I'm creating Frontend for an application with Established database (am rewriting to be explicit and so there are some things I cannot change. I was looking at Default Register/Login that comes with MVC5 sample and found that its table have fields that are problematic to my app. Specifically, my users don't have Emails and app does not require one. But they rather have strings of username (PK in Existing User table). So I wanted to know if I can strip those unneeded field to match my table columns my table needs only UserName, Password, MobileNumber, LastLogin, and IsUserActive. Is there …

Member Avatar
Member Avatar
+0 forum 4

I made great progress this morning in resolving a number of problems that were plaguing my Win7 laptop. It was difficult to find good info about how to resolve these problems. I can provide more details if anyone needs them. Here are the bare bones: * **High CPU** There are a number of common programs that churn the CPU. These are known problems but the Software companies don't seem to care. **CONDUIT Search Protect** From what I've read, this is almost like a virus. Softronic Download service has an agreement with them and include this in their 'Express' downloads. If …

Member Avatar
Member Avatar
+0 forum 1

I've had this cable in a drawer for years, and I've never known what it is. Does anybody know what this cable is, or what it goes to? What is this cable? [Mystery Cable](http://imgur.com/a/eGkNv "Mystery Cable")

Member Avatar
Member Avatar
+0 forum 5

Is it possible to reuse an identity field value after deleting rows in SQL Server 2005? Here is an example. Suppose I have a table with an Id field as a primary key (identity). If I add five rows, I will have these 5 Ids: 1, 2, 3, 4, 5. If I were to delete these rows, and then add five more, the new rows would have Ids: 6, 7, 8, 9, 10. Is it possible to let it start over at 1 again?

Member Avatar
Member Avatar
+0 forum 3

Can Anyone explain about how to establish a connection to a same server with different private/rsa/identity using identity file.

Member Avatar
Member Avatar
+0 forum 2

How will Microsoft differentiate Windows 8 in an already crowded Windows OS user space? How about, for one, with the use of a photographic gesture security system for logging in? The idea of using a photo to identify and authenticate the user is not without some pretty obvious problems (ambient lighting, bad hair day, forgetting to shave could all screw up your chances of using the computer that day) which is why Microsoft developers have thought outside of the box on this one. [ATTACH=RIGHT]23386[/ATTACH]The important part of the 'photographic gesture security system' can be found in the gesture bit. Instead …

Member Avatar
Member Avatar
+0 forum 9

Hello All, I am copying file from one machine to another machine after that execute that file on remote computer using c#. I am using below command to copy file File.Copy(sourcePath, DestinationPath, true); and ManagementClass remote_Class = new ManagementClass ("\\machineName\root\\cimv2:Win32_Process"); object[] remoterun = { destPathwithFileName, null, null, 0 }; remote_Class.InvokeMethod("Create", remoterun); to execute that executable on remote machine. Now I code in which I can provide domain\username and password. I want that process to be executed by domain user on remote machine Or process to be executed by username and password which I've provided in code. I don't want to …

Member Avatar
Member Avatar
+0 forum 2

Hello All, I am copying file from one machine to another machine after that execute that file on remote computer using c#. I am using below command to copy file File.Copy(sourcePath, DestinationPath, true); and ManagementClass remote_Class = new ManagementClass ("\\machineName\root\\cimv2:Win32_Process"); object[] remoterun = { destPathwithFileName, null, null, 0 }; remote_Class.InvokeMethod("Create", remoterun); to execute that executable on remote machine. [B][COLOR="red"] Now I code in which I can provide domain\username and password. I want that process to be executed by domain user on remote machine Or process to be executed by username and password which I've provided in code.[/COLOR][/B] [B]I don't want …

Member Avatar
+0 forum 0

Hi All, <client> <description>KKR</description> <rits>Test</rits> <time_zone_code>US/Central</time_zone_code> <directory_code>Foler</directory_code> </client> I need to fetch the above and put it in the form HTML FORM. Note : Must make use of Xpath,(Identity Transformation)

Member Avatar
Member Avatar
+0 forum 2

Hi Everyone, I have a table that has a 2 column primary key. I set up the key where the 2nd column is an identity column. When I ran my VB application I discovered the ID (2nd column) did not increment the correct way. I was hoping it would increment like this: [code] Category ID 50001 1 50001 2 50001 3 50002 1 50002 2 [/code] Instead it did this: [code] Category ID 50001 1 50001 2 50001 3 50002 4 50002 5 [/code] I'm using Visual Studio 2010 to do this. Can you tell me what I did wrong? …

Member Avatar
Member Avatar
+0 forum 2

Some industry experts are expressing concern about a [URL="http://www.dhs.gov/xlibrary/assets/ns_tic.pdf"]proposal [/URL]from the White House to develop a "National Strategy for Trusted Identities in Cyberspace," now up for public comment, saying it is vague, might no longer allow online anonymity, potentially gives government too much access to personal information, and provides a single point of failure for identity thieves. The plan postulates security tokens such as a "smart identity card," possibly from state government, or a digital certificate from a smart phone, that would contain all sorts of identity information about a person, rather than people having to remember a long string …

Member Avatar
Member Avatar
+1 forum 2

Hello, i got a problem with identifieng my classes upon its static ID number. Upon creation of each class, it recieves its individual number, the numbers are ascending from 0 to "endless". So now, I want to do a loop like this [code=c++] for(int i = 0; i <= Class::GetMaxIDNumber(); ++i) { nSpriteNr = spriteNumberOfClass(i); } int spriteNumberOfClass(int nClassID) { //takes the class number and returns its corresponding private: m_nSpriteID number //how to do this part? } [/code] and I want to know the corresponding membervariable m_nSpriteID, but I do not know how to identify a class based on an …

Member Avatar
Member Avatar
+0 forum 7

I am working in VS2008. I use vb.net and asp.net. MS SQL2005 as database server. Occasionally when two sets of data are inserted at nearly the same time, I find that one has "stomped" on the other, over-writing it's data. The inserts are done via a stored proc using SCOPE_IDENTITY() to retrieve the last identity value when necessary. Below is an example of how I connect to SQL server and insert the data. NOTE - Conn is imported from a class and looks something like this (in psudocode): Conn As New SqlConnection With {.ConnectionString = ConfigurationManager.ConnectionStrings("DB").ConnectionString} [CODE] Using myConnection As …

Member Avatar
Member Avatar
+0 forum 1

I am no great fan of the concept of National ID Cards, although my reasoning is not so much based upon distrusting the 'if you've done nothing wrong you have nothing to fear' argument nor even the 'big brother invasion of privacy' paranoia which seems to grip most of the mainstream media in the UK whenever the subject is mentioned. I do admit that both of these things do play a part in my dislike of ID Cards though, but the real deal clincher for me has always been a bit more pragmatic: the UK Government is really crap at …

Member Avatar
+0 forum 0

Here's a worrying trend - people are pretending to be other people on the Internet and social networks. So far, so incredibly well-known, predictable and not at all surprising. What is perhaps more of a surprise is that when a fake is uncovered they tend to [URL="http://news.bbc.co.uk/1/hi/technology/7929360.stm"]stick around[/URL]. They don't go away, no matter how much we might want them to. This has implications for Web marketeers - specifically that imitators are less easy to get rid of than you might have thought. This is bad news because it means the only way to be certain is through prevention. So …

Member Avatar
+0 forum 0

A report published today by [URL="http://www.experiangroup.com"]Experian[/URL] suggests that for many a business we are still living in the dark ages as far as making sure customers are who they say they are. Furthermore, the [URL="http://www.qas.co.uk/paperchain"]Electronic Authentication: Breaking the Paper Chain[/URL] report at least partly blames those businesses for the growth of ID fraud, by relying upon fraud friendly paper documents when far more reliable digital alternatives are readily available. Looking at the numbers, 71 percent of companies surveyed claimed that ID fraud presented a significant challenge to their business yet half relied heavily on paper for authentication purposes. The break …

Member Avatar
Member Avatar
+0 forum 5

The End.