jwenting 1,905 duckman Team Colleague

at least that's the theory. A lot of frameworks (and people in general) abuse unchecked exceptions because they're lazy and don't want to write exception handling code.
Their users (and over time they themselves) run into problems because there's now all kinds of things that could be handled terminating applications and they need to add that exception handling anyway without the compiler slapping them on the wrist if they forget about it.

So don't automatically assume that a RuntimeException should be left uncaught. It's quite possible that you can handle it in which case you should.

jwenting 1,905 duckman Team Colleague

have you seen the kinda 3d view you can do on dells website? you cam rotate the products and get an exploded view

and how useful is that exactly?
Or are computers now such fashion items that you choose them based purely on looks?

jwenting 1,905 duckman Team Colleague

And some replies:

Hello,
I am not sure .NET is wss11 compliant or not, but the wss11 namespace used
by WSS4J is outdated. The new namespace is: "
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1"
I think this needs correction in WSS4J.

Thanks,
Ashutosh


I resolved setting ENABLE_SIGNATURE_CONFIRMATION to false. I think it's
wrong that WSS4J enables it by default since it's still based on
outdated specs..

jwenting 1,905 duckman Team Colleague

First result from an Apache mailing list:

I've developed a Web service secured with WSS4J. The client is a .NET
client using WSE. I'm using X509 tokens and the current configuration
works fine since early CVS releases of WSS4J. I recently upgraded to
1.5.0 and my java clients works fine. But the .NET client stopped
working with this message:

Message "WSE535: The following SecurityToken QName is unsupported:
http://docs.oasis-open.org/wss/2005/xx/oasis-2005xx-wss-wssecurity-secext-1.1.xsd:SignatureConfirmation.
Please check your configuration for registered SecurityToken qnames."

It seems to me that the new version works in WSS1.1 compliance so
following the specification sends the SignatureConfirmation. .NET is not
1.1 compliant so it doesn't expect that element.
I think anyway should exists a way to force WSS4J work in 1.0 mode
anyway, or to be backward compatible.

jwenting 1,905 duckman Team Colleague

I'm assuming your using the command prompt.
If so, why not use an IDE?

IDEs just delay the inevitable. Kids who never use anything but one are utterly lost when they even get a new version of that same IDE that has a few buttons in a different place.
When they have to work without one (which WILL happen) they're completely out of their league.

Do NOT start using an IDE until you can do it manually, and read that documentation (it's there for a reason).

jwenting 1,905 duckman Team Colleague

an explanation of that error should be available either from the MSDN (if it's a Microsoft error code), W3C, or WS-I.

jwenting 1,905 duckman Team Colleague

Often such warnings are harmless but they may result in specific services not being available (iow, methods and types that aren't mapped) or to compilation errors in the generated code.

Of course the actual WSDL is impossible for us to analyse here as you listed only a URI on your local network, unreachable from the internet.

You should also really upgrade to a more modern version of .NET. 1.0 is way outdated, 1.1 is the least you should use and most companies are using or planning to upgrade to 2.0.
The 2.0 wsdl parser is a lot better than the one in 1.1 (let alone 1.0) and is able to correctly parse wsdl that the older versions had problems with.

jwenting 1,905 duckman Team Colleague

When will the kiddos ever learn to think for themselves, or lacking that at the very least use a search engine?

jwenting 1,905 duckman Team Colleague

You might want to start with the JBoss documentation.
It's quite comprehensive and tells you what all the files are and how they work.

jwenting 1,905 duckman Team Colleague

premium rate numbers can be obtained from telcos just like regular ones and freephone numbers, but usually only through their business desk.

jwenting 1,905 duckman Team Colleague

He doesn't seem to understand how web services work, thinks that the actual executable code is sent over the wire and executed clientside.

That's not what happens.

jwenting 1,905 duckman Team Colleague

the button (when activated) submits a post request to the servlet, the servlet sets some information in the http requests and forwards to the JSP.

What part of that don't you get working? It's rather basic...

jwenting 1,905 duckman Team Colleague

You should really do some exception handling in there.

You MUST ensure that your database resources are ALWAYS released, which means placing the close statements in a finally clause and all other code using them in a try/catch block.

Otherwise you're going to end up with connection starvation when you get exceptions, and can bring the server down.
Maybe not much of a problem for you yet, but it's never to early to start doing the right thing.

And refactor that database code into a servlet, it does NOT belong in a JSP.

jwenting 1,905 duckman Team Colleague

most likely a missing constructor or a constructor with incorrect visibility.

jwenting 1,905 duckman Team Colleague

and we're not able to handhold you all the way. We can help you with specific point problems, maybe turn you in the right direction for broader decisions, but that's as far as we can usually go.

Without knowing what you know, it's impossible to even start.
Should we start pointing you to an introductory text on C++ programming or an advanced text on network protocols for example?
Both are relevant to writing a mail program (and do you want a server or a client?), which you should read depends on what you know already.

jwenting 1,905 duckman Team Colleague

a box of candy no longer does it it seems... These days it must be a weekend in Paris at the very least, probably with a diamond ring to go with it.
If a man doesn't spend that much on his woman come Valentine's day she thinks he doesn't love her enough...

jwenting 1,905 duckman Team Colleague

Now that i think about it, the compiler is local and will read the ENVIRONMENT variables as well. Is this more like what's going on?

The environment settings have nothing to do with it. What matters is that each operating system has its own instruction set, which maps to the hardware instruction set.
You can't run software compiled for one OS on another even if they run on the same machine.
Often you can't even compile it under another OS running on the same machine, especially if it uses operating system specific libraries.

jwenting 1,905 duckman Team Colleague

It's just another overcommercialised thing.
20 years ago it was a time when people sent anonymous cards and gifts to secret loves, now it's a time when men are supposed to flatter their wifes and girlfriends with expensive gifts to show that they do indeed love them.

It's therefore effectively degraded those wifes and girlfriends into paid prostitutes by putting a monetary value on love itself.

jwenting 1,905 duckman Team Colleague

well said Rashakil. Next they're going to demand their kids get free meals at posh restaurants each day...

jwenting 1,905 duckman Team Colleague

an executable created for one operating system isn't going to work on another, period (and Xenix is NOT Unix).
And there's no way to convert one into another.
Unix supports a.out just fine, but it will have to be a.out compiled for the exact Unix flavour you're using. You're not for example going to run a Solaris executable on AIX, despite both being a.out style binaries (or elf for that matter).

jwenting 1,905 duckman Team Colleague

when I was in school you either brought your own lunch or went without.

Kid should be glad to get anything.

mattyd commented: ... +0
jwenting 1,905 duckman Team Colleague

You can easily transmit binary content in XML, just pack it inside a PCDATA section.
Won't be much help on the receiving end though in this case.

OP seems unaware of what A) webservices are, B) what databases are, and C) how to use either.

jwenting 1,905 duckman Team Colleague

Those lawsuits are frivolous, there's no scientific indication of any health issues resulting from the EM fields put out by transmission lines or cellphone towers.

But juries see themselves as the next possible group of people to sue the powercompany or telco and will not destroy their chances at a fat bank account by dismissing such claims.

jwenting 1,905 duckman Team Colleague

sigh...
If Microsoft don't install security systems people complain about that.
If Microsoft do install them people complain about having security systems that request permission to do things.

Guess it's a no-win situation for them, whatever they do people are going to complain about it.

jwenting 1,905 duckman Team Colleague

does C++ even have method-local inner classes?

jwenting 1,905 duckman Team Colleague

And another problem: your insert (if it's executed at all, which is unlikely) doesn't get comitted to the database.
That means it's visible only to the current database session and will be undone when that session terminates.

I suggest you follow Sun's JDBC tutorial or read a GOOD introductory text about Java and JDBC.

jwenting 1,905 duckman Team Colleague

executeQuery cannot be used to execute anything except select statements.

And you shouldn't use scriptlet blocks in JSPs, it's considered very bad, leads to hard to read and harder to maintain code.

jwenting 1,905 duckman Team Colleague

check your URI for a small typo.

jwenting 1,905 duckman Team Colleague

Yes, the binding is determined at compile time. But that hardly matters in practice, unless you're trying to write a program that's so generic that you don't know even a common basetype at that moment and have no choice but to pass in Object everywhere (at which point generics no longer make sense and you could just as well use Object as the parameter type everywhere).

jwenting 1,905 duckman Team Colleague

rather bad deal. Just got me a Toshiba with a Centrino Core Duo, 1GB RAM, and 120GB harddisk for €849 last week.
Otherwise pretty similar config, 15.4" screen (large enough for most purposes).

Given our prices it should cost something similar in dollars over in the US.

jwenting 1,905 duckman Team Colleague

yes, for educational use it would be fine.
Make sure though to install a strong firewall to block all attempts to use P2P clients and other downloading except from authorised (by the school) sites (for example sites by publishers of the books the students are using) or they'll soon have every system employed as download stations for pirated software, movies and music and be introducing a never ending flood of virusses and trojans into your systems.

jwenting 1,905 duckman Team Colleague

The EM fields might affect your network, causing interference.
But unless there are some strange harmonics, it shouldn't harm the network as much as your brain.

Do make sure you're even allowed to create that network though. Many facilities where work with high energy equipment is going on have very strict rules about introducing things into the area.

jwenting 1,905 duckman Team Colleague

first, never name methods starting with a capital letter. That should ONLY be done with classes (by convention, and a good one it is).

As to your question. For primitive types it's rather impossible because of the way generics in Java work (they work only with classes and interfaces).
For those though it's rather sillily easy (took me a while to get it to compile because of a stupid typo I didn't catch in the compiler errors, but the code itself is trivial).

class SomeClass<T> {
	public <T> boolean compare(T[] a, T[] b) {
		for (int i = 0; i < a.length; i++) {
			if (!a[i].equals(b[i])) {
				return false;
			}
		}
		return true;
	}
}

I omitted part of your checks for brevity.

jwenting 1,905 duckman Team Colleague

And you expect an unbiassed answer here?

VB isn't really a programming language at all, it's a rapid prototyping tool for user interfaces.
Anyone using it for more than that is asking for trouble.

That said, C++ isn't perfect. Nothing is.

Salem commented: More rep++ from Salem :) +6
~s.o.s~ commented: Amen -- nothing is perfect - ~s.o.s~ +12
jwenting 1,905 duckman Team Colleague

if you feel it is, it might be ;)

jwenting 1,905 duckman Team Colleague

Do you have ANY grasp at all about what a DLL is?

If you did you'd know that what you want simply isn't going to work.

jwenting 1,905 duckman Team Colleague

We're not doing your homework for you.
Not now, not ever.
And we're not going to help you at all unless you start being a bit more friendly and pleasant rather than starting to give us orders about what we're all going to have to do for you and ask your questions nicely and in proper English.

As it is you're coming across as a lazy, obnoxious and spoiled little brat.

jwenting 1,905 duckman Team Colleague

STUPID CALLS I GOT ON DUTY
you wouldn't beleive the stupid things I saw when I was working ...

when I interviewed him at the hospital this old guy was pissed off at his wife for making fun of his "third leg" so he shows it to his wife sits down on a chair and whacks it off with an axe! He lived ... I didn't wanna find out if the re-attached it or not. Alochol and Drugs Seem to Synergize Stupidity. Now that I'm retired ...I don't miss the stupid stuff at all.

halfhearted attempt at qualifying for a Darwin award...
Met one criterium (failing to reproduce) but missed the other (removing himself from the gene pool).

jwenting 1,905 duckman Team Colleague

i believe its the fact that one can be more attacthed to devoting themselves to thier PC than thier partner - after all, pcs dont nag or complain or want you to buy expensive things (well, actually they do...)

I got my PC a few partners so they can talk when I'm not home to keep her company...

jwenting 1,905 duckman Team Colleague

just because you're cheap doesn't mean you're automagically going to get something that does what you want.

jwenting 1,905 duckman Team Colleague

qwerty beelzebub buzzword gobbling froobs.

jwenting 1,905 duckman Team Colleague

his idea of a soap firewall doesn't exist.
A SOAP service can have one or more steps in which SOAP headers are processed though, and these can be used to do security checks.

DOS attacks won't be stopped by something running on your system as is. That will require a lot more work in the form of load balancers and generic firewalls that can detect such things.
Nothing to do with SOAP.

You might have 2 decades as a programmer, but you don't seem well versed in distributed application and network architecture.

We have a similar system to what kuom employs, with dedicated clustered SOAP servers talking to dedicated clustered application servers running EJBs.
The traffic volume is massive (realtime stock market data to thousands of customers in trading rooms all over the place).
Everything is protected by username/password login. You can't access any content on the SOAP servers without supplying valid credentials, and after that the application servers will again check those credentials to determine if you are allowed to call a particular service (and if so which constraints there are on the data you're allowed to get returned).

That's secure and stable enough for most purposes. If you want more security run the entire SOAP stack over HTTPS, providing additional 128 bit encryption for the (potentially already encrypted) SOAP messages.
For increased performance you can put gzip compression of the http stream on top of that (but beware that …

jwenting 1,905 duckman Team Colleague

it has nothing to do with JSP either (and anyone doing something like this in a JSP should be shot, preferably in the gut, and left for the vultures).

jwenting 1,905 duckman Team Colleague

yup. A PC with a wireless card AND a normal card acting as a bridge.

tcepser commented: Very positive, and actually makes sense +3
jwenting 1,905 duckman Team Colleague

none, you can't access it directly from outside your LAN (which I guess is a single machine).

jwenting 1,905 duckman Team Colleague

who is this "many"?

Sounds like your typical FUD piece by someone who can't get "it" and blames that on his internet addiction.

Get away from those porn sites and into a bar.

jwenting 1,905 duckman Team Colleague

and what about broadband users who want actual performance and don't care about flashy images?

There are very few items I'd buy online where I give a darn about having a "3D" view of the thing. I either don't care what it looks like or know already.

jwenting 1,905 duckman Team Colleague

bleh. First define what you mean by "security" and go from there.

You seem to just be grasping at a lot of words and acronyms you don't really understand and expect a complete system to materialise out of thin air if you just use them all.

What's a "SOAP firewall" anyway? Are you going to block requests to the SOAP servers? If you do why have them at all?

Good authentication/authorisation in combination with SSL is normally more than enough.

jwenting 1,905 duckman Team Colleague

and stop the SHOUTING.

jwenting 1,905 duckman Team Colleague

Eclipse likes equals a lot... What you're doing, comparing object references using ==, is a deadly sin almost universally (there are a very few scenarios where you want it, but those are so specific you can for now forget about them).

In general: NEVER use == to compare objects, it doesn't work (or rather it works perfectly, just not how you think it does).