Что такое премодерация? Добавить QAIX.com в закладки

Привет, Гость
  Войти…
Регистрация
  Сообщества
Опросы
Тесты
  Фоторедактор
Интересы
Поиск пользователей
  Дуэли
Аватары
Гороскоп
  Кто, Где, Когда
Игры
В онлайне
  Позитивки
Online game О!
  Случайный дневник
QAIX
Ещё…↓вниз
 


Зарегистрироваться

Логин:
Пароль:
   

Забыли пароль?


 
yes
Зарегистрируйся и получи дневник!

QAIX > Компьютеры и ИгрыПерейти на страницу: « предыдущуюПредыдущая | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | следующуюСледующая »


вторник, 13 апреля 2010 г.
Hi,We are developing a new web based application where user... Гость 09:28:30
 Hi,

We are developing a new web based application where user authentication will be done via Active Directory (AD).

Following is our configuration.

login-config.xml

<application-policy­ name="HMActiveDirec­otry">
<authentication>
<login-module code="org.jboss.sec­urity.auth.spi.LdapE­xtLoginModule" flag="required" >
<module-option name="java.naming.p­rovider.url">ldap://­IP:389/</module-opti­on>
<module-option name="java.naming.s­ecurity.authenticati­on">simple</module-o­ption>
<module-option name="bindDN">User ID</module-option>
<module-option name="bindCredentia­l">Password</module-­option>
<module-option name="baseCtxDN">DC­=value</module-optio­n>
<module-option name="rolesCtxDN">D­C=value</module-opti­on>
<module-option name="roleRecursion­">-1</module-option>­
</login-module>
</authentication>
</application-polic­y>

Web.xml

<security-constrain­t>
<web-resource-colle­ction>
<web-resource-name>­Doc services </web-resource-name­>
<url-pattern>*.xhtm­l</url-pattern>
<http-method>GET</h­ttp-method>
<http-method>POST</­http-method>
</web-resource-coll­ection>
<auth-constraint>
<role-name>rolename­</role-name>
</auth-constraint>
</security-constrai­nt>

<login-config>
<auth-method>BASIC<­/auth-method>
<realm-name>domain name</realm-name>

</login-config>


<security-role>
<role-name> rolename</role-name­>
</security-role>

jboss-web.xml

<jboss-web>
<security-domain>ja­va:/jaas/HMActiveDir­ecotry</security-dom­ain>
</jboss-web>


Now my confusion is once user enters userId and password in the basic authentication screen, do we need to capture the same, use API and validate the user (OR) LdapExtLoginModule will take the user, password from entered value and will authenticate (which means we don’t have to do anything). If second scenario is the case then how LdapExtLoginModule will get the userid and password is not clear.

I am not getting any proper documentation.

Your valuable inputs will be greatly appreciated.

Many Thanks.

Best Regards,

Roy
Hi Sreeni,We are executing one new project similar like... Гость 09:24:10
 Hi Sreeni,

We are executing one new project similar like you. Can you please help me.

We are developing a new web based application where user authentication will be done via Active Directory (AD).

Following is our configuration.

login-config.xml

<application-policy­ name="HMActiveDirec­otry">
<authentication>
<login-module code="org.jboss.sec­urity.auth.spi.LdapE­xtLoginModule" flag="required" >
<module-option name="java.naming.p­rovider.url">ldap://­IP:389/</module-opti­on>
<module-option name="java.naming.s­ecurity.authenticati­on">simple</module-o­ption>
<module-option name="bindDN">User ID</module-option>
<module-option name="bindCredentia­l">Password</module-­option>
<module-option name="baseCtxDN">DC­=value</module-optio­n>
<module-option name="rolesCtxDN">D­C=value</module-opti­on>
<module-option name="roleRecursion­">-1</module-option>­
</login-module>
</authentication>
</application-polic­y>

Web.xml

<security-constrain­t>
<web-resource-colle­ction>
<web-resource-name>­Doc services </web-resource-name­>
<url-pattern>*.xhtm­l</url-pattern>
<http-method>GET</h­ttp-method>
<http-method>POST</­http-method>
</web-resource-coll­ection>
<auth-constraint>
<role-name>rolename­</role-name>
</auth-constraint>
</security-constrai­nt>

<login-config>
<auth-method>BASIC<­/auth-method>
<realm-name>domain name</realm-name>

</login-config>


<security-role>
<role-name> rolename</role-name­>
</security-role>

jboss-web.xml

<jboss-web>
<security-domain>ja­va:/jaas/HMActiveDir­ecotry</security-dom­ain>
</jboss-web>


Now my confusion is once user enters userId and password in the basic authentication screen, do we need to capture the same, use API and validate the user (OR) LdapExtLoginModule will take the user, password from entered value and will authenticate (which means we don’t have to do anything). If second scenario is the case then how LdapExtLoginModule will get the userid and password is not clear.

I am not getting any proper documentation.

Your valuable inputs will be greatly appreciated.

Many Thanks.

Best Regards,

Sidd
воскресенье, 11 апреля 2010 г.
Hi. I wanted to do exactly the same thing and found your... Гость 19:16:43
 Hi. I wanted to do exactly the same thing and found your post via google now. Since it is a "little" old, I hope you made some progress.

When I first created such a programm, I used trickier but less elegant ways to send.

1) WM_CHAR, as you did
2) Simulating Altdown + unicode of the character entered in numpad + Altup
3) Copying the character to the clipboard and simulating Ctrl+V

I found out that the third way was compatible to most programs. If that didnt work, nothing did.
The problem: The clipboard is blocked by my program then. I am now working on this, I want to buffer the content and restore it after using the clipboard. This turns out to be a bigger pain than expected.

On Windows7 my old C-program always crashes now, I wanted to build a new one in VB6.

It would be nice if you could contact me. If you respond to this, I will give you my ICQ# or something.

Greetings, Mirko
> BLUSHOFFHEY What is... Гость 12:14:04
 
BLUSHOFF

HEY What is this....www.sunnsan­dresortscaliforna.ed­u.ac
суббота, 10 апреля 2010 г.
Development of 64-bit C/C++ applications. Lessons. Thunderbolt 14:38:39
 http://www.viva64.co­m/ru/articles/x64-le­ssons/

The course is devoted to creation of 64-bit applications in C/C++ language and is intended for the Windows application developers who use Visual Studio 2005/2008 environment. Developers working with other 64-bit operating systems will learn much interesting as well. The course will consider all the steps of creating a new safe 64-bit application or migrating the existing 32-bit code to a 64-bit system.

The course is composed of 28 lessons devoted to introduction to 64-bit systems, issues of building 64-bit applications, methods of searching errors specific to 64-bit code and code optimization. Such questions are also considered as estimate of the cost of moving to 64-bit systems and rationality of this move.

The authors of the course: candidate of physico-mathematica­l sciences Andrey Nikolaevich Karpov and candidate of technical sciences Evgeniy Alexandrovich Ryzhkov. The authors are involved in maintaining the quality of 64-bit applications and participate in development of PVS-Studio static code analyzer for verifying the code of resource-intensive applications.

The contents of the course:
Lesson 01. What 64-bit systems are.
Lesson 02. Support of 32-bit applications.
Lesson 03. Porting code to 64-bit systems. The pros and cons.
Lesson 04. Creating the 64-bit configuration.
Lesson 05. Building a 64-bit application.
Lesson 06. Errors in 64-bit code.
Lesson 07. The issues of detecting 64-bit errors.
Lesson 08. Static analysis for detecting 64-bit errors.
Lesson 09. Pattern 01. Magic numbers.
Lesson 10. Pattern 02. Functions with variable number of arguments.
Lesson 11. Pattern 03. Shift operations.
Lesson 12. Pattern 04. Virtual functions.
Lesson 13. Pattern 05. Address arithmetic.
Lesson 14. Pattern 06. Changing an array's type.
Lesson 15. Pattern 07. Pointer packing.
Lesson 16. Pattern 08. Memsize-types in unions.
Lesson 17. Pattern 09. Mixed arithmetic.
Lesson 18. Pattern 10. Storage of integer values in double.
Lesson 19. Pattern 11. Serialization and data interchange.
Lesson 20. Pattern 12. Exceptions.
Lesson 21. Pattern 13. Data alignment.
Lesson 22. Pattern 14. Overloaded functions.
Lesson 23. Pattern 15. Growth of structures' sizes.
Lesson 24. Phantom errors.
Lesson 25. Working with patterns of 64-bit errors in practice.
Lesson 26. Optimization of 64-bit programs.
Lesson 27. Peculiarities of creating installers for a 64-bit environment.
Lesson 28. Estimating the cost of 64-bit migration of C/C++ applications.
Hi everyone,I have the same problem mentioned by Odd B... Гость 11:48:25
 Hi everyone,

I have the same problem mentioned by Odd B :

"When I run under system everythings work fine with
dbms_metadata.get_d­dl.

But under user A I want to see metadata from user B, there is always
the error ORA_31603. Cannot find the object in schema B. Even gave user
dba roles ...
Eample: select dbms_metadata.get_d­dl('INDEX','DIM_ACTI­ON_IDX01',B) from
dual;

When I run this under B, there is no problem. I am using
dbms_metadata.get_d­dl in a package, and want different users to use
this."

Can anyone help me?
Thanks.
Pala.
четверг, 8 апреля 2010 г.
Try adding this right after  Гость 15:14:20
 Try adding this right after </xsd:sequence>

<xsd:attribute name="language" type="OpenCmsLocale­" use="required"/>
I'm struggling with exactly the same problem. Did you ever... Гость 14:18:40
 I'm struggling with exactly the same problem. Did you ever solve this?
понедельник, 5 апреля 2010 г.
plzzzzzzzz Гость 13:17:31
 plzzzzzzzz
Hi,Did you ever get this resolved? I'm having the same... Гость 12:25:42
 Hi,

Did you ever get this resolved? I'm having the same issues trying to connect to a remote JBossMQ instance with Hermes over a puTTY tunnel.

Thanks.
четверг, 1 апреля 2010 г.
:-P ]:-) :'( :-\ :-| :-$ B-) B-) B-) B-) B-) B-) B-) B-)... Гость 09:50:04
 :-P­ ]:-)­ :'(­ :-\­ :-|­ :-$­ B-)­ B-)­ B-)­ B-)­ B-)­ B-)­ B-)­ B-)­ B-)­ =^B­
вторник, 30 марта 2010 г.
i am having the same problem and dont know what the answer... Гость 15:26:27
 i am having the same problem and dont know what the answer is yet!
воскресенье, 28 марта 2010 г.
Hi,I had this script with a lot of left outer join working... Гость 12:37:03
 Hi,

I had this script with a lot of left outer join working, but when i added the command 'order by ' a valid field, the script is not working. am using microsoft sql 2005, shall i need to upgrade to service packs to make this work?
вторник, 23 марта 2010 г.
=,B =,B =,B =,B =,B =,B =,B =,B =,B 8-| :-$ 8-} Гость 15:52:37
 =,B­ =,B­ =,B­ =,B­ =,B­ =,B­ =,B­ =,B­ =,B­ 8-|­ :-$­ 8-}­
понедельник, 22 марта 2010 г.
Heres the strange thing....First off , I cannot remove the... Гость 18:58:49
 Heres the strange thing....
First off , I cannot remove the mysql entry in the "Services" dialog... I've tried everything , including removing any and all entries relating to MySQL , still no go.
Now according to MySQL , you should remove any prior instances.
So , I got rid of it the best I could.
So , I installed the 4.1 version (from MySQL site).....
I also installed the nice,new looking mysqladmin (not that old ugly mysqladmin,but it was included with the install of MySQL).
Now , I can access mysql through the cmd prompt , everything is peachy there....
HOWEVER ! if I try to access MySQL through mysqladmin(the old version) , it never finds it.
HOWEVER ! if I try to access MySQL through mysqladmin(the nice new version) , it says "ERROR 2003: Can't connect to MySQL server on 'localhost' (10061)" .
now I'm using named-pipe method , just as suggested by mySQL due to security , so why is it even trying to run on local-host at all? It cannot do that because my web-server is running off of local-host.
READ the documentation ? you know what , it shouldnt require a 100 page book just to install something.
I mean , wouldnt that kinda compare to creating a tic-tac-toe game using visual basics and then requiring the user to write the source-code.... It just not ethical!
воскресенье, 21 марта 2010 г.
Is there software to do this with dvds? Гость 04:09:05
 Is there software to do this with dvds?
показать комментарии (1)
пятница, 19 марта 2010 г.
Hi, this post wont really be of much help but it might be... Гость 13:45:01
 Hi, this post wont really be of much help but it might be good to know that you are not suffering alone. I get exactly the same error. I'm sure by now you have fixed the problem or bypassed it, if you could tell me what you have done (if anything) i would appreciate it.
Thanx
Mike
показать комментарии (1)
среда, 17 марта 2010 г.
When i run a program VOPT 9 to defragment my external hard... Гость 20:44:45
 When i run a program VOPT 9 to defragment my external hard drive because is much faster i get the error:

An error has occurred accessing this drive.
err=Error reading drive Sys-998, Source=SAS.V.RF

What can be a problem here? i tryied before on my old windows 7 and everything worked fine but now i get this error and on my friends computer too!!!

Thanks to anyone who can help me resolve this problem!
вторник, 16 марта 2010 г.
:-) Гость 12:16:13
 :-)­
воскресенье, 14 марта 2010 г.
The code is awesome, and works well for text, however: it... Гость 17:48:42
 The code is awesome, and works well for text, however: it doesn't seem to work, for numbers, even if they are a string..
How could i acheive this??
thanks man respect B-) Гость 09:22:36
 thanks man respect B-)­
e-cracker Гость 03:48:53
 Hi Friend can some1 tell me where iwil gat e-cracker where i can free download im waiting4 ur all answer thanks GOD Bless u All=^B­
пятница, 12 марта 2010 г.
1) there is no difference between pc5300 and pc5400.2) the... Гость 23:48:08
 1) there is no difference between pc5300 and pc5400.
2) the frequency you are talking about (675) is just make-believe. I comes under the PC5300/5400 modules (frequency number 667)
3) got no answer 4
четверг, 11 марта 2010 г.
yeahhhhhhh Гость 09:00:14
 yeahhhhhhh
среда, 10 марта 2010 г.
ws_runtime.jar in Websphere 6.1This should have everything... Гость 12:39:34
 ws_runtime.jar in Websphere 6.1


This should have everything you need.
12:39:34 robert954
Thanks for this information..... http://www.project-­drive.net/

Добавить новую тему:

Как:
( Зарегистрироваться )
Логин: Пароль:
Тема:
Настройки
Комментировать могут:
Премодерация комментариев:
Пожалуйста, относитесь к собеседникам уважительно, не используйте нецензурные слова, не злоупотребляйте заглавными буквами, не публикуйте рекламу и объявления о купле/продаже, а также материалы, нарушающие сетевой этикет или законы РФ. Ваш ip-адрес записывается.


QAIX > Компьютеры и ИгрыПерейти на страницу: « предыдущуюПредыдущая | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | следующуюСледующая »

читай на форуме:
пройди тесты:
Улыбайся без фальши Био
...
читай в дневниках:
132435

  Copyright © 2001—2018 QAIX
Авторами текстов, изображений и видео, размещённых на этой странице, являются пользователи сайта.
Задать вопрос.
Написать об ошибке.
Оставить предложения и комментарии.
Помощь в пополнении позитивок.
Сообщить о неприличных изображениях.
Информация для родителей.
Пишите нам на e-mail.
Разместить Рекламу.
If you would like to report an abuse of our service, such as a spam message, please contact us.
Если Вы хотите пожаловаться на содержимое этой страницы, пожалуйста, напишите нам.

↑вверх