|
I built a project payroll management system with vb 2012, MS Access 200 db, Crystal Report XI. In report section when I want to see a employee salary detail record for more than 2 year the report showing month year field not arranged like March_2019 than November_2016, January_2018 want to short by November_2016 than January_2018, March_2019. My access db table contain Month_Year format. So please help me to short the report.
|
|
|
|
|
NSE India wrote: So please help me to short the report.
Do you mean "sort?"
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Assuming you're storing the data in the correct data type - ie: as a date - then you need to sort by the raw date value before you format it. Otherwise, it will be sorted alphabetically, and "August 2019" will come before "January 2010".
If you're storing the data as a string instead of a date, then you don't stand a chance. Fix the data storage first.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
I have a project that is referencing Newtonsoft.Json V11, but, some other assembly in my solution is is referencing Newtonsoft.Json V6.
I beleive that some 3rd party assembly is the culprit, but how do I find it? is there a tool to list all assemblies and their dependancies?
Thanks
If it's not broken, fix it until it is.
Everything makes sense in someone's mind.
Ya can't fix stupid.
|
|
|
|
|
|
Hello , I am currently working on a project which requires the use of a custom dll for authentication.
This dll is registered (so they told me) in the GAC of both the Production and Test environments.
The company policies state that you "shouldn't include the dll reference in your application's web.config file", that is, you shouldn't have something like :
<add assembly="" ....="" mydll=""> etc.
in your web.config, at least for this dll I am talking about. They say, since it's registered in the GAC, the application will load it anyway.
The problem is , if you don't add the assemby reference in your web .config , the application is not going to find it , no matter what they say.
Since I am sure the dll is actually registered in the GAC, my question is :
shouldn't the application be able to load the dll anyway , no matter if you add the reference in the web.config or not ?
I was convinced that, adding the reference to the project, the dll 's GAC location would be stored in the application's assembly so that the application itself would be able to find the assembly in the GAC , no matter what the working system is , given that the dll is actually registered in the working system's GAC .
But I must be wrong.
What is the real way it works ?
Thanks
Leo
|
|
|
|
|
Global Assembly Cache | Microsoft Docs[^]
MSDN wrote: The Global Assembly Cache stores assemblies specifically designated to be shared by several applications on the computer.
tiwal wrote: I was convinced that, adding the reference to the project, the dll 's GAC location would be stored The GAC location doesn't need to be stored; it is managed by the .NET environment.
You will still need to add a reference to the dll. The difference is that you no longer have to copy the dll to the local output folder (which VS does for you, usually), but that the app will use the one that is registered in the GAC.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Hi Eddy thanks for answering.
You mean that I still need the <add assembly="" ...=""> tag in the application's web.config ?
Doesn't the application's assembly contain a reference itself ?
The production cluster specialists in my company scolded me for putting the <add assembly="" ..=""> tag in the web. config, but then I showed them how it would behave without it, and they were baffled ....
|
|
|
|
|
tiwal wrote: You mean that I still need the <add assembly="" ...=""> tag in the application's web.config ?
Doesn't the application's assembly contain a reference itself ? It does for WinForms; the references are part of the project-file, and compiled into the assembly. I'd assume ASP.NET does the same.
How the Runtime Locates Assemblies | Microsoft Docs[^] seems to suggest that the config-files are the first location where the runtime looks.
tiwal wrote: The production cluster specialists in my company scolded me for putting the <add assembly="" ..=""> tag in the web. config Why? Any specific reason why it is considered "bad"?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Eddy Vluggen wrote: Why? Any specific reason why it is considered "bad"?
Well I assume they, like me, were expecting everything to work fine without the need to add the specified tags to the web.config ... appearently, we both were wrong....
|
|
|
|
|
I want to print a log whenever an exception is thrown by try-catch block through out whole application.
|
|
|
|
|
What type of application? WPF? WinForms? Xamarin? ASP.NET?
This space for rent
|
|
|
|
|
A try..catch block doesn't throw exceptions; it's used to handle them.
If you want to log all unhandled exceptions, then the code you need will vary depending on what type of application you're writing. You could start with the AppDomain.UnhandledException event[^] and the TaskScheduler.UnobservedTaskException event[^].
If you really want to log every exception, even those which are handled, then you'll need to subscribe to the AppDomain.FirstChanceException event[^]. NB: This will generate a lot of noise. You will be logging every exception thrown in any code, including .NET itself, regardless of whether or not it's handled.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Richard Deeming wrote: the AppDomain.FirstChanceException event[^]. NB: This will generate a lot of noise.
Thank you for that!
Would you happen to know if using this event would cause a significant slowdown, even if the code in the event handler is trivial?
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Unfortunately, I don't. I've never actually used that event. But I think Visual Studio uses something similar - the output window usually shows first-chance exceptions in the log when you're debugging.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
I would like to place tags on 20 documents that are located in labeled folder. After the tags are place like the zipcode, age, and other applicable choices that are located within the conditional survey it should filter based off the person choices and and the specification of the documents was able to filter because of the tags placed in the folders where docs are inside. And once the survey is submitted it will display the folder with doc9 documents that's applicable.
|
|
|
|
|
And?
You haven't described any kind of problem you're having.
|
|
|
|
|
Member 14515421 wrote: I would like to place tags You have my permission
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
|
how to get oulook current user context in adaptive cards and actionable messages onclick of comment/like in email?
|
|
|
|
|
Please do not post the same question in multiple forums.
|
|
|
|
|
Please let me know if this is not the correct location in the boards for this post. I did not see a section for cryptography or for Security.
A piece of accounting software we use that is for a vertical industry use to store our users passwords in a RDBMS as plain text. They did use a substitution cipher so the password was encrypted at a very basic level. They also used a location specif substitution. I don;t know if that is the correct term for this type of substitution cipher but its where the letter you replace changes based on the original character and its position within the encrypted text. For example if the password was password then the text stored might be h^e)7ght . Even though the s is listed twice its substituted text is different because the first instance is in the 3rd position and the next is in the fourth position. The substituted character was always the same based on original character value plus its postilion so the lower case s was always stored as a lower case e when it was in the third potion of any users password. I hope that properly conveys the encryption method the software used and if there is a proper term for this kind of substitution cipher please post and let me know.
With the most recent update the software vendor has moved to a more complex encryption method and I'm puzzled by it because the encrypted text consist of fewer characters then its source. For example if the password is password then the encrypted text consists of 64 characters. If the password is paswordpasswordpassword the encrypted text is 64 characters long. I assume that when the password is less then 64 characters then the process is padding the rest. What puzzles me is when we use a password that is greater then 64 characters in length. If i create a password that consist of 70 characters the encrypted text is still only 64 characters in length. I'm new to this so this may be a dumb question but how can you use fewer characters then the source text you are encrypting?
|
|
|
|
|
Simple: they have found that they have a legal responsibility to secure password storage, and realised that a substitution cipher (or any form of encryption) is fundamentally in secure.
So instead, they are using a hashing algorithm, which cannot be reversed and which always generates a result that is the same length, in your case 64 bytes. (which would imply SHA-512).
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Just to add some background: Have a look here: Password Storage: How to do it.[^] - it explains why hashing and salting are used instead of encryption.
And remember: if an app has any European Union users then GDPR applies and that means you need to handle passwords as sensitive data and stored them in a safe and secure manner. Text is neither of those and the fines can be .... um ... outstanding. In December 2018 a German company received a relatively low fine of €20,000 for just that.
Sent from my Amstrad PC 1640
Never throw anything away, Griff
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|