|
Global Assembly Cache | Microsoft Docs[^]
MSDN wrote: The Global Assembly Cache stores assemblies specifically designated to be shared by several applications on the computer.
tiwal wrote: I was convinced that, adding the reference to the project, the dll 's GAC location would be stored The GAC location doesn't need to be stored; it is managed by the .NET environment.
You will still need to add a reference to the dll. The difference is that you no longer have to copy the dll to the local output folder (which VS does for you, usually), but that the app will use the one that is registered in the GAC.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Hi Eddy thanks for answering.
You mean that I still need the <add assembly="" ...=""> tag in the application's web.config ?
Doesn't the application's assembly contain a reference itself ?
The production cluster specialists in my company scolded me for putting the <add assembly="" ..=""> tag in the web. config, but then I showed them how it would behave without it, and they were baffled ....
|
|
|
|
|
tiwal wrote: You mean that I still need the <add assembly="" ...=""> tag in the application's web.config ?
Doesn't the application's assembly contain a reference itself ? It does for WinForms; the references are part of the project-file, and compiled into the assembly. I'd assume ASP.NET does the same.
How the Runtime Locates Assemblies | Microsoft Docs[^] seems to suggest that the config-files are the first location where the runtime looks.
tiwal wrote: The production cluster specialists in my company scolded me for putting the <add assembly="" ..=""> tag in the web. config Why? Any specific reason why it is considered "bad"?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Eddy Vluggen wrote: Why? Any specific reason why it is considered "bad"?
Well I assume they, like me, were expecting everything to work fine without the need to add the specified tags to the web.config ... appearently, we both were wrong....
|
|
|
|
|
I want to print a log whenever an exception is thrown by try-catch block through out whole application.
|
|
|
|
|
What type of application? WPF? WinForms? Xamarin? ASP.NET?
This space for rent
|
|
|
|
|
A try..catch block doesn't throw exceptions; it's used to handle them.
If you want to log all unhandled exceptions, then the code you need will vary depending on what type of application you're writing. You could start with the AppDomain.UnhandledException event[^] and the TaskScheduler.UnobservedTaskException event[^].
If you really want to log every exception, even those which are handled, then you'll need to subscribe to the AppDomain.FirstChanceException event[^]. NB: This will generate a lot of noise. You will be logging every exception thrown in any code, including .NET itself, regardless of whether or not it's handled.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Richard Deeming wrote: the AppDomain.FirstChanceException event[^]. NB: This will generate a lot of noise.
Thank you for that!
Would you happen to know if using this event would cause a significant slowdown, even if the code in the event handler is trivial?
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Unfortunately, I don't. I've never actually used that event. But I think Visual Studio uses something similar - the output window usually shows first-chance exceptions in the log when you're debugging.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
I would like to place tags on 20 documents that are located in labeled folder. After the tags are place like the zipcode, age, and other applicable choices that are located within the conditional survey it should filter based off the person choices and and the specification of the documents was able to filter because of the tags placed in the folders where docs are inside. And once the survey is submitted it will display the folder with doc9 documents that's applicable.
|
|
|
|
|
And?
You haven't described any kind of problem you're having.
|
|
|
|
|
Member 14515421 wrote: I would like to place tags You have my permission
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
|
how to get oulook current user context in adaptive cards and actionable messages onclick of comment/like in email?
|
|
|
|
|
Please do not post the same question in multiple forums.
|
|
|
|
|
Please let me know if this is not the correct location in the boards for this post. I did not see a section for cryptography or for Security.
A piece of accounting software we use that is for a vertical industry use to store our users passwords in a RDBMS as plain text. They did use a substitution cipher so the password was encrypted at a very basic level. They also used a location specif substitution. I don;t know if that is the correct term for this type of substitution cipher but its where the letter you replace changes based on the original character and its position within the encrypted text. For example if the password was password then the text stored might be h^e)7ght . Even though the s is listed twice its substituted text is different because the first instance is in the 3rd position and the next is in the fourth position. The substituted character was always the same based on original character value plus its postilion so the lower case s was always stored as a lower case e when it was in the third potion of any users password. I hope that properly conveys the encryption method the software used and if there is a proper term for this kind of substitution cipher please post and let me know.
With the most recent update the software vendor has moved to a more complex encryption method and I'm puzzled by it because the encrypted text consist of fewer characters then its source. For example if the password is password then the encrypted text consists of 64 characters. If the password is paswordpasswordpassword the encrypted text is 64 characters long. I assume that when the password is less then 64 characters then the process is padding the rest. What puzzles me is when we use a password that is greater then 64 characters in length. If i create a password that consist of 70 characters the encrypted text is still only 64 characters in length. I'm new to this so this may be a dumb question but how can you use fewer characters then the source text you are encrypting?
|
|
|
|
|
Simple: they have found that they have a legal responsibility to secure password storage, and realised that a substitution cipher (or any form of encryption) is fundamentally in secure.
So instead, they are using a hashing algorithm, which cannot be reversed and which always generates a result that is the same length, in your case 64 bytes. (which would imply SHA-512).
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Just to add some background: Have a look here: Password Storage: How to do it.[^] - it explains why hashing and salting are used instead of encryption.
And remember: if an app has any European Union users then GDPR applies and that means you need to handle passwords as sensitive data and stored them in a safe and secure manner. Text is neither of those and the fines can be .... um ... outstanding. In December 2018 a German company received a relatively low fine of €20,000 for just that.
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
|
Message Closed
-- modified 12-Jun-19 10:59am.
|
|
|
|
|
There's no such thing as "opening" a .DLL file. It's just a bunch of code and data. There's nothing to see in them.
You haven't said anything about what you're really trying to do nor on which file. "Open Visual C" doesn't mean anything.
|
|
|
|
|
It may be there just to get the URL in the forum; not much of a real question.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
|
Member 14468470 wrote: Anybody can tell me what can i do. You could start by explaining what version of VisualC, what you are trying to do, and exactly what error you see. The above URL means nothing.
|
|
|
|
|