|
Where is your code, what have you done so far?
Relatively simple all you need it to manage the FormLoad and checkbox events.
|
|
|
|
|
Member 13062505 wrote: This is working fine Glad to hear you got it working. Pretty simple, isn't it.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
When I want to add a QRcode to a pdf file with itextscharp and I use the page width for it's position (right corner)
the Qr code is not at the right sight of the page.
Am I missing something?
thank you in advance
|
|
|
|
|
I'm not sure how anyone can help you if you do not post the relevant code.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
HI
I've used this site in the past to code create a jukebox application in c# to control Itunes and play songs from a users library.
I now want to search and play tunes from the store (streaming) using iTunes music. Does anyone know how I can achieve this?
I have the iTunes search api but that just returns an status of
WaitingForActivation
I can search the HTTP site and get loads of info
"https://itunes.apple.com/search?term=the beatles&limit=25 but can't see how to use that from the iTunes com to play it. I've searched the apple developer forum (waste of time) and every other combination of search terms I can think of in google.
Any help appreciated in advance.
Cheers
|
|
|
|
|
Greetings all,
Essentially I am trying to recreate a formula for a column that calculates a cumulative difference between, between differences in data on data from adjacent column on a daily basis. In excel the formula is =ROUND(IF(B4<now(),t4,0),2). does="" anyone="" know="" how="" to="" edit="" the="" method="" for="" computed="" field="" in="" visual="" studio="" achieve="" this?
any="" help="" will="" be="" much="" appreciated<="" pre="">
|
|
|
|
|
You're question makes no sense at all.
There's no calculation going on. All that formula does is compare a date/time in a cell to the current date/time. If it's "less than" now, it returns the value in "T4", whatever that is, or returns 0, rounded to 2 decimal places.
And what do you mean by "in Visual Studio"?? VS doesn't have anything to do with manipulating data. Are you talking about writing this in your own code?
|
|
|
|
|
Hi,
I am new to ASP.NET MVC. I would like to get some help on getting custom data from controller to view.
I have queried and concatenated the result of a table from model based on a criteria. I want this to be viewed as a partial view in the Index page. For this, I pass the queried result as follows
return PartialView(rds.ToList())
The purpose is to display a listview of these items in the Index view as partial. I don't know how to grab this data from the partial view. Please help.
Thanks
|
|
|
|
|
You might get better results if you post this in the ASP.NET Discussion Boards[^] - if you do post it there then don't forget to delete this version
|
|
|
|
|
|
|
Do you know how to write code drag and drop items between two listView ? Share with me.
|
|
|
|
|
Use the drag/drop functionality of your chosen UI platform. Oh wait we don't know the UI platform.
The functionality is dramatically different between winforms, web and wpf so a little more information would be useful.
There are many examples of all the different syntax.
DO SOME RESEARCH FIRST!
Never underestimate the power of human stupidity
RAH
|
|
|
|
|
1) please some one tell me difference between hashing or encryption a data.
2) i saw hashing also encrypt data which is not human readable and encryption does the same then why people think hashing is different from encryption ?
3) what hashing does ?
4) if we encrypt data then we can decrypt it too but if we hashing the data then can we reverse the process ?
5) if no then what algorithm hashing use that no one can reverse the data ?
6) give me two sample code to has data one will hash data without salt key and another one hash data with salt key.
thanks
tbhattacharjee
|
|
|
|
|
Hashing is a one way function - you cannot get back to the original from the hashed value
Encryption is two way - if you have the correct keys you can regenerate the original data from the encrypted value.
=========================================================
I'm an optoholic - my glass is always half full of vodka.
=========================================================
|
|
|
|
|
What hashing does for which its value can not be reverse ?
tbhattacharjee
|
|
|
|
|
An example is that it allows you to compare the hashed value of a password entered with one stored as a hash, without knowing what the original password was. This means that people with access to the database cannot see stored passwords
=========================================================
I'm an optoholic - my glass is always half full of vodka.
=========================================================
|
|
|
|
|
..there aren't many properties or methods in global::System.Object . Each item included would be included in any derived object, and since "everything" inherits from that one class at a given point, everything has those methods.
There's not many of them, yet it contains a method called "GetHashCode". Has nothing to do with encryption either, but apparently it was important enough to ensure that "everything" has that method - and I'll even hint on the fact that it has nothing to do with encrypting stuff.
You're welcome
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Most of them.
Try this simple one: add each byte of the input stream together, storing the result in a byte:
byte hash = 0;
foreach (byte b in bytes)
{
hash += b;
} If you feed this any two bytes, can you tell from the result exactly what two bytes you started with?
If you think you can, here are some examples: 123, 42, 0, 122
What two bytes values did I start with in each case? You get one guess. There will be a significant prize if you - and you alone - get it on the first attempt.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
As usual, you come here having done no research for yourself. Use Google or Bing. This information is all available for you.
This space for rent
|
|
|
|
|
Not his first time.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
Indeed. I've lost count of the number of posts like this from him.
This space for rent
|
|
|
|
|
Tridip Bhattacharjee wrote: give me two sample code to has data one will hash data without salt key and another one hash data with salt key.
No - it doesn't work like that: we don't do your homework for you.
Tridip Bhattacharjee wrote: what algorithm hashing use that no one can reverse the data ?
There are many, from the trivial "Add up all the bytes and throw away any carry), to MD5 (not recommended for new security applications), SHA (also not recommended), and SHA-512.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
You could have answered this yourself had you just typed your subject line into Google.
How many time have we told you that?
|
|
|
|
|
I have only ever considered "hashing" in the context of a "random access addressing scheme" where multiple values can "hash" to the same address; generating "synonyms".
And now you want to include "hashing" with "data encryption"?
What's the difference between a shirt and a pair of pants?
"(I) am amazed to see myself here rather than there ... now rather than then".
― Blaise Pascal
|
|
|
|