Thursday, June 30, 2005

RESTORING A DATABASE FROM ANOTHER SQL SERVER

There is more to restoring a database on a new server than simply restoring your backup files. You also have to make sure users andlogins match on the server. This tip will help you through the process.
http://searchsqlserver.techtarget.com/tip/1,289483,sid87_gci1102260,00.html?track=NL-464&ad=521049USCA
MORE INFO:Learn how to use backup and restore to move or copy databases
http://searchsqlserver.techtarget.com/tip/1,289483,sid87_gci1088683,00.html?track=NL-464&ad=521049USCA
More expert advice and tips on backup and recovery
http://searchsqlserver.techtarget.com/topics/0,295493,sid87_tax301326,00.html?track=NL-464&ad=521049USCA

Wednesday, June 29, 2005

INTRODUCING A SERIES OF SEVEN XSLT TUTORIALS

In this article, Ed Tittel provides a sneak peek at his seven-partseries of XML Style Sheet Language (XSLT) tutorials, which will runin his XML tip through September.

http://searchwebservices.techtarget.com/tip/1,289483,sid26_gci1101666,00.html?track=NL-132&ad=518171

HOW TO USE THE SECURITY CONFIGURATION WIZARD COMMAND-LINE TOOL

Windows Server 2003 SP1's Security Configuration Wizard (SCW)includes the Scwcmd.exe command-line tool, which can be used toperform various tasks, from server configuration to analysis. Gethelp performing such tasks in this checklist.Click here for the tip:

http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci1102208,00.html?track=NL-122&ad=521199USCA

WINDOWS SERVER 2003 SERVICES THAT CAN BE DISABLED

One of the most effective ways to secure Windows Server 2003 is to turn off unnecessary services. This detailed Excel spreadsheet lists 102 Windows Server 2003 services, describes each service's function, specifies whether you can safely disable the service, and outlines the ramifications of doing so. The spreadsheet also lists each service's default configuration for specific server roles--domain controller, DHCP server, file server, mail server, and so forth. Download this resource today!
http://ct.techrepublic.com.com/clicks?c=260550-993479&brand=techrepublic&ds=5

Tuesday, June 28, 2005

VIRTUAL PRIVATE SERVERS VIRTUALIZE THE OS

In today's never-ending crusade to reduce IT costs, varioustechniques are used to squeeze every drop of computing power out ofservers. Get a finer-grained and lower-overhead partition through avirtual private server.
Click here for the article:
http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1101189,00.html?track=NL-118&ad=521125
MORE INFO:> VMware or Microsoft? The virtual server choice is yours
http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1070335,00.html?track=NL-118&ad=521125>
Virtual machines conquer space
http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1056784,00.html?track=NL-118&ad=521125

Boffins creates zombie dogs

SCIENTISTS have created eerie zombie dogs, reanimating the canines after several hours of clinical death in attempts to develop suspended animation for humans.

url-> http://www.news.com.au/story/0,10117,15739502-13762,00.html

IMPLEMENTING A FIFO AND A LIFO STACK

Arthur Fuller discusses why you may want to implement a stack in SQL Server--namely, persistence and the audit trail--and then he shows you how to implement a FIFO (first in, first out) and a LIFO (last in, first out) stack.

http://ct.techrepublic.com.com/clicks?c=257658-993479&brand=techrepublic&ds=5

Monday, June 27, 2005

Avoids Burning Coasters

While many CD burners have suitable buffer amounts that should allow you to multitask while burning, this is not recommended. Extra draws on the system resources can reduce the chance for a successful burn, as well as causing errors in otherwise perfect CDs.

If you are running Windows 9x or ME, it might be best if you reboot before beginning a burn. Many times the system will not release memory that was in use by processes that you have used while the computer was on, and can cut severely into available system resources. 70% or higher is recommended before beginning a burn.

So, when burning a CD, the ideal condition is a PC under light use (preferably very little other software running).

Use the System File Checker utility to replace corrupted Windows 2000 files

Microsoft included a command line utility, System File Checker (sfc.exe), which enables you to scan the Windows 2000 protected operating system files for incorrect versions. If this utility detects that a system file is corrupt or has been modified, it automatically replaces that file with the correct version. To use this utility, begin by opening a Command Prompt window. Next, enter sfc /scannow.
For more information on the other options you can use with this utility, enter sfc /?.

Saturday, June 25, 2005

Transfer VHS Movies to DVD

Many people have movies on VHS tape that they would like to get into a digital format for safekeeping. Well, you can use your PC to do this yourself. You need to get a video capture device for your PC as well as a DVD burner. Video capture devices come in varying formats, from PCI cards to USB or Firewire connected devices. Once set up, plug your VCR output into the video capture input and then play the tape on the VCR. The video capture will capture the movie and save it to your hard drive on the fly. It should be noted here that this is pretty intensive fo the PC, especially the hard drive, so make sure you have a lot of free disk space on a pretty fast hard drive. Once the video is captured to your hard drive, you use some DVD mastering software (many times this comes with the video capture device) to burn the movie to your DVD. A lot of DVD authoring programs will allow you to set up your own menu system on the DVD, too.

This can be an economical way to transfer your movies, however it takes a lot of time. The VCR plays at 1X speed, so it will take as long as your movie is to transfer your movie to the PC. And with this on top of setup and editing, this can be time consuming.

Friday, June 24, 2005

CHAPTER DOWNLOAD: INSTALLING AND CONFIGURING REPORTING SERVICES

This chapter from the book "Hitchhiker's Guide to SQL Server 2000Reporting Services," by Peter Blackburn and William R. Vaughn,discusses various installation setups you can use to install andconfigure Reporting Services.

http://searchsqlserver.techtarget.com/general/0,295582,sid87_gci1099769,00.html?track=NL-464&ad=520015USCA

SQL Server performance-tuning worst practices, part 2

url-> http://searchsqlserver.techtarget.com/tip/0,289483,sid87_gci1100228,00.html?track=NL-464&ad=520015USCA

In late March 2005, the first installment of SQL Server Performance-Tuning worst practices was released, and people in the community responded to the article with other worst practices they have observed. (Cont.)

SQL Server performance-tuning worst practices Part 1

url-> http://searchsqlserver.techtarget.com/tip/1,289483,sid87_gci1071463,00.html

Sometimes the best practices do not hit home, but the worst practices do. As such, in this article, the first part in a two part series, we will address a number of the worst practices for SQL Server performance that have been found in the field. These primarily relate to the system performance over the lifecycle of the application. We also will make recommendations for correcting these practices and improving overall system performance. (Cont. )

Tuesday, June 21, 2005

ACCOUNT FOR SCOPE WHEN WRITING STORED PROCEDURES

SQL Server provides the variable @@Identity to solve a particular problem that you may encounter when writing stored procedures. However, the @@Identity value has no concept of scope. Learn how you can work around this issue by using the new Scope_Identity() function.

http://ct.techrepublic.com.com/clicks?c=243518-993479&brand=techrepublic&ds=5

CREATING XPCOM COMPONENTS WITH JAVASCRIPT

Most Web developers are tasked with developing solutions that work for Internet Explorer; however, if you're fortunate enough to have the opportunity to create solutions for Mozilla browsers, you should consider yourself lucky. One of the reasons why I think Mozilla is great is because it gives developers the ability to use Cross Platform Component Object Model (XPCOM) components. Mozilla browsers also introduced XPConnect technology, which allows components to be scripted in and developed with JavaScript. Learn how to create a simple XPCOM component with JavaScript that exposes one method: reverseIt(). This method takes a string parameter and reverses the order of the characters in the string.

http://ct.techrepublic.com.com/clicks?c=243778-993479&brand=techrepublic&ds=5

Associate Sounds to Emails

With Outlook as well as many other email clients, you can set up a series of filters to be run based on the emails you receive. One of the thing you can do, though, is associate a particular wave file from your computer with incoming email from a particular contact. In Outlook, open up the Rules and Alerts dialog by either pressing the button in the toolbar or selecting it via the Tools menu. You will then see an option for playing a sound when you recieve a message from someone. Run through the wizard and you will select the file to play and associate it with a particular recepient.

This can be useful for knowing when an important email comes in without having to look. For example, if an email comes in from your boss, have it play a particular sound. From your family, another sound. Its very similar to setting up different ringtones on your cellphone if certain people call you.

Monday, June 20, 2005

For maximum performance, execute SQL stored procedures with a DataReader (VB .NET)

SQL stored procedures are designed to be more efficient than outside queries. However, any performance boost you gain from using a stored procedure may be lost when you load the whole stored procedure result set into a DataSet. Instead, you should use the SQLDataReader to retrieve the data one row at a time. Luckily, pairing the two together is really quite simple. Consider the following code:

Dim cn As SqlConnection = New SqlConnection( “server=svr1;uid=uid1;pwd=pw1;database=yoursqldb")
Dim myCMD As SqlCommand = New SqlCommand( storedprocedurename, cn)

myCMD.CommandType = CommandType.StoredProcedure
cn.Open
Dim myReader As SqlDataReader = myCMD.ExecuteReader(CommandBehavior.CloseConnection)

If the stored procedure has parameters, you'll need to create a parameter object, supplying the name of the parameter and its SQL data type. For example, you'd use code similar to the following to create an object that accepts an Integer value for input:

Dim param As SqlParameter = myCMD.Parameters.Add( _
parametername, sqlDbType.Int)
param.Direction = ParameterDirection.Input

If your stored procedure returns more than one result set, the DataReader allows you to retrieve the result sets one at a time using the NextResult() method, like so:

myReader.NextResult()

Change the name of the My Computer icon

By modifying the registry, you can change the name of the MyComputer icon to the actual name of your computer or even acombination of your username and computer name. To do so, beginby opening Registry Editor. Next, access the key HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}. In the details pane, double-click on the LocalizedString value. Press [Ctrl]C to copy the contents of this value. Next, openNotepad and choose Edit Paste to paste a copy of the contents of the LocalizedString value.
In Notepad, change "My Computer" to read %UserName% on %ComputerName%.

Next, copy the contents in Notepad. (Select it with your mouse and choose Edit Copy.) Switch back to Registry Editor and delete the LocalizedString value. Choose Edit Add Value. In theValue Name text box, type LocalizedString. From the Data Type dropdown list, select REG_EXPAND_SZ and click OK. In the String text box, press [Ctrl]V to paste the information from Notepad into the text box. Click OK to save your changes. You must restart your computer for this change to take effect.

Introduction to NTP

As a Web developer, you may need to synchronize servers accurately, eitherlocally, or at a distance. At first glance, it seems simple, but not whenyou consider computer clock times, different time zones, etc. Enter theNetwork Time Protocol, or NTP. Among other things, NTP allows machines tosynchronize their clocks.

http://nl.internet.com/ct.html?rtr=on&s=1,1p5s,1,hifl,aq2j,es0i,hcik

How to turn System Restore on or off

The System Restore feature allows a computer system to be "rolled back" or restored to a point in time before certain events occurred. System Restore is enabled in Windows XP by default. Here's how you can turn this feature on or off.
To turn off System Restore, follow these steps:


Click yes when you receive the prompt to the turn off System Restore.
To turn on System Restore, follow these steps:



NOTE: Here are the registry keys that must be modified in order to turn on/off and restrict access to System Restore settings through the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore"
DisableSR"=dword:00000001"
DisableConfig"=dword:00000001

Saturday, June 18, 2005

Identify Your Processes

You can see what's currently running on your system by launching the Task Manager by pressing Ctrl-Alt-Del. In Windows 98 and Me, you will see a simple list of active applications. Windows XP and 2000 will also list all active processes along with their memory usage and CPU time. Don't worry if the System Idle process seems to be hogging the CPU; all unused CPU cycles are assigned to this process.
To identify cryptic processes with names like csrss.exe, you can get help on the Internet. There are a number of Web sites that list and identify those names, one of which is AnswersThatWork.com: Task List Programs.

Make a Password Reset Disk in XP

Do you need to enter a password when booting into Windows XP Pro? Afraid you might forget this password down the road and not be able to run your PC? Make a password reset disk to protect against a lost password.

Run Your Own Non-Microsoft Web Server

This one would be useful especially for people who do web development, but would also be useful to anyone who wishes to host webpages on their PC. I have my PC set up as a web server, not so that I can host sites to the public, but so that I can develop PHP/MySQL code on my machine and run it like I would it a live web server. On one machine, I use IIS, popular server software which comes bundled with Windows XP Pro. However, my laptop comes bundled with Windows XP Home, which does not come with IIS. Furthermore, it would take some hacked workarounds to make IIS work with XP Home (go here for some info if you want to try it out). Microsoft's official position is that IIS will not work with XP Home.

So, what did I do? I went for Apache. Apache is very popular server software with a great price - free. You can download it by choosing one of the available mirrors. For those of you using Windows, make sure you get the Win32 Binary with the MSI Installer. You can then install it like any normal program which makes it much easier.

A quick note for PHP users: If you wish to install PHP on your computer to run with Apache, there is one quick change which must be made to http.conf. Whereas the PHP Installer can automatically configure IIS, you must make this quick change yourself on Apache. Go to this page for data on the change you need to make.

Recover Lost Passwords

This is a short little tip, but could be helpful to many. I've had it happen several times with Internet Explorer...the browser is saving a password for you, but you actually need to know what it is, but all you see is asterisks. A trick is a password recovery utility. Such a utility is Asterisk Key, a free utility from Lostpassword.com. It will reveal the password for almost any program when hidden by asterisks. I should mention, though, that this can be a security risk on your PC, too, so use it carefully.
For info, go to
http://www.lostpassword.com/asterisk.htm

Security Scan your PC

You can get your PC scanned online for security vulnerabilities. Its a good way to test for spyware, virii, or open ports. Here are a list of sites you can check out for this:

http://hackerwhacker.com/

http://scan.sygatetech.com/

http://www.testmyfirewall.com/

http://www.auditmypc.com/

http://www.iggyz.com/Test.html

Change Account Password without Old Password

With Windows XP, you can change an account password without knowing the original password. I should mention that this information could be used to get yourself out of a jam, but also for bad by those shady enough to do it. In Windows XP, go to yoru command prompt and type the following command:

net users Administrator *

or for a username with spaces:

net users "Bob Smith" *

From there, it should ask you for a new password. You can enter it, but pay attention to what you type because the letters will not output to the screen. Confirm your password choice. When done, it will tell you that you were successful.

World Wind

Developed by NASA, World Wind is a program that renders (creates) a 3-D model of the earth, A virtual globe that you are able to turn, shift, rotate and more. World Wind does this with incredible precision, providing a myriad of options, plug-ins, and tools that can be used for any number of purposes. The list of futures just goes on and on, it's really quite something and, as I said before, the program surprised me with it's capabilities and polish. Here's a list of the features that you can read about on the Features page. I believe that most of you will be impressed: 3D engine, Blue Marble, Land Sat 7, SRTM , Animated Earth , MODIS , GLOBE , Country & State Borders , Place Names , Visual Tools , Landmark set.

http://worldwind.arc.nasa.gov/features.html
This program is free, but its also a beast. It requires Windows 2000 or XP and the hardware requirements are:

Intel Pentium 3, 1 GHz, or AMD Athlon or higher
256 MB of RAM
3D Graphics Card
nVidia GeForce 2 Ultra
ATI Radeon 7500
Intel Extreme Graphics 2
DSL / Cable connection or faster
2 GB of disk space

But, if your PC can handle it, this program is incredible. You can zip all over the globe and get satellite imagery. Its a lot of fun.

Remove Ghost Entries from Add/Remove Programs

Every so often, it happens. You have already uninstalled a program yet it is still showing up in your Add/Remove Programs list. Many people will try to uininstall it again from this list, but that will simply produce an error. The way to remove it once and for all is to remove it from the registry. To do so, go to Start > Run and type in "regedit". Once in the Registry Editor, navigate to HKEY_LOCAL_MACHINE > Software > Microsoft > Windows > CurrentVersion > Uninstall. In there, you will see a folder for every program shown on your Add/Remove Programs list. Simply find the one you want to go away, right-click on it and choose Delete. Next time you go to Add/Remove Programs, it should be gone.

Do IP Lookups

Sometimes on the internet you get an IP address but have no idea who it is. Whether it be an IP address which is being blocked by your firewall or you are doing a lookup to see who is spamming you, you can do a quick lookup of an IP address using a tool which is already on your PC. In Windows 2000/XP, go to Start > Run and type in "command" and press enter. At the command prompt, enter "nslookup xx.xx.xx.xx" (where the xx stuff is the IP address). The output will be first some info about your ISP, then it will give you the IP address you entered and the domain it is resolving to. This can help you get some meaning behind those cryptic numbers.
For Windows 9x/ME users, you can head on over to www.dnsstuff.com and do the same (plus they have a lot of other useful tools, too).

HiJack This!

Most of us have had this happen (especially Internet Explorer users). Our browser gets hijacked and the homepage button goes to some annoying search site. Sometimes the error pages even get re-routed. Sometimes resetting this is as easy as re-entering your desired homepage, but other times that would be futile because the spyware simply rewrites its own choice of homepage back to your configuration. You might want to try out a program called HiJack This!. It acts like a kind of firewall for your browser, preventing these kinds of programs from ever having the option to install themselves. The program has all sorts of options and tools you can use and not just to protect your homepage. It has an ignore list, a list of running processes, DLL's, and a startup list. It does this because the program doesn't target specific URLs but rather knows the tricks they use in order to hijack your browser. The program also creates backups as it goes to help you out if you paint yo
Check it out at
http://merijn.org/downloads.html.

Firefox Configuration

Many Firefox users might not be aware of the fact that the browser has a lot more configurable options than is easily available in the GUI. To access them, type "about:config" into the location bar and press Enter. You will then see a long list of variables, whether they are default or user modified, and their current value. Now the inevitable question is obviously "What the hell does all that gibberish do?". No fear, my friend. Head over to the Mozillazine knowledge base and learn all about it.
Happy tweaking!

Convert Your Tapes to MP3

Cassette tapes have pretty much gone the way of the dodo bird, and I like most of you have a collection of them which I never use anymore. Recently the manufacturer of Plusdeck (www.plusdeck.com) contacted us about doing a review on their PC cassette deck drive and that review will be published as soon as I can complete the review, but I thought I would give you a preliminary look at it in this tip. Those of you who would like to safeguard the music on your tapes and then ditch them, you might want to look at an option like this. Of course, you can pull something like this off using a regular cassette deck and the Line-In on your sound card, but the review will outline the benefits of both.
Happy converting!

Log on for Tune Up

We all know there is nothing better than knowledge when it comes to troubleshooting and optimizing your own computer, and the place to go for that is, of course, PC Mechanic. However, there is a site that will help you do a quick analysis of your PC's components and puts your system to the test and that is PC Pitstop. After registering with the site, you can perform a full test of your system. It will then recommend to you some fixes and optimizations and will show you how to do them. Keep in mind that some of the problems it may find may require some interpretation on your part because some of the "serious errors" may be totally deliberate on your part. Also, the tests use ActiveX components and javascript to run from your browser. They are safe, but you must allow these components to operate to use the service.
Best of all, it is free.
Check it out at www.pcpitstop.com.

Be a Smarter Shopper

If you are planning on buying hardware, software or some consumer electronics, you might want to check out TechBargains. This site helps you to stay in tune with the latest mail-in rebate offers, coupons and other deals from vendors. Go to www.techbargains.com/rebates.cfm to see the latest mail-in rebates. If you are having any problems receiving your rebate checks, go to the Vendor Info page (www.techbargains.com/vendorinfo.cfm) to get their contact information. The page also allows you to search for vendors located in states which do not charge taxesm offers free shipping, or ships internationally.

System Configuration Editor

Another little hidden tool in Windows XP, accessible via the Start Menu Run line is the System Configuration Editor. Accessed by typing "sysedit" at the Run prompt, the utility opens up the following files for editing:
System.ini - Initialization file initialize system settings for the computer such as the fonts, keyboard, language and various other settings.Win.ini - used to load various settings each time Windows boots, for example the communications drivers, wallpaper, screen saver, languages, fonts, etc... are loaded each time the win.ini is initialized.Config.sys - used for loading various drivers and other items. Not used anymore in later versions of Windows, but is still there.AutoExec.bat - used to load up software automatically when booting, but again, this is from the MS-DOS and Windows 3.x days.

Be careful making changes by hand in these files.

Private Character Editor

Yet another utility included with Windows XP that is hidden from GUI view...Private Character Editor. The description follows:
Using Private Character Editor (PCE), you can create up to 6,400 unique characters (such as special letters and logos) for use in your font library. PCE contains basic tools for creating and editing characters, along with more advanced options.
The utility has an embedded help file, so you can go through it to figure out how to use it. To access the program, type "eudcedit" at the Start Menu / Run line.

Alt-Tab Enhancement for Windows XP

Most Windows users know that they can switch between multiple open applications quickly by using the ALT-TAB shortcut. But, the built-in interface for this is quite simplistic, and sometimes switching among a large list of open programs can be a little challenging. TaskSwitchXP Pro is a free enhancement to ALT-TAB for Windows XP. Once it is started, the ALT-TAB window will display live images of the open programs in a little window, icons and a description of the program. This can be quite useful for those times when you have several documents open in the same program. Now, instead of seeing several identical icons in ALT-TAB, you can see full document views to allow you to see which one you want to view.
The program is free and open source.
Go over to
www.ntwind.com/taskswitchxp/
for more info.

Record MP3 Files from Internet Radio

StreamRipper32 is a free Open Source Windows program that allows you to save native format MP3 files from streamed sources such as internet radio. What's really neat is its ability to interpret and extract MP3 metadata from the stream. This means that the saved data will be in the form of separate MP3 files rather than one continuous recording. StationRipper is another utility that takes the same concept further. It's got a more user-friendly interface, an inbuilt database of radio stations and can process up to 600 different streams. It can also record podcasts. If you can afford the asking price of $14.99 I'd go for this. If not, the freeware StreamRipper32 will still do what you want, though in a slightly less convenient manner.
streamripper.sourceforge.net/sr32/

Test Websites in Multiple Browsers

For those of you who create websites, you know that different browsers render things a bit differently. For smaller sites, it might be OK to design for the common denominator (which is usually IE). However, large, highly trafficked sites need to work on almost all browsers. I do web development for a living (outside PCMech, of course), and I recently had a client who used exclusively Macs. The system I came up with worked beautifully in all PC browsers I had installed, however it was totally messed up in IE for the Mac as well as Safari. It would take forever for me to make a change and have her send me a new screenshot. I don't have a Mac nor access to one readily. In doing some net searching, I found a very cool site and that was BrowserCam - www.browsercam.com. With their site, you can have screenshots taken of any URL using any browser they have. They have all PC browsers you're likely to encounter as well as all Mac brows
This is an incredible tool for webmasters and designers.

www.browsercam.com

Download Old Software

Sometimes companies issue updated versions of their software which just doesn't work as well for all of us as the old version did. Or, in some cases, we're just use to the old versions and don't want to change. There is a site which may be of help. www.oldversion.com makes available downloads to many common programs we all use, but older versions of them. The selection is not huge - 51 separate programs at the time of this writing. However, useful for people who want them. For example, several months ago I installed the new version of ZoneAlarm and found it not to be as stable as an older version. I used this site to download the old version of ZoneAlarm.

Check out www.oldversion.com.

Thanks to Ben (DragonNOA1) for sending in this information.

Printing System Properties

You can easily print off a copy of your system properties and have it available for future reference in the event of your system being down. To do so, go to your Device Manager. As a reminder to some, you can find your device manager by right-clicking on "My Computer" and choosing Properties. Then, 9x/ME users go to the device manager tab. 2000/XP users click on the Hardware tab and then the device manager button. Once in the device manager, there's more. 9x/ME users right-click on "Computer" and choose Print. For 2000, select the main computer by clicking the computer icon at the top, then use the Print option in the View menu. In XP, do the same, except you'll find the print function in the Actions menu.

Friday, June 17, 2005

ADVANTAGES OF THE OPENOFFICE.ORG XML FILE FORMAT USED BY THE STAROFFICE OFFICE SUITE

The StarOffice office suite is based on an open source project that was founded by Sun Microsystems and the OpenOffice.org organization. As a result, both the StarOffice and OpenOffice.org office suites use exactly the same file format. This Sun white paper looks at the benefits and business aspects of an extensible Markup Language (XML) file format.

http://ct.techrepublic.com.com/clicks?c=237894-993479&brand=techrepublic&ds=5

CREATING XML MAPPINGS IN EXCEL 2003

Microsoft Office Excel 2003 improves support for using native XML by enabling you to add your own XML Schema Definition (XSD) to a workbook. This creates an XML map that you can use to make data more meaningful upon importing or exporting data. Thus, you can import data conforming to a custom XML vocabulary or schema, and then write the data back out by using the same XML schema.

http://ct.techrepublic.com.com/clicks?c=237893-993479&brand=techrepublic&ds=5

PREVENT BUGS BY FILTERING INPUT IN VB6

Once you discover a program contains a bug, it can take up hours, or even days, of your valuable time to determine what's causing the problem. Take preventive measures by filtering input, such as accepting numbers only in a TextBox, in your VB6 programs.

http://ct.techrepublic.com.com/clicks?c=237933-993479&brand=techrepublic&ds=5

Be Safe When Using a WiFi Hotpost

People with notebook PCs on the go from time to time connect to the internet using a WiFi hotspot. For those not in-the-know, this is basically the slang term for a spot that has a wireless network which you can tap into and get online. I myself use them from time to time. Some restaurants have them. Sometimes I need to get some work done while awaiting an appointment and I'll stop in at a bookstore and use their hotspot. However, there is security risk to these hotspots because, in many cases, the network is not secure, so if anything on your notebook is shared, that means others can see it to. In addition, a hacker with a packet sniffer could actually sniff your data traveling across the network and log it for the later entertainment. So, how can you secure yourself on these public wireless networks?
- If you're not actually using the network, disable your network card. Most notebooks have a button where you can turn off the wireless capability.
- Use a firewall such as ZoneAlarm.
- If you are going to enter any sensitive information over this network, make sure the site is secure (look for the little lock in the bottom corner of your browser).
- Make sure your system is up to date (to plug security holes)
These are just the basics, but important for you street-side net surfers.

Thursday, June 16, 2005

MICROSOFT ASKS FOR HELP FROM HACKERS

Microsoft held a two-day gathering in March, during which time outsiders were invited into the heart of the Windows empire for the express purpose of exploiting flaws in Microsoft computing systems. This "Blue Hat" event exemplifies how important security has become for the software giant. In fact, Microsoft plans to do this again in the future.

http://ct.techrepublic.com.com/clicks?c=236786-993479&brand=techrepublic&ds=5

CHAPTER DOWNLOAD: XML INTEGRATION

This chapter from the book "Microsoft SQL Server 2005 New Features,"by Michael Otey, serves an introduction to the most important new XMLfeatures provided by SQL Server 2005.

http://searchsqlserver.techtarget.com/general/0,295582,sid87_gci1095841,00.html?track=NL-464&ad=518946USCA

MAXIMIZE LARGE DATA WITH NEW MAX DATA TYPES

SearchSQLServer.com
Learn why MAX data types add a great element of flexibility tohandling large data in SQL Server 2005 and how you can benefit.

http://www.searchSQLServer.com/tip/1,289483,sid87_gci1098157,00.html?track=NL-464&ad=518946USCA

MORE INFO:More expert advice and tips on SQL Server 2005

http://searchsqlserver.techtarget.com/topic/0,295492,sid87_tax301323,00.html?track=NL-464&ad=518946USCA

AUTOMATE YOUR VISUAL STUDIO .NET BUILD PROCESS

If you're doing a thorough job, then doing a build means more than compile-and-run. It's a series of distinct, organized steps that ensure continuity in source handling and validation of each change made to a component. One of the most effective ways to avoid problems when performing the application build process is through automation. This download shows you how to automate the build process in Microsoft's Visual Studio .NET with a batch file and by using the nUnit class library.

http://ct.techrepublic.com.com/clicks?c=236236-993479&brand=techrepublic&ds=5

INSTANTLY CREATE RESTORE POINTS IN WINDOWS XP

Windows XP's System Restore utility automatically creates a Restore Point if it senses a change to the system, or even some application, files. If you'd like to instantly create a Restore Point, read this tip to find out how all it takes is two lines of VBScript.

http://ct.techrepublic.com.com/clicks?c=235829-993479&brand=techrepublic&ds=5

Beware Fake Security Warnings

Sometimes you'll be surfing the web and a window pops up that looks like a legitimate warning from Windows. Before you click, read carefully and you'll find that it's just a pop up ad trying to entice you to a product site by clicking "Yes" and "OK". Some even put a "Cancel" button on there, which of course does not cancel but actually takes you to their website.

Pop-ups are becoming more and more annoying, but yet a necessary evil in the world of internet advertising. And advertisers have been getting increasingly creative at ways to get you to click their ad. If the ad says it has found a security problem on your PC and asks you to click, just click the X at the top of the window to close it and go on your way. Even there, be careful to click the actual Windows X and not one that might be part of the ad.

Wednesday, June 15, 2005

New Microsoft Certified Architect Credential Unveiled

AT TechEd 2005, Microsoft announced a new Microsoft Certified Architect program that sets very high standards for successful certification. It is intended to identify top industry experts in IT architecture. These top experts will have at least 10 years of IT architecture experience, and be able to build and present solutions to complex business problems.Mastery of many skills is mandated, including: leadership, technology depth, technology breadth, strategy (frameworks), the ability to understand and navigate organization dynamics, tactical/process skills, and communication skills.For more on this exciting new certification, read the full GoCertify article:

http://www.gocertify.com/article/microsoftarchitect.shtml

ASK THE EXPERT: RESETTING ADMINISTRATOR PASSWORD

SearchWinSystems.com

Dear Bernie: I have a Windows XP laptop that was recently upgradedwith SP2. I discovered a couple of Trojan viruses and attempted toremove them. After I restarted XP, I received errors for my adminpassword and now I am locked out as an administrator. What can I to fix this? Read Bernie's response:

http://www.searchWinSystems.com/ateQuestionNResponse/0,289625,sid68_cid938067_tax299749,00.html?track=NL-120&ad=519390

To ask OS Troubleshooting Expert Bernie Klinder a question, clickhere:

http://searchwinsystems.techtarget.com/ateQuestion/0,289624,sid68_cid575699_tax299749,00.html?track=NL-120&ad=519390
To see all of Bernie's expert responses on OS Troubleshooting, click here:

http://searchwinsystems.techtarget.com/ateAnswers/0,289620,sid68_cid575699_tax299749,00.html?track=NL-120&ad=519390

ASK MICROSOFT: HOW CAN I AUTOMATE DISK DEFRAGMENTER?

A manager for Microsoft's internal IT organization talks about how to automate Disk Defragmenter using the Task Scheduler tool in WindowsXP.

http://www.searchWinSystems.com/originalContent/0,289142,sid68_gci1097119,00.html?track=NL-120&ad=519390

MAKE OFFICE REPAIRS USING COMMAND LINE

A simple command-line method of repair will become an importantaddition to your toolbelt if Office 2000 or Office XP installationsbecome corrupted.

http://searchwinsystems.techtarget.com/tip/0,289483,sid68_gci1091501,00.html?track=NL-120&ad=519390

For data retrieval with low overhead, give the DataReader a try

The DataSet is probably the most common tool for handling datain .NET. However, if you only need to retrieve small amounts ofdata for the purpose of displaying it, all the overhead of theDataSet to support two-way communication between the database andyour .NET program is unnecessary. With the .NET DataReader, youcan retrieve a read-only, forward-only stream of data and dump itout one row at a time.

The first few steps for creating a DataReader should soundfamiliar. You start with a Connection, pass it aConnectionString, create a Command object, and open theConnection. From this point, to retrieve the data, you just needto call the ExecuteReader command. The following lines of codeillustrates the process if you were working with a SQL database:

Dim cn As SqlConnection =New SqlConnection("server=svr1;" _
"uid=uid1;pwd=pw1;database=yoursqldb")
Dim myCMD As SqlCommand = _
New SqlCommand("SELECT * FROM SomeTable", cn)
myCMD.CommandType = CommandType.Text
cn.Open
Dim myReader As SqlDataReader = _
myCMD.ExecuteReader(CommandBehavior.CloseConnection)

Once you create the SQLDataReader, you'll treat it just like youwould a Recordset in classic ADO. You repeatedly call the Read()method until the DataReader retrieves all the rows. A While loop,similar to the one in the next set of code, works wonderfully:

Do While myReader.Read()
'get data
Loop

Two Dozen of Don Kiely's Favorite System Stored Procedures

SQL Server contains a wealth of features that you can use in your own stored procedures and applications. This article explores a couple dozen of my favorite system stored procedures, including extended stored procedures and several that are undocumented.
by Don Kiely

url-> http://www.devx.com/codemag/Article/28264/1954?pf=true

EXPOSING PRODUCT INFORMATION VIA WEB SERVICES

The .NET Framework simplifies the Web service creation process. Last week, demonstrated how to make product information available via one or more Web services--the product information is contained in the standard Northwind database available with most SQL Server installations--and now show you how to create a Web service.

http://ct.techrepublic.com.com/clicks?c=232581-993479&brand=techrepublic&ds=5

Intro to PCI Express

Many newer motherboards are now using the PCI Express interface, or PCI-E. Here is a definition, courtesy of PCWebopedia:
An I/O interconnect bus standard (which includes a protocol and a layered architecture) that expands on and doubles the data transfer rates of original PCI. PCI Express is a two-way, serial connection that carries data in packets along two pairs of point-to-point data lanes, compared to the single parallel data bus of traditional PCI that routes data at a set rate. Initial bit rates for PCI Express reach 2.5Gb/s per lane direction, which equate to data transfer rates of approximately 200MB/s. PCI Express was developed so that high-speed interconnects such as 1394b, USB 2.0, InfiniBand and Gigabit Ethernet would have an I/O architecture suitable for their transfer high speeds.
The PCI bus has been basically the same for many years now while most other components in the PC have been increasing in speed. It is easy to see how these newer hardwares can completely saturate the PCI bus. So, PCI-E is the new incarnation of PCI which offers increased speed through higher bandwidth, dedicated data lines. The switch to a serial interface rather than parallel also means the connectors are smaller and there is less signal degradation.
If you are looking at doing a major PC upgrade, you might want to look at PCI Express as an option. The industry will slowly adopt it as a norm.

Tuesday, June 14, 2005

ASP.NET 2.0 PROVIDES CLEANER, DEVELOPER-FRIENDLY CODING

The people that create software tools know there are trade-offs to bemade between easing the developer's burden and giving the developerreal power to create. With ASP.NET 2.0 Microsoft tool makers tooksome interesting approaches to such trade-offs. They have includedcontrols that vastly reduce the amount of coding needed to implementlog-in dialogs and to create breadcrumb navigation bars on Web pages.But they have also removed some nuisances that used to come right outof the "ASP.NET" box, such as automatic re-formatting of HTML sourcecode and start-up project folders that came already populated withspecial Microsoft artifacts.
http://searchvb.techtarget.com/tip/1,289483,sid8_gci1097711,00.html?track=NL-283&ad=518087USCA

MORE INFO:ASP.NET Resources

http://searchvb.techtarget.com/originalContent/0,289142,sid8_gci1080892,00.html?track=NL-283&ad=518087USCA

EXPLORE THE CAPABILITIES OF MOZILLA'S XML PROXY CLASS

The XMLHTTP component allows you to transfer data to the server and receive data from the server without navigating from the current Web page. Mozilla's response to this was to create its own inherent XML proxy: the XMLHttpRequest class. The XMLHttpRequest object behaves basically like the XMLHTTP component. The methods and properties are similar; however, all the methods and properties begin with a lowercase letter, and there isn't support for some properties.

http://ct.techrepublic.com.com/clicks?c=229744-993479&brand=techrepublic&ds=5

Identify Windows Processes

Looking at the process list in Windows is a trip down confusion lane. You might recognize some of them by filename, but in most cases you won't. In such a case, how would you know if the process is legitimate or some spyware program running in the background? Its easy - search the internet. And while you can go and Google it, I have a site for you -

www.processlibrary.com.

The site is published by Uniblue Systems, the people behind WinTasks Professional. Do a search for the process name or a DLL and you will get a full description (in English) of what the process is and any potential security risk. Can be quite useful, and Uniblue is in the business, so they keep it pretty up to date.
If you want this information right on your PC, check out WinTasks 5. It will help you identify your Windows processes, but also offer you fine-tuned control over them, and hence your whole PC.

Monday, June 13, 2005

W2K Tip: Use Dsrevoke.exe to undo the changes made by the Delegation of Control Wizard

Use Dsrevoke.exe to undo the changes made by the Delegation of Control Wizard
The Delegation Of Control Wizard in Active Directory Users and Computers makes it easy for you to delegate the management of an organizational unit to a user or group. Unfortunately, if you want to undo this delegation, there really isn't any easy way for you to do so. (There isn't a wizard or dialog box to undo these changes.) In the past, to revoke the actions of the Delegation Of Control Wizard, your only choice was to manually remove the permissions it assigns. To help you avoid such time-consuming work, Microsoft released a command line utility that enables you to undo the actions of the Delegation Of Control Wizard: Dsrevoke.exe.
You can download Dsrevoke.exe and its documentation by going to

http://www.microsoft.com/downloads/details.aspx?FamilyID=77744807-c403-4bda-b0e4-c2093b8d6383&DisplayLang=en.

We recommend that you copy the Dsrevoke.exe file to the \%SystemRoot%\ folder so it will be in your search path when you run it from a Command Prompt window. You can run Dsrevoke.exe on Windows 2000, Windows XP, and Windows Server 2003 computers to revoke the permissions delegated in Windows 2000 or Windows Server 2003 Active Directory domains.
To remove the permissions assigned by the Delegation of Control Wizard, use this basic syntax:

dsrevoke /remove domain\account_name

Replace domain\account_name with the appropriate values for your environment, and use quotes if the account name contains a space. When you enter this command, you'll be prompted to confirm that you want to remove the permissions delegations. Type Y for yes, and press [Enter].
Unless you specify otherwise, this command deletes all permissions assignments to the user or group for your domain. If you want to delete only the permissions assignments within an organizational unit (OU), you should use this command instead:
dsrevoke /remove "/root:ou=ou_name,dc=domain,dc=domain" domain\account_name
In this syntax, replace ou_name with the name of the OU from which you want to remove the user or group's permissions. Replace dc=domain, dc=domain with the appropriate portions of your organization's DNS domain name. For example, if your domain name is company.com and you want to remove the Marketing Managers group's delegated permissions from the Marketing OU, you should use this command:

dsrevoke /remove "/root:ou=Marketing, dc=company,dc=com"

BUILDING PROTOCOL INDEPENDENCE IN A SERVICE-ORIENTED ARCHITECTURE

Designing an effective distributed software system becomes especially tricky when considering the fact that services and processes might need to interact with each other across multiple protocols. Because of the way most distributed systems encapsulate the protocol details of inter-process communication, it can be difficult to update your system when protocols change. A service-oriented architecture (SOA) depends on a minimum amount of interdependencies between services. This download explains how to build protocol independence into every aspect of your enterprise-wide system using the protocol abstraction layer and the SOAP binding framework. Download Building protocol independence in a service-oriented architecture.

http://ct.techrepublic.com.com/clicks?c=227756-993479&brand=techrepublic&ds=5

How do you handle protocol changes across your organization? Did you build protocol independence into your system? Do you now wish you had? Join the discussion on protocol independence.

http://ct.techrepublic.com.com/clicks?c=227757-993479&brand=techrepublic&ds=5

Keep Firefox Updated

As Firefox becomes more and more popular, its security problems will get more play. As said before, its not that Firefox is magically safer than IE...its just not as popular. However, the Mozilla group is quite fast usually at issuing updates. To know if an update exists for you, look for the little red arrow icon in the upper right corner of the Firefox window. If it is there, click on it to download the update. Unfortunately, they do not yet issue patches, so you will need to download the entire package and it will re-install over the old one (you will not lose any settings). After installing, just make sure to restart the browser.
In May 2005, Firefox 1.0.4 was released. 1.0.3 contained bugs. The two nastier vulnerabilities are the Cross Site Scripting which can be used to steal information on you and your online accounts, and remote system access which allows the hackers to potentially take control of your system. The fix was issued very quickly, and its recommended that all Firefox users update their software.

Sunday, June 12, 2005

Safely Remove USB Devices

USB devices are plug-and-play, meaning you should be able to plug them in and remove them whenever you please. This remains the case, however this is a caviat. The USB device receives power from the USB port and if that current is suddenly shut off, the jolt of removing the "hot" connection could result in possible data loss. To get around this problem, Microsoft put in a "Safely Remove Hardware" icon down in the XP system tray. When you click it, you will see a list of USB devices which are connected. Highlight the one you wish to remove and click. It will then tell you it is safe to remove the hardware.

We'll call this the "correct" way to remove a USB device.

Control Text size with your Scroll Wheel

If you are in a web browser (Explorer or Netscape) or reading an email in Outlook Express, hold down your Ctrl key and spin the scroll wheel on your mouse (if you have one). It makes the text larger or smaller depending on which way you spin. For Opera users, it magnifies both the images and the text. This is a simple, but useful shortcut for people who have a hard time reading the small text on some websites. Plus, you can impress some novices with your skill.

Friday, June 10, 2005

UNDERSTAND THE LIFE CYCLE OF VB6 FORMS

It's important for VB6 programmers to understand forms' well-defined life cycle. Although the life cycle only consists of three stages, you need to comprehend the complex process in which forms travel through these stages.

http://ct.techrepublic.com.com/clicks?c=224342-993479&brand=techrepublic&ds=5

Make XP Enter Safe Mode With USB Keyboards

Safe mode, as we've addressed before, is a barebones mode of Windows which is useful for troubleshooting purposes. Typically, one gets into safe mode by restarting and either holding the CTRL key down or by pressing the F8 button at the right time. This would give a menu with boot options, of which safe mode is one of them. However, if you use a USB keyboard, this isn't an option for you because the USB drivers are not loaded in the DOS environment. For you, you need to tell Windows to load up in safe mode on its next reboot when in regular Windows. To do this, go to the start menu, Run, and enter "msconfig" to launch the System Configuration Utility. Click on the BOOT.INI tab and check the box which says "/SAFEBOOT". Now, when you reboot, it will enter safe mode automatically, and will continue to do so until you go back into this program and uncheck that box (which you can do from safe mode).

Thursday, June 09, 2005

Developing Windows Forms Applications on Mono

url: http://www.devx.com/opensource/Article/28270

Developing cross-platform programs that rely on Windows Forms takes a big step forward with the latest release of the Mono platform.
by Paul Ferrill

Cross-platform software development means different things to different people. For many programmers immersed in Microsoft languages such as VB.Net or C#, the real test comes down to creating a Windows Forms-based application in one of those languages, compiling it to MSIL, and running the resulting EXE file on the desired target platform, such as Linux or OS X. The Mono project is getting close to making that dream a reality. (more ... see url)

THE EVOLUTION OF C++ GIVES APPLICATION DEVELOPERS AN EDGE

In this TechRepublic interview, Scott Meyers talks about some of the most significant changes he has seen take place in the C++ universe and how those changes have given an edge to application developers.

http://ct.techrepublic.com.com/clicks?c=222534-993479&brand=techrepublic&ds=5

In his book, Effective C++: 55 Specific Ways to Improve Your Programs and Designs, 3rd Edition, Meyers discusses some of the best practices programmers have established for C++. An excerpt of that book is available as a free download.

http://ct.techrepublic.com.com/clicks?c=222535-993479&brand=techrepublic&ds=5

GET WINDOWS XP'S BACKUP UTILITY TO USE RECORDABLE OPTICAL MEDIA

Learn a workaround that will allow you to indirectly make Windows XP's Backup utility use recordable optical media as a backup destination. Be sure to notice that the author points out that you need to ensure your backup file fits on one CD.

http://ct.techrepublic.com.com/clicks?c=222461-993479&brand=techrepublic&ds=5

Restore Missing System Files

Every once in awhile, an essential system file of Windows disappears or gets corrupted. No, you don't need to re-install Windows. You can simply restore the file. To do so, put your Windows CD into the CD-ROM, then select Search from the Start menu. Search the CD for the file you are missing, leaving the last character of the filename as an underscore (for example, calc.exe would be calc.ex_). If it is found, open up a command prompt and then type "expand" followed by the full path to this file, a space, then the path where you want it to be sent. If either of these paths has a space in it, surround the path in quotes.
If the file cannot be found, its probably because the file is located in a CAB file. CAB files are like folders in that they contain a bunch of smaller files. I think of them as CABinents, but that's just me. In this case, just open the CAB file in Explorer, find the file you need and drag it to the location you need it.

Wednesday, June 08, 2005

USE .NET TO DEVELOP AND IMPLEMENT A WEB SERVICE SOLUTION FROM START TO FINISH

Many development shops have been a little hesitant to jump on the Web services bandwagon right away???and with good reason. There are so many new technologies and protocols that come out that it can be difficult to discern what's going to be imperative to learn and what you shouldn't waste your time studying. One technology or group of technologies that certainly merits attention is Web services. Companies like Amazon and eBay have embraced the technology by exposing their services to the public, thus adding respectability to the technology. In this first in a series of articles, you are walked you through the process of developing a Web service from start to finish and consuming it with various clients. Stay tuned for next week's installment.

http://ct.techrepublic.com.com/clicks?c=220284-993479&brand=techrepublic&ds=5

OFFICE 12 JUMPS TO XML

In a move that could bring a chorus of both cheers and jeers, Microsofthas committed to adopting XML technology as the default file format inthe next version of Office, expected to enter beta testing this fall.

http://newsletter.infoworld.com/t?ctl=DCE0C3:351E2F9

MICROSOFT DETAILS LONG-RANGE INDIGO PLANS AT TECHED

ORLANDO, Fla. -- Long-range plans for Microsoft's Indigo Web servicestechnology include enabling its use on handheld devices, a companyofficial said at the Microsoft TechEd conference here on Mondayafternoon.

http://newsletter.infoworld.com/t?ctl=DCE0C5:351E2F9

Create a Main subroutine to manage forms in a project (Visual Basic .NET)

If you have multiple forms in your project, you're probably tired of visiting the Property Pages dialog box to change the Startup Object each time you want to test a different form. However, you can save yourself a little aggravation by creating a Main module and loading your forms from it. First, to create a new module, select Project Add Module from your projects main menu. Then, add a subroutine named Main() to the code window. Inside the module, insert some code that will allow you to load one of the forms in your project, like we've done here:

Public Sub Main()
Dim myForm As Form
Dim formname As String
formname = InputBox("Please enter a form name", "Form1")
Select Case formname
Case "Form1"
myForm = New Form1
Case "Form2"
myForm = New Form2
Case Else
MsgBox("Form does not exist")
Exit Sub
End Select
myForm.ShowDialog()
myForm = Nothing
End Sub

In this code, we used an InputBox to choose a form and a Case statement to create a new Form object based on our form selection. The code loads the form with the ShowDialog method. While this code isn't the best or only way to accomplish this task, it's simple and effective. To automatically execute the Main module when you run your project, re-visit the Property Pages dialog box and change the Startup Object to Sub Main and click OK.

Key information sources for running ODBC on non-Windows platforms

If you're looking for a simple way to connect your server-side code with a database, or want your code to work with as many data sources as possible, you can use the old standby, Microsoft's Open Database Connectivity (ODBC) driver.Although ODBC is a Microsoft standard, it's possible to use it on non-Windows systems, such as Linux, HP-UX, and Solaris. Here are four helpful information sources to learn how to do this:* unixODBC (http://www.unixodbc.org). This is the home page for the unixODBC Project, which promotes unixODBC as a standard for using ODBC on UNIX. This site comes with downloads, plenty of information, and links to useful ODBC-related sites. Although some URLs may not be up to date, it's fairly easy to navigate to the appropriate places.* jepstone.net ODBC directory
(http://www.jepstone.net/directory/index.cgi/ODBC_Drivers).

This site provides a useful list of open source ODBC drivers.* OpenLink Software (http://www.openlinksw.com). This company sells and supports ODBC drivers that you can use on non-Windows platforms. You can read the documentation at
http://www.openlinksw.com/info/docs/rel3doc/unix/odbcsdk.htm.* DataDirect Technologies (http://www.datadirect.com/index.ssp).This is another company that makes ODBC drivers. You can read about the details at
http://www.datadirect.com/products/odbc/odbcunix/index.ssp.

EXTEND A WINDOWS DISK VOLUME

While the days of expensive storage are long gone, the tasks of storage management are not. Sooner or later, you'll probably need to add space to an existing volume. While a variety of ways exist to accomplish this, one of your best bets is to take advantage of the new Diskpart.exe utility that comes standard with Windows Server 2003. Find out how to use the Diskpart.exe utility to extend a volume.

http://ct.techrepublic.com.com/clicks?c=217999-993479&brand=techrepublic&ds=5

Import Bookmarks into Firefox

If you are making the switch to Firefox, you may want to import your bookmarks from Internet Explorer. Maybe you forgot to do so when you installed Firefox. No problem. All you have to do is go to the File menu and choose Import. Choose the browser you wish to import from, then choose the items you want to import (in this case, bookmarks) and bingo - you're done. This is an easy way to keep firefox synched with Internet Explorer.
As a side note, when doing this import, you might consider not importing your history, cookies and other similar items. You might take this chance to clean up some past messes!

Tuesday, June 07, 2005

WHITE PAPER: VMWARE VIRTUALIZATION SOFTWARE ON DELL BLADE SERVERS

This paper discusses how Dell PowerEdge 1855 blade servers and VMware ESX Server virtualization software can facilitate server consolidation and supply on-demand server provisioning. In addition, virtual machines running on blade server systems can help reduce total cost of ownership compared to software running on stand-alone systems.

http://ct.techrepublic.com.com/clicks?c=212717-993479&brand=techrepublic&ds=5

CONSIDER VIRTUALIZATION TO CONSOLIDATE SERVERS, TEST DEPLOYMENTS, AND CUT HARDWARE COSTS

Even when you take into account today's reduced hardware costs on a per-server basis, installing multiple servers can easily become expensive--particularly when each server handles a relatively light load. In addition, installing a server to test a new server application or to plan and test a deployment can also be an expensive proposition. How can you balance your budget without shutting the door on new technology implementations? One answer is to embrace the growing trend of virtualization--running a virtual server on an existing physical server.

http://ct.techrepublic.com.com/clicks?c=212712-993479&brand=techrepublic&ds=5

SIGNAL ERRORS IN VB6 USING CVERR AND ISERROR

It can be extremely useful to signal an error in VB6 with a function's return value. Learn how to use the CVErr and IsError functions to track down errors.

http://ct.builder.com.com/clicks?c=213023-993479&brand=builder&ds=5

UTILIZE VB6'S PAINTPICTURE METHOD TO CREATE SPECIAL EFFECTS

If your development work could use a creative flair, you should consider utilizing VB6's PaintPicture method to create special effects with bitmap images. Peter Aitken offers pointers on using this method and makes sense of the confusing opcode argument.

http://ct.builder.com.com/clicks?c=213022-993479&brand=builder&ds=5

UTILIZE MYSQL'S FEATURES THROUGH .NET

Discover how you can use the .NET Framework to work with all aspects of your MySQL data. Also, get extended examples of how to work with MySQL data via .NET.

http://ct.builder.com.com/clicks?c=213020-993479&brand=builder&ds=5

CONTROL TEXT FORMATTING IN .NET USING THE IFORMATTABLE INTERFACE

Every application seems to present unique challenges for displaying text. These hurdles are easily cleared by utilizing format classes. The .NET Framework includes basic format objects for standard types, and it is easy to develop custom classes to fit your needs.

http://ct.builder.com.com/clicks?c=213019-993479&brand=builder&ds=5

Make your Desktop Icons Larger

There is a way you can increase the size of the icons on your Windows desktop, and its quite easy to do. For XP users, right-click on the desktop, choose Properties, then the Appearance tab, and then click the Advanced button. Under item, choose Icon from the dropdown menu, then you can increase the size by adjusting the number just to the right of the dropdown. When done, just hit OK. If you think its not big enough or maybe too cheesy, just repeat the process and find the right balance for you. You can also adjust items such as the font size and spacing between icons. For 98/ME, follow the same procedure, but you do not need to click on an Advanced button. The options you need will be right under the Appearance tab.

VIRTUALIZATION | LEARNING CENTER

Virtualization might be able to change the way IT departments manageenterprise-wide computing, promising less maintenance, easier licenseand application management, and cost savings.

http://searchwin2000.techtarget.com/featuredTopic/0,290042,sid1_gci1079583,00.html?track=NL-118&ad=517540

SQL SERVER, VS AT TOP OF TECHED DANCE CARD | SearchWin2000.com

In addition to providing more information about its new databasesoftware and developer suite, Microsoft is expected to release itsWSUS patch management tool and offer greater detail on plans for theExchange messaging platform.

http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1095238,00.html?track=NL-118&ad=517540

MORE INFO:Free Microsoft patch tool morphs, nears completion

http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1070228,00.html?track=NL-118&ad=517540

Teamwork comes at a price in new Visual Studio

http://searchvb.techtarget.com/originalContent/0,289142,sid8_gci1088825,00.html?track=NL-118&ad=517540

VMWARE DEBUTS ISV NETWORK

VMware on Monday launched an online virtual infrastructure and resourcecenter for corporate and third-party developers that is intended to helpspeed applications development and testing.

http://newsletter.infoworld.com/t?ctl=DC71DA:351E2F9

Create new rows in a DataGrid control using the DataGridItem object (ASP.NET)

Did you know that .NET allows you to add new rows to the DataGrid that match your DataGrid's current styles? To do this, you just need to create new DataGridItem objects. The syntax for
creating these objects is as follows:

New DataGridItem(itemIndex, dataSetIndex, itemType)

The itemIndex is the index of the item in the DataGrid control and the dataSetIndex is the index number of the bound data source item that appears in the DataGrid. When adding new rows, these values aren't relevant and you can use 0 for both of them. The itemType argument is important because it identifies the type of DataGridItem object you want. Valid values include: Item, Header, and Footer to name a few. Following is an example of how you'll create a new DataGridItem header:

Dim dgItem As DataGridItem
dgItem = New DataGridItem(0, 0, ListItemType.Header)

This line of code creates a DataGrid Header in whichever style you've defined for DataGrid headers. Next, you need to add data to the DataGridItem object. You do this by adding new cells to the DataGridItem object. The next set of code creates two columns and adds them to the header:

Dim dgCell As TableCell

dgCell = New TableCell
dgCell.Text = "Title"
dgItem.Cells.Add(dgCell)

dgCell = New TableCell
dgCell.Text = "Author"
dgItem.Cells.Add(dgCell)

All that's left to do is add the DataGridItem object to the DataGrid rows collection. For this task you have the Add or AddAt methods of the controls collection. The Add method adds the row to the end of the collection and AddAt adds the row to an existing location in the collection. The following line of code adds the new header to the end of a DataGrid named DataGrid1:

DataGrid1.Controls(0).Controls.Add(dgItem)

Fetch Your Windows Product Key

If you need to re-install Windows, you will need the product key. Most of the time, the only place this exists is on the CD jacket Windows came with, and if for some reason you can't find that, it can be quite inconvenient. You can search the registry for it, but there is a program to make this task much easier. Its called Magic Jelly Bean Keyfinder.
"The Magical Jelly Bean Keyfinder is a freeware utility that retrieves your Product Key (cd key) used to install windows from your registry. It has the options to copy the key to clipboard, save it to a text file, or print it for safekeeping. It works on Windows 95, 98, ME, NT4, 2000, XP, Server 2003, Office 97, and Office XP. This version is a quick update to make it work with Windows Server 2003."
Go to www.magicaljellybean.com/keyfinder.shtml for more details. The utility is freeware.

Wednesday, June 01, 2005

Beginning

El Porvenir is the future and the name of several towns in Central America.

This page is powered by Blogger. Isn't yours?