIs). This commitment to specific computing resources for a defined duration provides a significant opportunity to lower costs. In the dynamic realm of cloud computing, optimizing costs is paramount. Reserved Instances (akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-84699746383264624992023-12-04T13:29:00.010+10:002023-12-04T13:29:58.212+10:00Comparing Azure Reserved Instances (RI) and Azure Savings PlanAzure Reserved Instances (RI) and Azure Savings Plans (ASP) are both cost-saving options offered by Microsoft Azure, but they differ in some key aspects.
Reserved InstancesInstance Reservation: RIs are essentially commitments made in advance to purchase Azure services for a specific type of virtual machine, within a specific region, for either a one- or three-year term. This commitment assures aakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-2954000164009040852018-08-12T02:07:00.012+10:002021-03-25T23:59:36.167+10:00Azure Event Grid events across Azure subscriptionsConsider a scenario where you need to listen to Azure resource events happening in one Azure subscription from another Azure subscription. A use case for such a scenario can be when you are developing a solution where you listen to events happening in your customers’ Azure subscriptions, and then you need to handle those events from an Azure Function or Logic App running in your subscription. A akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-61224171541296320542018-02-17T01:03:00.005+10:002021-02-15T01:06:23.019+10:00HOW TO TEST AZURE LOGIC APPSAzure Logic Apps are a great solution to write workflows of the business processes, and that too without writing any code. As a result, unit tests can not be written because there’s no code to write unit tests against. How do one go around testing a logic app then?If you’ve been developing logic apps on Azure Portal, you should’ve noticed code view of your logic app. The code view is nothing but akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-59107270567653222602018-01-06T13:18:00.000+10:002018-02-14T12:33:05.044+10:00Blocking Public Access and IPs to Azure Functions
If you're developing a solution with micro services architecture with Azure, there are chances you've been using Azure Functions to develop a service. For example, If you're solution can involving sending email alerts. One of the microservices here can be Email Service. This can further be broken down into two micro services. One to enqueue mail message to Azure storage queue. This can be a Httpakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-49555503200649181812014-05-18T23:33:00.001+10:002014-05-18T23:33:50.589+10:00Azure Webjobs - light weight web worker roles
Azure websites Webjobs are currently in preview and they are nice way to have some light weight background
processing for your websites. You might have faced scenarios where you would have spin up threads to perform some background tasks in your website. That's not an ideal way so you used to have another option of having PaaS worker roles, but do we really need them for small tasks such as akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-65776293850159234772012-10-10T22:45:00.001+10:002012-10-10T22:45:04.473+10:00Moving database connection string to azure service configuration (cscfg)
While working with
ASP.NET web sites/projects we normally keep our database connection string in
Web.config. However, while working in Azure, it's a good idea to keep this
configuration in the service configuration itself as it will be easier to
change the connection string once you have deployed your azure service and this
will prevent the need of redeployment.
Also, while working
with akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-43674239258197881562012-10-01T14:37:00.000+10:002012-10-01T15:39:22.105+10:00An ASP.NET Picasa Image Gallery
Few days back
I was thinking of creating an Image Gallery of the collection of photos I have.
Although, there are multiple options available over the internet that you can
download and get ready on the go; most of them involves saving the images on
your own server. But what I was more concerned was to just have a display only
image in my web site to showcase my photos to the word. And, I wantedakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-2770624069346209402011-05-19T08:42:00.001+10:002011-05-19T08:50:16.690+10:00Display List of Uploaded Azure VM Role vhd images in a listI just posted a sample on MSDN for displaying the list of base vhd images uploaded to Azure Portal, for Virtual Machine (VM) Role.
You can get the list of uploaded vhds simply by running the following command in command prompt
csupload.exe Get-VMImage -Connection "SubscriptionId=xxxxxx-xxxxxx-xxxxxx-xxxxxx;CertificateThumbprint=xxxxxxxxxxxxxxxxxxx"
Thus making use of Get-VMImageakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-49528748209887880372011-03-10T16:51:00.003+10:002011-03-11T06:44:54.594+10:00csupload issue on 32 bit machines : Azure SDK 1.4 FixMany of you might have encountered an issue while uploading your VM Role base image via csupload from a 32 bit machine.
The issue has now been resolved with the new release of Azure SDK 1.4. Now csupload can be used from x86 platforms too.
There are many more additions to the Azure SDK 1.4, mainly including Windows Azure COnnect and Content Delivery Netwrok (CDN). akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-55224499903731955562011-03-02T06:45:00.001+10:002013-03-28T09:59:34.395+10:00Installing Tomcat in Windows Azure
There are few options already available to install Tomcat on Windows Azure, which involve running some scripts that create a package and definition file for you that you can deploy to Windows Azure. However, i personally feel that we have a much easier solution for installing Tomcat.
The solution that i am discussing here makes use of the startup tasks in elevated privileges, which were akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com5tag:blogger.com,1999:blog-7475258030496424805.post-70913853745139735942011-02-07T07:50:00.002+10:002011-04-19T21:51:20.705+10:00Changing Drive Letter of an Azure Drive (aka X-drive)Sometimes it might be necessary that you want your Azure drive to be always mounted on a fixed drive letter. Consider a scenario of an Azure VM Role where you need to mount an azure drive for data persistance and your VM demands the same letter for you azure drive, e.q. you installed SQL Server on your VM Role and for mdf files you specified azure drive as path so as to make the data persist.
akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com3tag:blogger.com,1999:blog-7475258030496424805.post-42907457669244490412011-02-07T07:47:00.000+10:002011-02-07T07:47:53.840+10:00Mounting Azure Drive in Azure Virtual Machine (VM) RoleMounting an Azure Drive in Azure VM Role can be beneficial in many scenarios. As we all know that Azure VM Role is not persistent, so once you deploy a VM Role and it is restarted, all the data that was not the part of the base image is gone.
As we already know from a previous post that in a VM Role data is not persistent between restarts or hardware-failures, we need to identify a way to akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com1tag:blogger.com,1999:blog-7475258030496424805.post-8562166397690304542011-02-07T07:28:00.001+10:002011-02-07T07:48:10.343+10:00Data Persitence in Azure VM RoleAzure VM Role involves creating a base image, uploading it to Azure using csupload, and then creating a servic model in Visual Studio to point to the uploaded base image.
Once Azure VM Role is deployed, it creates a new drive with letter D: and name it Resources. A shortcut to this drive is added to your C: drive (Windows Drive). Once you restart the machine the data on drive D: would be akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com1tag:blogger.com,1999:blog-7475258030496424805.post-61116455053017584612011-01-22T05:33:00.000+10:002011-01-22T05:33:11.565+10:00Unable to connect to Azure VM Role for a long time after it is Deployed or RestartedI have been really frustrated in waiting for days to log in to my VM Role instance via RDP. I have encountered this issue multiple times. Once a VM Role is deployed or it is restarted, we can not login via RDP for a long period, and it takes a lot of time, sometimes 2-3 (random) days once it is back and allows us to connect via RDP.
Reason
This issue occurs due to a problem with the Azure akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-38143667243381196922011-01-21T04:50:00.001+10:002011-03-11T06:55:03.388+10:00Startup Tasks in Azure Virtual Machine (VM ) RoleSince the release of Windows Azure SDK 1.3 we can now have startup tasks defined in the ServiceDefinition file for web/worker roles. However, this is not allowed for a Virtual Machine role. So what to do in case you need to have some tasks/scripts to be run on your VM Role’s startup? For example, your VM Role runs some software applications that require some configuration information that can beakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com3tag:blogger.com,1999:blog-7475258030496424805.post-56221039306024106922011-01-06T01:58:00.000+10:002011-01-06T01:58:15.771+10:00Azure VM Role CSUPLOAD Error 0x80070070 Cannot prepare VHDToday I was trying to upload my base image to Azure via csupload so that i can attach this vhd to one of my virtual machine (VM) role. However, I got a strange error with no details. I kept on looking for the reason and finally I found the solution.
The error was as below:
Unexpected Error 0x80070070Cannot prepare VHD C:\Users\user1\Desktop\baseimage.vhd
Reason:
The reason for this error as i akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-80191795908323537872010-12-01T19:36:00.001+10:002011-01-06T07:12:23.554+10:00How to enable Remote Desktop for your Windows Azure RolesThe latest Azure SDK 1.3 makes it possible to login to the VM of your web/worker role instances via Remote desktop. So you are not limited to use VM Role in case you need to establish a RDP connection to your VM.
This helps you to monitor the error events that occur in your events, also you can install small softwares, copy few files etc, though it is recommended to use Startup tasks with akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-14566040107163405132010-11-16T16:39:00.001+10:002010-11-16T16:40:30.425+10:00Active Directory Domain Join of Azure Roles Using ConnectWe already have seen how Windows Azure connect can help us in connecting our windows azure role instances to our local computers in the previous post. We also saw in the use cases/scenarios for azure connect, that we can domain join our windows azure roles with our on-premise Active Directory, and this is possible by using connect plug-in.
This is a very useful feature provided by Windows Azure akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com1tag:blogger.com,1999:blog-7475258030496424805.post-59468346509744269082010-11-16T01:23:00.003+10:002010-11-16T16:39:59.618+10:00Guide to Windows Azure ConnectBuilding applications for cloud and hosting them on cloud is one of the great things that happened in recent times. However, you might be having number of existing applications that you wish to migrate to cloud, but you do not want to move your database server to the cloud. Or you want to create a new application and host it in the cloud, but this new application needs to communicate with your akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com2tag:blogger.com,1999:blog-7475258030496424805.post-20142713401660604362010-10-26T16:43:00.001+10:002010-10-28T08:22:56.855+10:00Cap your SQL Azure Database Automatically: Limit the SizeYou might already be aware that you can set an upper limit for your SQL Azure Database. This way we can specify that your database size should not grow beyond this upper limit, to avoid being billed without your knowledge. Not only this you will not be billed based on your cap size, rather you will be billed on the basis of the storage you are currently using. You will be charged for the range akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-43283596921973479762010-10-05T04:54:00.000+10:002010-10-05T04:54:16.349+10:00HTTP Error Code: 400 Message: No tenant signing key of type X509 certificate is provisioned.After the September release if you are configuring your service namespace as per old method you might get following error:
HTTP Error Code: 400
Message: No tenant signing key of type X509 certificate is provisioned.
Trace ID: 2c46fa55-8ae8-443b-9f8a-ab885593c3fb
Timestamp
This is caused because your token signing certificate is not configured properly. In order for Federation Metadata to akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-52186383530214097752010-09-22T05:08:00.002+10:002010-10-28T08:23:35.086+10:00What is Relying Party (RP)An application that accepts tokens from an STS is called as a Relying Party (or RP). In modern scenarios, web applications use WIF and accept tokens from an STS to manage authentications process.
These tokens acts a proof that user has been authenticated by our application. Thus, our application relies on an external service i.e. an STS to provide Access Control and thus our application is akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-55793171291345183292010-09-22T05:05:00.002+10:002010-09-22T05:14:43.136+10:00What are ClaimsThe security tokens generated by STS contain various attributes based on which a grant/deny access is provided or based on which user experience is customized. These attributes are called as Claims.
A claim can be a user name, user’s email, it can even be permissions such as canWrite, canRead etc or it can be roles or groups to which the user belongs. When an STS generates a token, it embeds akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-69848882098805201062010-09-22T04:38:00.003+10:002010-09-22T05:10:52.838+10:00What is Security Token Service (STS)Traditionally, access control was implemented within the main application by writing a code against user’s credentials to authenticate them and based on their attributes grant/deny access to various resources. This required application developers to be skilled in implementing security and writing a code which is hard to implement and maintain.
Due to Windows Identity Foundation (WIF) all this akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-38208215948142192592010-09-20T21:29:00.002+10:002010-09-20T21:30:29.405+10:00AppFabric ACS Exception: A potentially dangerous Request.Form value was detected from the client (wresult="<t:RequestSecurityTo...")AppFabric ACS Exception : A potentially dangerous Request.Form value was
When you are working with AppFabric ACS labs and implement identity providers such as Windows Livefollowing error might show up when you try to run your application
A potentially dangerous Request.Form value was detected from the client (wresult="<t:RequestSecurityTo...").
This error occurs because ACS sends you a SAMLakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-32877654809207568842010-09-20T18:52:00.001+10:002010-09-20T18:53:30.716+10:00AppFabric ACS September release is announcedWell, i was just over with integrating AppFabric ACS with windows azure cloud app, using the August release, and now i hear that September release is out.
September release of AppFabric ACS contains incremental updates including support for OAUth 2.0 Web Server, additional support fpr X.509 certificates, ability to upload WS-Fed metadat through portal, expanded support for machine keys.
You canakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-29718828584161730522010-09-16T03:10:00.000+10:002010-09-16T03:10:01.791+10:00Hosted first AppFabric ACS Labs integrated App on AzureAfter all initial hiccups and with the help of MSDN forums and Justin Smith and Vittorio Bertocci's Blogs i have been able to integrate my web role with AppFabric ACS Labs.
What i implemented is just Single Sign On with Windows Live ID. Yes, only one Identity Provider, though i could have opted for Facebook Connect, Google and Yahoo too.
My next target is to implement ADFSv2 with Appfabric ACS akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-83870471040451358392010-09-15T20:34:00.005+10:002010-09-22T05:34:42.032+10:00What is Passive FederationWhen i started working with ACS on Appfabric I kept on encountering various terminologies, one of them was Passive Federation and it was widely used. I could understand the term Federation but passive was not clear to me ever.
So, I did some research and finally got an answer by Vittorio at Vibro.net .
The term Passive refers to all those requests that are made by a requestor which is not akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-85294275854783987812010-08-13T23:13:00.000+10:002011-12-04T23:20:33.398+10:00Lock held by distributed in doubt transactions for some transaction id
If you will get an error like this "locked held by distributed in doubt transactions for some transaction id". Please follow the following steps to recover from locking.
Try to find out the locked transaction id from the server error logs.
Execute select * from dba_2pc_pending in DB console. You should be able to see the particular locked transaction Id under "local_tran_id" column, and "Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-54654010950405133332010-08-11T06:30:00.000+10:002010-08-11T06:30:08.396+10:00Microsoft Windows 7 PC better than MAC
Windows 7 powered PC is better than Mac. I agree with this new campaign that Microsoft has started. Microsoft added a new section to their Windows 7 site titled "PC vs Mac".
It's the first time i have seen Microsoft going this way of directly marking their products as better than those of their competitors. Apple has been doing this for past 4-5 years in more than 60 campaigns targeting "akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-20631090068328638132010-07-20T04:45:00.003+10:002010-07-20T05:00:01.735+10:00BEA-010061 Error in deploying MDB in weblogic 10Error Details: <EJB> <BEA-010061> <The Message-Driven EJB: testingMDB is unable to connect to the JMS destination: Queue_use1. The Error was: Cannot get destination information. The destination JNDI name is Queue_use1, the provider URL is null>It was showing “Not connected” in weblogic user interface also.Platform Details: Developing a Message driven bean in eclipse 3.4.2 and Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-52295587420057540082010-03-19T06:09:00.003+10:002010-03-19T06:24:25.415+10:00Restricting access to pages such as AllItems.aspx, EditForm.aspx in MOSSIn Moss 2007 we have the pages such as AllItems.aspx which are used to view the contents of a List or a document Library. Similary, the page AllForms.aspx is used to view all the Forms in a Forms Library. So as we have other pages Editform.aspx, DispForm.aspx.Now if you have enabled anonynmous access on your system, then these forms are viewable for all the users, no matter if they are registeredakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-7872531329614046512010-03-02T06:43:00.004+10:002010-03-02T07:11:22.681+10:00VSTS: Failed to queue test run Error : Unable to find assembly SmartdeviceDuring my stint with Load Tests in Visual Studio Team System, I was able to successfully run my Load Test, but after i configured the Rig and edited the configuration file i started getting following error whenever i ran the test.Failed to queue test run Unable to find assembly 'Microsoft.VisualStudio.SmartDevice.TestHostAdapterAfter trying various things i finally found out it has to do with theakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-21843604163180527682009-12-26T21:13:00.003+10:002009-12-26T21:20:15.526+10:00ITSM 7.5 SLM Status throws HTTP 500: exception - Bad version number in .class fileAgain with BMC ITSM 7.5 I faced a new issue. From the incident management console, if you open an incident to view it, then under SLM Status section, instead of showing a graphic, it is pulling back a web error – HTTP 500:exception javax.servlet.ServletException: Servlet execution threw an exceptionroot cause java.lang.UnsupportedClassVersionError: Bad version number in .class fileakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-63496819176380121512009-11-30T02:12:00.004+10:002009-11-30T02:23:46.875+10:00Non Root user access to ports 80 and 443 in Sun Solaris UnixWhile trying to build the web server for our BMC Remedy AR Server System to host mid-tier over Tomcat I encountered this problem. As we are using a non-root user for installation of BMC PRroducts such as Mid-Tier and RKM on our web server, we need to start tomcat using the same non-root user and that too over the ports 80 for http and 443 for https.But when on Sun Solaris 10 system or any other akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-9927371883529107402008-06-01T05:45:00.002+10:002008-06-01T05:53:37.164+10:00Restore Deleted Files or FoldersHow m any times it has happened to you that you have deleted a file or a folder and then realised later that you really need it. That's the time when you feel really helpless and scold yourself of deleting it. Only thing that you want that time is to recover it by any means possible.There are good news for you if you are using Windows Vista. It is very easy to recover if you accidentally delete akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-64830206014108346692008-04-06T03:35:00.002+10:002008-04-06T03:48:28.640+10:00Access tables from different databases in SQL ServerThis article will explain how can you join tables from different databases. Suppose you have a table Table1 in Database DB1 and other table Table2 in DB2 on the same servers and currently you are using Database DB1 then to access the Table2 you can simply prefix it with DB2..Note the two dots after the Database name.For example,SELECT * FROM TABLE1 JOIN DB2..TABLE2ON TABLE1.KEY = DB2..TABLE2.KEYakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-22455479962230836752007-12-21T21:11:00.000+10:002007-12-21T21:15:34.970+10:00Introduction to XML Web ServicesXML web service can be defined as a unit of code that can be invoked via HTTP requests. Unlike a traditional web application, however, XML web services are not (necessarily) used to emit HTML back to a browser for display purposes. Rather, an XML web service often exposes the same sort of functionality found in a standard .NET code library. Not only a Web based application but a console or akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-83130166524825384012007-08-21T23:39:00.000+10:002007-08-21T23:49:49.772+10:00solution for "Validation of viewstate MAC failed" in ASP.NET 2.0If you are having a large page that uses lot of time to load and you are using built-in databound controls such as GridView, DetailsView or FormView which utilize DataKeyNames then there may be the cases whenever you perform a post back before the page loading is complete you get the follwoing error:[HttpException (0x80004005): Validation of viewstate MAC failed. If this application is hosted by akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-39781821880891159152007-08-08T22:59:00.000+10:002007-08-09T07:25:53.624+10:00Exception Handling in SSIS Script TaskIn SSIS Script Task you can use the same Structured Exception Handling (SEH) as in normal VB.NET or C# code. Using this Structured Exception Handling you can catch specific errors as they occur and perform any appropriate action needed like letting the user know about what kind of error occurred, or logging the error or to perform some specific plan of action depending on the error.In SSIS Scriptakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-410823079730260462007-08-07T20:04:00.000+10:002007-08-07T20:07:23.072+10:00Debug SSIS Script ComponentWhile working with your SSIS package, have not you ever tried debugging a script component transformation by putting a breakpoint in the VB code? Well, i did and found that, unfortunately, it does not work.On the other hand we are able to debug a script task using breakpoints in the same way as we do in Visual Studio IDE. But now how we go ahead with debugging a script component?The only options akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-8651327322863846062007-07-25T23:06:00.000+10:002007-07-25T23:09:31.004+10:00State Management with ASP.NET 2.0 : Profile FeatureIts a common thing to have State Management in almost all the Web Applications, but use of this has always been a contentious issue. A developer has to decide whether the user data should be stored per session or should it persist across the sessions. Using sessions states we can always very easily store the information temporarily. This typically works by assigning to each new user a unique akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-38221960841788478242007-07-25T22:36:00.000+10:002007-07-25T22:38:06.354+10:00ASP.NET 2.0 : Web Deployment Projects - Website Model of DevelopmentI always used to ask myself while creating a web project in Visual Studio 2003 with ASP.NET 1.1, that why the hell we need to install the IIS even though our aim is to just develop a web application and not to host it.For all of those who used to think the same Microsoft came up with the Website Model of development with ASP.NET 2.0. Now with ASP.NET 2.0 and Visual Studio 2005 instead of creatingakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-16558052035830925502007-07-25T16:40:00.000+10:002007-07-25T16:50:59.696+10:00Fix Error : "Task Manager has been disabled by your administrator"When you are trying to open the task manager by CTRL+ALT+DEL then are you getting the following dialog box saying "Task Manager has been disabled by your administrator".There may be several reasons for this to happen.1. You use account that was blocked via the "Local Group Policy" or "Domain Group Policy". 2. Some registry settings block you from using "Task Manager". 3. Your system has been akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-29855683522490455902007-05-23T06:01:00.000+10:002007-05-23T06:07:32.171+10:00Data Structures and Algorithms with Object-Oriented Design Patterns in C#Let me share with you a book whose primary goal is to promote object-oriented design using C# and to illustrate the use of the emerging object-oriented design patterns. The book deals with software design patterns like: singleton, container, enumeration, adapter and visitor and how we can use them in an Object Oriented Approach with C#.Virtually all of the data structures are presented in the akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-18528559966935170312007-05-21T17:00:00.000+10:002007-05-21T17:03:11.458+10:00Validation Controls in ASP.NETYou might have used Validation controls in ASP.NET. There are two noteworthy enhancements to BaseValidator class from which all validation controls derive from. 1) A new property SetFocusOnError is now available, which when set to True, will automatically generate necessary JS script to set the focus to the control being validated if there is a validation failure.2) Another property akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-56856083373724206342007-05-12T00:58:00.000+10:002007-05-12T01:00:28.647+10:00IButtonControl Interface in ASP.NET 2.0ASP.NET 2.0 has introduced a new interface named IButtonControl under System.Web.UI.WebControls namespace. The properties and methods of this interface can be implemented to make a control behave like a button in a web form. One of the important properties is PostBackUrl. This can be used to post the current page to a different page, in other words, doing cross-page posting. On a related note,akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-58870229147292542122007-05-09T00:20:00.000+10:002007-05-09T00:22:58.376+10:00ASP.NET 2.0 Provider ModelASP.NET 2.0 introduces a new Provider model which allows developers to implement a requirement differently without changing a common interface. There three aspects to it - the provider class, the configuration layer and a data store. The Provider class implements the functionality, the configuration layer lets you configure which provider to use irrespective of the data store. The data store akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-85466193463269534242007-05-08T00:21:00.000+10:002007-05-08T00:27:21.988+10:00Drag and Drop in JavascriptImplementing a Drag and Drop functionality to your web page sounds really cool, but it is not simple and you will agree on that. Here we will see how can we implement drag and drop in out web site using Javascript 1.2 and layers.Check out this ebook from async.com.br to see how can we implement this.To download the file click on the image below Note : This ebook is under the Creative Commons akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-15889706291026932592007-05-07T21:05:00.000+10:002007-05-07T21:27:38.225+10:00How To Start a Website From ScratchThere must be many of you who want to create a website of your own, but you are not sure how to proceed for that. Well Here is a tutorial from hyperurl.com that will teach you how to create a website from scratch.To download the file click on the image below Note : This ebook is under the Creative Commons Attribution License. This ebook is free and legal.akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-77262064146877186142007-05-04T02:02:00.000+10:002007-05-04T02:03:59.564+10:00Threading in .NET 2.0If you have used threading in .NET framework 1.x, you may be familiar with Suspend and Resume methods. Please note that these two methods have been deprecated in .NET Framework 2.0. As a replacement, use one of the following thread synchronization methods based on the scenario. 1. Use the Interlocked class and associated Add, Increment, Decrement methods if the operation that you want to akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-66332563061026114912007-04-14T02:12:00.000+10:002007-04-14T02:14:43.494+10:00Authorization in ASP.NET applicationsIn general, two approaches to Authorization are possible for ASP.NET applications. First is role based, users are grouped in application-defined roles. Members of a particular role share same privileges within the application. Access to operations is authorized based on the role-membership of the caller. Resources are accessed using fixed identities (such as Web application’s or Web service’sakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-701454791855083442007-04-12T18:58:00.000+10:002007-04-12T19:27:59.391+10:00Scale your application to handle more usersThere are two common ways to scale your application to handle more number of users, more data volume or a combination of both. Scaling up is one of the two methods under which you increase the capability of a server by adding more hardware, such as more memory, more processor power, more network ports, etc. It does not add additional maintenance and support costs. Beyond a certain threshold, akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-86403612904423660142007-04-10T09:30:00.000+10:002007-05-09T00:29:06.428+10:00Grid View control in ASP.NET 2.0ASP.Net 2.0 replaces the good old classic DataGrid control with the GridView control. Do you remember what all steps you used to take care of to allow the pagination in the data grid? ASP.NET 2.0 makes it simpler with the Grid View control.This control is much like the DataGrid server control, but the GridView server control (besides offering many other new features) contains the built-in akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-58783132568437222452007-04-10T01:49:00.000+10:002007-04-10T01:50:04.874+10:00Ensuring application is Secure by designYou can follow the guidelines listed below for ensuring that your application is Secure By Design. · When you application stores or transmits data that attackers want, use Cryptography. You can implement encryption yourself or require your end users to use platform encryption features such as Encrypting File System (EFS), Secure Sockets Layer (SSL) or IP Security (IPSec).o Sample akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-23358334509461774412007-04-10T01:42:00.000+10:002007-04-10T01:47:15.234+10:00SQL Injection attacksSome of you might have heard about SQL Injection attacks. SQL Injection attacks insert database commands into user input to modify commands sent from an application to a back-end database. Applications that employ user input in SQL queries can be vulnerable to SQL injection attacks.Sample:Consider the following simplified C# source code, intended to determine whether an order number (stored in akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-13195050557295154742007-04-07T08:12:00.000+10:002007-04-07T08:16:22.239+10:00Partitioning in databasesWhen databases grow large, it is ideal to identify tables containing high volume of data and split them into multiple smaller sets of tables. This approach is called partitioning. Performance and manageability are the primary benefits. Partitioning can be done in one of the two ways, viz, horizontal and vertical. Horizontal partitioning involves creating logical groups of data within a table akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-12917561178587817152007-04-05T01:15:00.000+10:002007-04-05T01:16:43.860+10:00Debug Stored Procedure in .NET managed codeDid you know that it is possible to debug a stored procedure by tracing down the execution steps from managed code? If your answer is no, here is what you need. Open a Windows application or ASP.NET project where you are invoking a stored procedure. Set a breakpoint in the step preceding the SQL call. Open Server explorer, drill down to the stored procedure that you want to debug, open akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-56434314202773607322007-04-05T01:12:00.001+10:002007-04-05T01:13:10.043+10:00Performance features in .NET framework 2.0Performance considerations have a major impact on user acceptance of an application. In view of the same, measurement of performance is critical to any application. If and when there is a performance problem reported by an end user, a process needs to be followed to diagnose and troubleshoot the problem. Though this process differs from company to company and from developer to developer,akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-88968492692751924462007-03-29T23:07:00.000+10:002007-03-30T02:39:11.178+10:00Downloading files with ASP.NET using Save As DialogThis article explains how to download a file that is stored in the database with the possibility of forcing the browser to open a “Save As” dialog box to save the file on to the client system. The content of the file is stored in a column of a table of image data type. Such a dialog-box for saving a file can be displayed by using HttpContext.Current.Response property. HttpContext is a akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com1tag:blogger.com,1999:blog-7475258030496424805.post-38810063880475336232007-03-29T19:09:00.000+10:002007-03-30T02:40:50.534+10:00How To Create a Proxy SiteSo do you want to create a proxy website for yourself. Proxy websites are easy to build and they can be up and running within 2 hours or so. They are really a great source for generating revenue from your site through advertisements and referrals. Proxies can be used to access the blocked sites in your office network, school, college etc.So what does it take to create a proxy website of your own,akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com2tag:blogger.com,1999:blog-7475258030496424805.post-38333757708986232702007-03-27T02:23:00.000+10:002007-03-30T04:25:54.489+10:00Output Paramaters in OLE DB Command in SSISToday when i was nearly at the verge of finishing my SSIS package i just found out that i really can not complete it at the moment. I am having lot of validations on the input data, lot of look ups to get the reference values and after that i need to insert the rows into a SQL server database. It is not simple insertion, there is a big logic behind inserting rows, checking if the rows containing akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com3tag:blogger.com,1999:blog-7475258030496424805.post-47283208433524475692007-03-24T14:47:00.001+10:002008-04-29T09:16:32.246+10:00How to prevent Cross Site Scripting AttacksOne of the common types of security attacks on web-based systems (both intranet and internet) is cross-site scripting. It is a technique that allows hackers to perform one of the following things.Execute malicious script in a client’s web browser.Insert script, object, applet, form and embed tags.Steal web session information and authentication cookies.Access the client computer.Scenario - Any akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-70858279033167125312007-03-23T16:41:00.001+10:002008-04-18T08:20:15.078+10:00Using Temp Tables in SSIS Package DevelopmentOften while working in a SSIS package you will require to temporary hold your data in a staging table in one of the Data Flow Tasks and then in another task you will require to fetch data from the staging table, perform transformations and load it and delete the staging table.It means you create a physical table in your production database to stage data. But in a production environment, you may akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com4tag:blogger.com,1999:blog-7475258030496424805.post-17390871090822280672007-03-22T22:48:00.000+10:002007-03-30T04:28:13.391+10:00Three Dimensions to Protect your ComputerFirst - Strengthen the defense of your computer- Install Firewalls"Firewall" is an isolation technology to separate the internal network and the Internet. The firewall carries out some filtering when two networks communicate. It lets the data/person that you "agree" to enter your network, and also block the data/person you "do not agree" from your network. It can prevent they changes, copy, or akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-71263704872397120582007-03-22T19:29:00.000+10:002007-03-30T04:31:31.663+10:00Canonicalization : Security AttackOne of the common types of security attacks is due to canonicalization. A canonicalization error is an application vulnerability that occurs when an application parses a filename before the operating system has canonicalized it. Operating systems canonicalize filenames when processing a file to identify the absolute, physical path of the given file given a virtual or relative path.Files can be akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-45341593719192977532007-03-21T19:41:00.000+10:002007-03-30T04:33:11.804+10:00New Features in Visual Basic 9.0New features have been added to the language. Few of them can be listed as: Implicitly Typed Local Variables This feature allows us to declare variables without specifying their data type. The datatypes are assigned to them based on the value assigned to these variables on the right hand side. Object and Array Initializers The new object initializers in VB 9.0 are an akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-69170614449009218452007-03-13T23:56:00.000+10:002007-03-13T23:57:47.374+10:00Sending Mails in .NET framework 2.0 : new namespace System.Net.MailIf you have used System.Web.Mail namespace in .NET 1.x for sending emails programmatically, expect a surprise. All classes within this namespace have been deprecated in favor of the new System.Net.Mail namespace. System.Net.Mail contains classes such as MailMessage, Attachment, MailAddress, SmtpClient, etc to help us send emails in the 2.0 world. The features provided by this namespace, inakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-80096300162162672182007-03-09T20:54:00.000+10:002007-03-30T04:33:57.044+10:00Code Analysis in Visual Studio 2005 Team SuiteIf you are using VS.NET 2005 Team Suite, code analysis is built into the IDE itself. In older version of VS.NET, you might have used FxCop externally for comparing against pre-defined rules or would have integrated with the IDE by adding FxCop as an Add-In. To enable code analysis, open project properties, navigate to Code Analysis tab, select “Enable Code Analysis” and choose the different akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-53348825470706605312007-03-09T14:38:00.000+10:002007-03-09T14:40:27.157+10:00Microsoft ends JPEG ...Going to HD FormatMarch 08, 2007 (IDG News Service) -- Microsoft Corp. will soon submit to an international standards organization a new photo format that offers higher-quality images with better compression, the company said today.The format, HD Photo -- recently renamed from Windows Media Photo -- is taking aim at the JPEG format, a 15-year-old technology widely used in digital cameras and image akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-41323918158520516462007-03-07T15:20:00.000+10:002007-03-30T04:34:21.226+10:00Using View State in Server controls Using View State in Server controlsView State is serialized and deserialized on the server. To reduce CPU cycles, reduce the amount of view state your application uses. Disable view state if you don’t need it. Disable view state if you are doing at least one of the following:· Displaying a read-only page where there is no user input.· Displaying a page that does notakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-67388166101402724312007-03-06T23:36:00.001+10:002007-03-06T23:38:46.450+10:00Alpha Geek: Copy TV shows to your iPodSo Apple wants you to pony up $1.99 per episode of Heroes when you're already paying the cable company for it? Nuh-uh. Don't think so. Seems like you should be able to copy that show--or any other--from your media center PC or TiVo right to your iPod. You can, and it's easier than you might think. (Easier, even, than copying DVDs.)read more | digg storyakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-52038445069755692082007-03-06T21:17:00.000+10:002007-03-30T04:35:30.329+10:00Common Table Expressions in SQL Server 2005 (CTE)Common Table Expressions, CTE in short, is a new feature in SQL Server 2005. CTE is a temporary result set and is defined as part of a SELECT, INSERT, UPDATE, DELETE and CREATE VIEW statements. A very simple usage of a CTE is given below. WITH MyCTE( ListPrice, SellPrice) AS( SELECT ListPrice, ListPrice * .95 FROM Production.Product)SELECT * FROM MyCTE WHERE SellPrice > 100 A akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-47855112783995069182007-03-06T20:56:00.000+10:002007-03-06T20:57:42.254+10:00Partial Classes in .NET framework 2.0.NET Framework 2.0 introduces the concept of Partial classes. Partial classes allow you to split a class definition across multiple source files. Separation of class definition facilitates multiple programmers to work on the same class simultaneously and/or better organization of code within a class. VS.NET 2005 uses this concept to hide designer-generated code when you create Windows akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-31905261415438442002007-03-05T20:15:00.000+10:002007-03-30T04:37:13.747+10:00Isolated Storage in .NET frameworkIsolated storage is a private file system managed by the .NET Framework. Like the standard file system, you can use familiar techniques (such as StreamReader and StreamWriter) to read and write files. However, isolated storage requires your code to use lesser privileges, making it useful for implementing least privilege. Additionally, isolated storage is private, and isolated by user, akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-73529271862817943432007-03-04T07:43:00.000+10:002007-03-30T04:37:49.611+10:00Keywords Planning : Plan your content wih keywordsWhile optimizing your website with good keywords is an important part of your search engine strategy, I do think however, that too many webmasters spend way too much time tweaking it to death. I don’t think that this is a good idea nor do I think that it is beneficial to their website. All that time spent on one thing while neglecting the rest of their marketing strategies in the long run is akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-63011165051888228952007-02-24T19:46:00.001+10:002007-03-05T20:54:53.812+10:00Encrypt your web browsing session (with an SSH SOCKS proxy)Using a simple SSH command, you can encrypt all your web browsing traffic and redirect it through a trusted computer when you're on someone else's network. Today we'll set up a local proxy server that encrypts your online activity from your Mac, PC or Linux desktop.Check it here --> http://lifehacker.com/software/ssh/geek-to-live-akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-67565085859345422302007-02-08T18:33:00.000+10:002007-02-02T15:04:14.795+10:00System.String Or StringBuilderMany of us know that we should use StringBuilder object instead of String while building strings when the content of the string variable is unknown at the time of coding. Some of us may not know the real reason behind this guidance other than the high-level fact that StringBuilder is more optimized. Here is the fact, if you are interested. The System.String class is immutable which meansakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-79307756802675383002007-01-30T20:58:00.000+10:002007-06-14T01:28:43.652+10:00Themes and Skins in Visual Studio 2005 ASP.NET 2.0ASP.NET 2.0 provides rich support for Themes which help in defining consistent look and feel across multiple pages in a web application. One of the file types that you could create within the definition of a theme is a “skin” file. After creating a theme folder in the web application, you can create a skin file by adding a new item and selecting the type as “Skin”. You can add definitionsakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-39723857362309821552007-01-30T20:55:00.000+10:002007-03-30T04:38:43.791+10:00User And Search Engine Friendly Website DesignUser Friendly And Search Engine Friendly Website Design by: 5FISH Web DesignDesigning a website is much more important than creating an attractive image of a web page. Of course your website is an important part of your online business. The homepage on your web site is very important. A professionally designed website is the key to successful converse to your prospective clients about your akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-2244267250890974762007-01-30T20:46:00.000+10:002007-03-30T04:39:02.430+10:00What Is RSS?What Is RSS? by: Madison LockwoodRSS is technology - a simple software program - that allows you to access web and blog content automatically. The acronym's most popular translation is "Really Simple Syndication. Once your browser or computer has an RSS reader on board, you can subscribe to any number of RSS "feeds." A feed is simply a way in which a reader may subscribe to website content - mostakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-22886558497715461892007-01-26T04:40:00.001+10:002007-03-23T00:21:19.713+10:00Disclaimer and Important LinksHere are few good sites for you, these are the directories where you can submit your site and get listedAddMe - Search Engine Optimizationakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-19247903464644742822007-01-26T04:38:00.000+10:002007-01-26T04:40:40.057+10:00Cisco warns of router software vulnerabilities<!-- //topics ul --> Businesses are being warned that three Cisco Systems router operating-system vulnerabilities have been discovered. The flaws found could enable a malicious individual to commit denial-of-service, or DoS, attacks against Web sites, according to a warning issued by the U.S. Computer Emergency Readiness Team. US-CERT's warning about the Cisco IOS issue says a remote akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-35038035941128236102007-01-24T19:54:00.001+10:002007-03-30T04:39:26.358+10:00Website Template Guide – Introduction and more!Website Template Guide – Introduction and more!Q.) What are web templates?A.) Web templates are readymade web-pages. They make the job of putting web pages on the internet really quick. Q.) How do the templates manage to do it so easily? A.) Web templates perform as html coded dummy web pages that carry model content. These templates can be edited with ease and can be customized. You can add akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-84735269657030982322007-01-24T19:48:00.000+10:002007-01-24T19:53:51.120+10:00Viewstate in ASP.NET 2.0All of us know that ViewState has been really cumbersome in ASP.NET 1.1 for large page sizes and contributing to slow performance. But in .NET framework 2.0 the ASP.NET 2.0 has some enhancements to state management. ASP.NET 2.0 now has control state to ensure few specific properties of a control are retained across postbacks irrespective of whether ViewState is enabled or not. By setting akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-28266545602407499902007-01-23T20:24:00.000+10:002007-01-23T20:29:14.283+10:00A Closer Look at the iPhone , VideoLets have a closer look at the Apple's iphone. Its not just a phone but its the most advanced phone ever made, most advanced internet device and the most advanced iPod made by apple.Just watch the video displaying its cool features below.So what you think, how is this device???I think its simply awesome. Apart from being said as the best phone, music device and an internet device i must say its akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-22420545430781157572007-01-22T00:14:00.000+10:002007-03-30T04:42:57.929+10:00How to Start Video Blogging?How to Start Video Blogging? by: Kanicen NichathavanVideoblogging is the next generation of posting ideas and products over the internet. Everybody knows about textblogging. Now they use videos for a better way of expression. This form of communication may entail a lot of resources, but it is all worth it. If pictures say a thousand words, videoblogging exceeds that by far.A videoblog requires akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-69644809550243721062007-01-20T22:14:00.000+10:002007-01-20T22:18:17.420+10:00Visual Studio 2005 : System.Security.Principal new classesNew classes have been added to System.Security.Principal namespace in Visual Studio 2005The System.Security.Principal namespace has three new classes in .NET 2.0. They are explained briefly below. SecurityIdentifier: A Windows account is internally represented by OS as a security identifier. The account could be a user account, a group or a computer in the network domain. The akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-11015239162284621582007-01-20T05:18:00.000+10:002007-03-30T04:42:38.206+10:00Content Management System CMSContent Management System CMS by: Ruchira Sharma Most of the organizations have global visions these days and these aspirations have their ramifications. One of which is creation and management of huge amounts of data. This activity is a time consuming process and requires a huge team of professionals to do so. Content management system, CMS is a system that allows you to organize your data akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-86914814735308017652007-01-20T05:13:00.000+10:002007-03-30T04:42:16.760+10:00How To Install SharePoint 2007 Beta 2How To Install SharePoint 2007 Beta 2by: Jason Fortner Following are the detailed instructions on how to install SharePoint 2007 Beta 2 on a clean version of Windows 2003. These instructions were done by completing the installation on a Virtual Server 2005 machine that was NOT joined to a domain. I have seen a lot of articles that say the server has to be joined to a domain but that is not a akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-8658320635721834872007-01-20T05:10:00.000+10:002007-03-30T04:41:51.969+10:00SharePoint 2007 New Feature OverviewSharePoint 2007 New Feature Overview by: Jason Fortner Sharepoint 2007 is in Beta 2 now and is projected to be released at the beginning of the year but now is the time to start looking at the new features that SharePoint 2007 and WSS V3.0 will contain.Below are some of the highlights of the new features that SharePoint 2007 and WSS V3.0 will contain. Site columns provide a central, reusable akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-35617800431728294692007-01-20T03:21:00.000+10:002007-01-20T03:24:06.703+10:00Web.Config and ASP.NET 2.0With ASP.NET 2.0, you no longer need to take the pain of manually editing your web.config file to set your application configuration settings. Two new tools have been added.Web Site Administration Tool which runs on your local browser allowing configuration of Security, Application and Provider settings. It can be invoked by clicking on the icon for ASP.NET configuration in the Solution akshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0tag:blogger.com,1999:blog-7475258030496424805.post-10091118219560905522007-01-20T02:57:00.000+10:002012-10-10T15:29:42.741+10:00Exception : Unable to load DLL (OraOps9.dll) Error
This is the first time i switched from using SQL Server to Oracle with Visual Studio .NET. When i tried to make call to a strored procedure in the oracle database my code threw following exception :
"Unable to load DLL 'OraOps9.dll': The specified module could not be found."There could be many solutions to this problem.
Firstly you can try with this. Grant read permissions to the Oracle homeakshttp://www.blogger.com/profile/09451014998532491869noreply@blogger.com0