.:: Jasa Membuat Aplikasi Website,Desktop,Android Order Now..!! | | Order Now..!! Jasa Membuat Project Arduino,Robotic,Print 3D ::.

TechEd 2008, Orlando, FL & Web Development Features

0 komentar

 

Simon and myself are doing a talk at TechEd 2008... The primary agenda of the talk is going to be as below:

  • Visual Studio 2008 & .NET FX 3.5
    •    Web Application Project, Website & Multi-targeting
    •     The design Surface & CSS
    •     ListView server control and ASP.NET AJAX
    •     JavaScript Intellisense enhancements
  • Visual Studio 2008 SP1 & .NET FX 3.5 SP1 (Beta)
    •     JavaScript Formatting  & 3rd Party Frameworks
    •     ASP.NET Dynamic Data
    •     ASP.NET AJAX enhancements
  • Out of Band Previews (OOBs)
    •     ASP.NET MVC Preview 3 (Model View Controller)
    •     Visual Studio Web Deployment Projects

The session details are:

Session code: WUX306: A Lap Around the Newest Features in ASP.NET and Microsoft Visual Studio 2008 for Web Developers

Session Day/Time: 6/3/2008 10:30AM-11:45AM

 

If you are coming to TechEd then we will look forward to seeing you there...

Suni
0 komentar
Microsoft Visual Studio Web Authoring Component install failed:

I am posting this new post after a long time but had nothing to exciting to post here mean while. I was buried in solving this problem on my network. My teams developer work on vs.net and now they are moving toward vs.net2008 and my one job is to install these new version on their computer but in many computer I found problem when it reach to installing �Microsoft visual studio web authoring component� I searched for its solution but got nothing working. Few said if you have VS 2008 beta installed uninstall that but I didn�t have beta on my computer, few said uninstall office 2007 and then install it will work but it worked on some computer without uninstalling office 2007, than on one forum I got the solution that uncompress this specific folder and run the setup than once this webauthoring component is installed run the vs2008 setup again and it won�t give any problem again.

Here is the process for solving this problem.

1) Open your dvd\wcu \WCU\WebDesignerCore.
2) Copy the WebDesignerCore.EXE file on your desktop.
3) Uncompress it using winrar. (You can download winrar from http://www.rarlab.com/)
4) In this uncompressed folder double click on setup.exe. it will install Microsoft visual studio web authoring component.
5)Once this setup is complete run the VS2008 setup again. Now it won�t give any problem.Now Enjoy the Visual studio 2008 without any problem
Suni

Download Dogz

0 komentar

Playful, affectionate, and downright irresistible...
Did you know that you can adopt the most adorable puppy, feed him, train him...and do all this on your mobile phone? That's exactly what Dogz lets you do: keep your favorite pet with you constantly and play with him anytime, wherever you go! But not so fast...just like in reality, your pet is not there just to entertain you. You'll also have the delicate task of making your pet the happiest, most radiant dog! Don't forget that the attention and love that you give him will be as important as the exercises and games that you present to him.

* The only mobile game that lets you develop a true emotional relationship with your dog and
never let him out of your sight.
* Ultra-intuitive interface and various views that adapt to the progress of the game for a more dynamic experience: overall view, zoom, and close-up view for petting.
* Ten different places to visit, including outside environments that change with the seasons through synchronization with the phone's clock!
* Eleven mini-games for unequalled game length and variety: dog shows, dog olympics, classic
games with balls and Frisbees, etc



Download Here

128x160 - dogz_128x160.jar [245.42 Kb]

132x176 - dogs132x176.jar [245.93 Kb]

176x208 (s60v1) - dogz_176x208_s60v1.jar [252.53 Kb]

176x208 (s60v2) - dogz_176x208_s60v2.jar [282.81 Kb]

176x220 - dogz176x220.jar [282.81 Kb]

240x320 - dogz240x320.jar [294.01 Kb]

Suni

Download 3D Java Game App

0 komentar
Game List :

3DBomberman
3DDungeonWarrior
3DPool
3DSantaQuest
AeroMission3D
AlphaWing2
BeachMiniGolf3D
BertieDuck
CloudCommander
CopMan3D
Cupid3D
DragonAndDracula3DRU
Ducati3DExtreme
ExtremeAirSnowboarding3D
FastAndFurious
FreeFlight
GeopodDC
GOF
HungryPuppy3D
JetSetRacing
Mini3D
MiniGolfCastles3D
MotoUnleashed
PowerGames
PowerInlineX
RallyProContest
RedOutRacer3D
RobotAlliance
RodentPanic3D
RubikCube
SenorFrostiWinterGames
Sentry
SentryOpisanie
SpeedSpirit
Super3DGolf
Tenchu
TheLastAge
TigerWoods
TowerBloxx
ToxicRacer3D
XmasGifts3D

Suni

Download Funny Ringtone

0 komentar

525 tracks in playlist, average track length: 0:07

Playlist length: 1 hour 9 minutes 31 seconds


1. 23 Big Ballers (0:07)
2. 3 Seconds (0:09)
3. A Day In Jungle (0:29)
4. A Phonecall Robot (0:12)
5. Aaaaaah (0:09)
6. Aaaaah (0:09)
7. Against A Win (0:01)
8. Agressive Pitbull (0:06)
9. Alcoholic (0:09)
10. Alien Snarl (0:05)
11. Alif Laila We Leila (0:22)
12. American Soldiers (0:06)
13. Animal - Donkey (0:06)
14. Animal - The Dogs (0:05)
15. Animals - Barnyard (0:15)
16. Animals - Bear (0:07)
17. Animals - Bee Swarm (0:09)
18. Animals - Big Gun (0:05)
19. Animals - Bird Twitter (0:01)
20. Animals - Birds (0:07)
21. Animals - Blackbird (0:07)
22. Animals - Cat 2 (0:06)
23. Animals - Cat Screaming (0:03)
24. Animals - Cat (0:04)
25. Animals - Chicken (0:02)
26. Animals - Chimp Screams (0:08)
27. Animals - Chimpanzee (0:09)
28. Animals - Cow Moo (0:11)
29. Animals - Cows 89 (0:06)
30. Animals - Cows (0:06)
31. Animals - Crazy Cow Moo (0:06)
32. Animals - Crows (0:03)
33. Animals - Dobberman (0:06)
34. Animals - Dog Bark (0:08)
35. Animals - Dog Dachshund (0:05)
36. Animals - Dog Happy (0:07)
37. Animals - Dog Police (0:04)
38. Animals - Dog Rottweiler (0:07)
39. Animals - Dog Small (0:05)
40. Animals - Dog (0:01)
41. Animals - Dolphin Cry (0:05)
42. Animals - Dolphin (0:06)
43. Animals - Donkey 9 (0:11)
44. Animals - Donkey (0:06)
45. Animals - Ducks (0:14)
46. Animals - Eagle (0:01)
47. Animals - Elephant (0:02)
48. Animals - Fly 8 (0:03)
49. Animals - Goat (0:03)
50. Animals - Gorilla Hoot (0:05)
51. Animals - Gorilla (0:06)
52. Animals - Hawk Crying (0:05)
53. Animals - Horse 1 (0:02)
54. Animals - Horse 12 (0:04)
55. Animals - Horse 3 (0:02)
56. Animals - Horse 5 (0:01)
57. Animals - Horse 88 (0:01)
58. Animals - Horse 9 (0:01)
59. Animals - Horse Whinny (0:01)
60. Animals - Horse (0:03)
61. Animals - Jaguar Snapgrowl (0:06)
62. Animals - Leopard 9 (0:05)
63. Animals - Lion Roaring 1 (0:02)
64. Animals - Lion (0:05)
65. Animals - Monkey Scream (0:08)
66. Animals - Monkey (0:05)
67. Animals - Mule (0:05)
68. Animals - Owl (0:04)
69. Animals - Pig (0:03)
70. Animals - PigSqueek (0:05)
71. Animals - Pinguin (0:07)
72. Animals - Puppy Dog 1 (0:07)
73. Animals - Puppy dog (0:14)
74. Animals - Rooster 1 (0:03)
75. Animals - Rooster Call (0:02)
76. Animals - Rooster (0:01)
77. Animals - Sapo 2 (0:02)
78. Animals - Sapo (0:01)
79. Animals - Sea Gull (0:01)
80. Animals - Sea Lion (0:03)
81. Animals - Sheep 3 (0:17)
82. Animals - Sheep (0:01)
83. Animals - Snake (0:03)
84. Animals - Tiger 5 (0:02)
85. Animals - Tiger 9 (0:05)
86. Animals - Tiger Roaring (0:06)
87. Animals - Tropical Birds (0:14)
88. Animals - Whale (0:06)
89. Animals - Whale2 (0:04)
90. Animals - Wolf Howl 1 (0:09)
91. Animals - Wolf Howl 2 (0:06)
92. Animals - Wolf howl 3 (0:14)
93. Animals - Wolfe Howling 1 (0:02)
94. Answer The Fone Or You Will Be (0:04)
95. Any One Home (0:02)
96. Anybody There (0:02)
97. Anybody There (0:02)
98. Attention Please (0:02)
99. Austin Power (0:04)
100. Baby Cry (0:07)
101. Baby Crying (0:07)
102. Baby Driving Car (0:07)
103. Baby Giggling (0:05)
104. Baby Happy (0:13)
105. Baby Is Crying (0:09)
106. Baby Laughing (0:07)
107. Baby Talk (0:07)
108. Babysong (0:05)
109. Babyyy (0:07)
110. BadBarber (0:06)
111. Baffellow (0:04)
112. Basil 2 (0:02)
113. Basil 3 (0:03)
114. Basil 4 (0:02)
115. BB Lablablee (0:05)
116. Bdeebdee (0:10)
117. Beatbox Pfurz (0:10)
118. Beatbox Rythm (0:11)
119. Beatbox With Ringing (0:10)
120. Beep Beep Hello BBC (0:08)
121. Bell Egg Timer (0:04)
122. Bells (0:07)
123. Better Pick Up (0:13)
124. Bike Horn (0:02)
125. Bird Hens Excited (0:06)
126. Bling Bling Text Message (0:03)
127. Bread (0:07)
128. Brushing Of Teeth (0:07)
129. Bubble Bubble (0:20)
130. Burla (0:02)
131. Burp
132. Can Not Stop Sneezing (0:07)
133. Car Alarm (0:01)
134. Car Crash (0:06)
135. Car Starting (0:03)
136. Cartoon (0:10)
137. Cat Short (0:01)
138. Cat Wowww (0:04)
139. Cat (0:04)
140. Celebrepie (0:02)
141. CF - Car Start (0:06)
142. CF - Empty Poo (0:09)
143. CF - Goes To India (0:11)
144. CF - Gooooooal (0:10)
145. CF - Humiliation (0:06)
146. CF - In Spain (0:08)
147. CF - Jingle Be (0:11)
148. CF - Rollercoa (0:10)
149. CF - Start This Bitc (0:07)
150. CF - Stroke Taking (0:06)
151. CF - Stuttering (0:06)
152. CF - Teasing (0:05)
153. CF - Think I Am Scared (0:05)
154. CF - We Wish U (0:09)
155. Chaser (0:04)
156. Check Message Robot (0:05)
157. Chicken Diva (0:07)
158. Chicken Pak Pak (0:07)
159. Chicken Voice (0:05)
160. Chiken Remix (0:07)
161. Chip Kiss (0:03)
162. Church Bell (0:05)
163. Clarify (0:11)
164. Classic Chicken (0:05)
165. Classic Phone (0:11)
166. Classical Indian Music (0:03)
167. Clock Big Ben London (0:12)
168. Comedy Cartoon Tementry (0:05)
169. Congrats (0:07)
170. Coo Coo (0:06)
171. Cough Long (0:25)
172. Countdown (0:13)
173. Crazy Cat (0:01)
174. Crazy Caw (0:15)
175. Crazy Christmas Silent Night (0:20)
176. Crazy DJ Frog Party Peop (0:09)
177. Crazy DJ Frog Ui Ui Yeah (0:09)
178. Crazy DJ Frog Wupidiwup (0:09)
179. Crazy DJ (0:10)
180. Crazy Moped (0:13)
181. Crying Baby (0:17)
182. Cuco Cuco (0:05)
183. Cutie Pie Fantastic Person (0:13)
184. Cutie Pie Your Needed (0:15)
185. Dad Callin (0:16)
186. Data Booty Call (0:04)
187. De De Ri Ringer (0:15)
188. Diaria Fart (0:01)
189. Different Farts (0:21)
190. Ding Dong 0 (0:07)
191. Ding Dong (0:03)
192. Dinosaur (0:05)
193. Dirty Harry 0 (0:07)
194. Dirty Harry (0:05)
195. Discrete (0:12)
196. Dissatisfied Realtone (0:17)
197. Dobberman (0:06)
198. Dog Growl (0:03)
199. Dog Small (0:03)
200. Dog (0:01)
201. Dogs Vs Cats (0:07)
202. Dont Bother Answer... (0:06)
203. Dont Knock Me (0:06)
204. Dont Know The Power Of Dark (0:07)
205. Door Creaking Open (0:07)
206. Dragon Love (0:10)
207. Drunk Phone 2 (0:22)
208. Drunk Phone (0:22)
209. Drunken DJ (0:06)
210. Ebita Beebita (0:01)
211. Eeeeeh... (0:01)
212. Egyptian SMS (0:14)
213. Electric Baby (0:39)
214. Electric (0:02)
215. FabFarm (0:05)
216. Fararri Owner (0:12)
217. Fart Remix (0:26)
218. Fart Technotone 2 (0:12)
219. Fart Technotone (0:50)
220. Fart (0:12)
221. Fartattack (0:12)
222. Farting Rocket (0:06)
223. Farting (0:04)
224. Fartinggg (0:12)
225. Female Pick Up The Phone (0:10)
226. Ferrari Owner (0:11)
227. Firing Gun (0:06)
228. Fluffy Laughs (0:10)
229. Formel 1 Racing (0:11)
230. Fourire (0:07)
231. Frog In A Blender (0:07)
232. Fun Vocal 1
233. Fun Vocal 2
234. Fun Vocal 3 (0:02)
235. Funny Hahaha With Ring (0:15)
236. Funny Laughing Baby (0:29)
237. Funny Piano (0:03)
238. Fuseefoire (0:06)
239. GamerPause (0:10)
240. Generiquec (0:05)
241. Get Up Wake Up (0:05)
242. Give Me Some Attention (0:17)
243. Give Me Your Attention (0:15)
244. Gorgeous Bird (0:02)
245. Gorgeouse (0:04)
246. Grudge (0:17)
247. Gun Machine (0:05)
248. Gun Shot (0:07)
249. Gun (0:02)
250. HAHASMS (0:05)
251. Happy Baby (0:05)
252. Happy Tone I Feel Good (0:18)
253. Happy Tree Friends (0:06)
254. Hardest Working Employee (0:18)
255. Hare Krishna Hare Rama (0:07)
256. He Ha Ho Ho He (0:12)
257. Heavy Fart (0:02)
258. Hello Are You There (0:06)
259. Hello Can You Hear Me (0:29)
260. Hello Echo (0:29)
261. Hello.. (0:16)
262. Hellooo (0:01)
263. Hes Gotta Phonecall (0:12)
264. Hey Buddy (0:07)
265. Hey Girl (0:03)
266. Hey Mambo Italiano (0:06)
267. Hey Man Skratch (0:23)
268. Hey Sexy Man (0:03)
269. Hey Sexy Someone Wants To Talk (0:03)
270. Hey Sweety Can You Please... (0:04)
271. Hey Your Phone Is Ringin (0:09)
272. Hey Your Phone Is Ringing (0:09)
273. Heysexyman (0:03)
274. Hi Its Sweety Just Wanted... (0:04)
275. Hi Sweety I Love You... (0:04)
276. Hihihi Hahaha (0:06)
277. HiHiiiii Hahaaaa (0:06)
278. Ho Ho - Bhav Bhav (0:01)
279. HomeBox (0:10)
280. Honey Your Phone Is Ringing (0:03)
281. Horror Answer Me (0:07)
282. Horror Evil Laugh (0:07)
283. Horror Laugh (0:05)
284. Hotlatina (0:04)
285. House Bell (0:17)
286. How To Answer (0:10)
287. I Am Batman (0:01)
288. I Am Seriously Pissed Off You (0:19)
289. I Am Too Sexy (0:07)
290. I Can Hear U (0:11)
291. I Have Got A Friend (0:27)
292. I Have Got A Friend (0:16)
293. I Have Got A Girl Friend (0:15)
294. I Have Got A Ringtone (0:09)
295. I Have Gotta Custom Ringtone (0:10)
296. I Have The Power (0:05)
297. I Love You
298. I May Be Small (0:06)
299. I Miss U (0:07)
300. I Wish I Were (0:15)
301. Impatient Ringer (0:21)
302. Incoming Tosser (0:09)
303. Indian Phone Advisor (0:08)
304. Indian Please Pick Up (0:11)
305. Indian Style SMS (0:04)
306. Indian Tabla (0:02)
307. Indian Violin (0:02)
308. Intel Chime (0:03)
309. Irish Pick Up Fat Git (0:03)
310. Is She The One (0:11)
311. Is That A Phone Ringing (0:18)
312. Ist Rasta Mann (0:12)
313. It Is Your Phone (0:09)
314. Ja Rule Voice1 (0:03)
315. Ja Rule Voice2 (0:04)
316. Ja Rule Voice7 (0:04)
317. Jaguar (0:07)
318. Jedi - Master (0:08)
319. Jelly Donut (0:11)
320. Jungle Theme (0:05)
321. Just For Laffs (0:14)
322. Kewlest Wickedist Ba (0:16)
323. Kids Ooh (0:01)
324. Kill The Phone (0:03)
325. Kiss Big Smooch (0:02)
326. Kiss Blowing Your Turn (0:13)
327. Kiss Tone 01 (0:22)
328. Kiss (0:01)
329. Knock Knock (0:10)
330. Knocking (0:16)
331. Koala Vox (0:17)
332. Lalala Lalala (0:04)
333. Lalala (0:04)
334. Laser (0:05)
335. Latin Lover (0:07)
336. Laugh Close (0:04)
337. Laugh Hyst (0:12)
338. Laugh Scary (0:02)
339. Laugh Silly (0:04)
340. Laugh (0:06)
341. Laughing Fit (0:07)
342. Lets Get Crunk (0:08)
343. Little People (0:02)
344. London Transport Tone (0:26)
345. Look Your F Phone Ringing (0:02)
346. Lost Phone Ringtone (0:13)
347. Lost Phone (0:13)
348. Luke I Am Your Father (0:16)
349. Machine Gun (0:07)
350. Melody 88 (0:08)
351. Melody 9 (0:13)
352. Message Coming (0:03)
353. Mind The Mobile Phone (0:07)
354. Mission Impossible (0:05)
355. Mix And Remix (0:07)
356. Mmoooooooo (0:06)
357. Mobile Blues (0:15)
358. Modern Phone (0:02)
359. Mome Papa (0:05)
360. Monkey On Acid (0:16)
361. Moronic Supervisor (0:12)
362. Mosquito (0:07)
363. Moto - Pick Up The Phone (0:16)
364. Motorcycle (0:12)
365. Mousy Brrr Its So Could (0:06)
366. Mousy Fiiiep Text Messag (0:02)
367. Mousy Hello There Pick Up (0:03)
368. Mousy Hello There Text M (0:03)
369. Mousy Hey Its Ringing (0:05)
370. Mousy Hi Its Me Pick Up (0:03)
371. Mousy I Am In A Real Big (0:04)
372. Mousy Im Out Here And Fr (0:06)
373. Mousy Say Yes (0:01)
374. Movies (0:03)
375. Mowwwww (0:06)
376. MSN Remix (0:20)
377. My Phone Is Ringing (0:06)
378. Nagging Phone (0:33)
379. Naked Call (0:05)
380. Naked In A Freezer (0:08)
381. Nibbling Hamster (0:07)
382. Nose Cleaning (0:07)
383. Not Late For Work (0:11)
384. Not Ringing (0:12)
385. Nutty Munchkins (0:02)
386. Office Phone (0:02)
387. Oh Oh Chatting (0:02)
388. Oh Ohoooo (0:01)
389. Oh You Are So Sweet... (0:05)
390. Oh You Farted In The Toilet (0:02)
391. Ohh Wowwww Hehehe (0:02)
392. Old Fashion (0:02)
393. Old Horn (0:02)
394. Old Phone Ringing (0:04)
395. Old Phone (0:11)
396. Operator (0:02)
397. Osama Bin Laden Calling (0:07)
398. Out Of Tune Strum (0:01)
399. Oy No Not You (0:15)
400. Pant Breaking Fart (0:02)
401. Pasmallame (0:02)
402. Phone Theft (0:19)
403. Phony Harmonies (0:07)
404. Piano Ring (0:03)
405. Pick Up The Phone Sweety (0:04)
406. Pick Up The Phone You Fat G (0:04)
407. Pickup... Call In The Oven (0:03)
408. Pig 66 (0:07)
409. Pig Squeal (0:11)
410. Pitstop And Mutley (0:03)
411. Police Horn (0:07)
412. Police Siren 2 (0:12)
413. Police Siren 3 (0:12)
414. Police Siren 4 (0:13)
415. Police Usa V1 (0:07)
416. Private Phone Call (0:11)
417. Probox (0:04)
418. Psycho Frog Ring Ring (0:11)
419. Psycho Frog (0:11)
420. Racing Hand (0:20)
421. Racing (0:10)
422. Radio (0:12)
423. Rasta Letme (0:04)
424. Rasta Picki (0:04)
425. Real Realtone (0:10)
426. Really Vulgar (0:04)
427. Rewind (0:01)
428. Rg Boyfriend Callin (0:17)
429. Rg For The Bird Man (0:18)
430. Rg Ghetto Mama Callin (0:15)
431. Rg Mama Callin (0:22)
432. Rg Nasty Girl (0:22)
433. Riiiing (0:07)
434. Ring Ring Klingeling (0:11)
435. Ring Ring Ring (0:11)
436. Ring Ring Telephone (0:04)
437. Ring Signals Lab (0:17)
438. Roboter Sagt Ring Ring Ring (0:06)
439. Rogan Josh (0:18)
440. Run (0:08)
441. Say Cheeze (0:05)
442. Scooter Posse (0:28)
443. Screaming Man (0:02)
444. Screeming Lady (0:02)
445. SeaGull (0:10)
446. Self Destruct (0:02)
447. Seriously Misunder (0:12)
448. Shifty N Moody Will He Be Caught (0:30)
449. Shmoopsy (0:06)
450. ShutUp (0:01)
451. Silly Ringtone (0:04)
452. Skratch Aaahh (0:09)
453. Skratch Gotcha (0:19)
454. Skratch (0:13)
455. Sktch2 (0:05)
456. SMS Arrived (0:03)
457. SMS (0:13)
458. Snoring (0:06)
459. Somebodies On The Line (0:39)
460. Someone Is In The Toilet (0:08)
461. Southern Style SMS (0:03)
462. Speedy (0:03)
463. Sports Baseball (0:01)
464. Squeaky Voice Squeaky Voice (0:04)
465. Starter Problem (0:04)
466. Steel Canvas (0:16)
467. Strange Communication ... (0:07)
468. Strange Communication (0:07)
469. Super Fart (0:04)
470. Svullo - Frog1 (0:07)
471. Svullo - Frog2 (0:07)
472. Svullo - Frog3 (0:07)
473. Svullo - Laugh (0:07)
474. Sweety - Tweet (0:12)
475. Sweety And Fluffy - Birds Rock (0:18)
476. Sweety SMS (0:03)
477. Talkative (0:10)
478. Teddy Bear (0:07)
479. Telephone... (0:03)
480. Ten O Clock Postman (0:23)
481. Terminator - Arnold (0:08)
482. Terminator Termination (0:08)
483. Terminator (0:05)
484. The Cats (0:04)
485. The Devil (0:02)
486. Tire Screeching (0:01)
487. Toilet Flush (0:04)
488. Tosser Detection System (0:20)
489. Train Horn (0:02)
490. Transporting (0:06)
491. Tweet Tweet (0:07)
492. Twinkle Twinkle (0:22)
493. Voices Pick Up (0:14)
494. Wanna Have Some Fun (0:12)
495. Wap Wap (0:16)
496. Warning - The Wife (0:20)
497. Warning (0:10)
498. Wazzup (0:05)
499. We Love U (0:01)
500. What A Kiss (0:01)
501. Whirrs (0:06)
502. Whistle (0:16)
503. Willow Warbler (0:06)
504. Woodpecker (0:02)
505. Wow Cat (0:06)
506. Wrench Air 1 (0:03)
507. Yabba (0:03)
508. Yahoo (0:03)
509. Yappy Dog (0:03)
510. Yo Yo Yo (0:19)
511. Yoda Answer (0:03)
512. Yoda Message (0:03)
513. Yoda Press 0 (0:08)
514. Yoda Press The Button (0:05)
515. Yodel 1 (0:04)
516. Yoo Anybody Home (0:07)
517. YooHoo (0:01)
518. You Aint Got This Ringtone (0:12)
519. You Are So Cute... (0:04)
520. You Have A Business Call (0:21)
521. You Talking To Me (0:07)
522. Your Boyfriend Wants To Talk (0:07)
523. Your Damn Phone Is Ringing (0:05)
524. Your Phone Is Ringing (0:02)
525. Yum Biddy (0:16)


Suni

Memorial Day

0 komentar


Today is Memorial Day in the United States, a national holiday in which we remember those who made the ultimate sacrifice to preserve our liberties.




The Database Programmer will return next week with an essay on meta-data and data dictionaries.

Suni

ReSharper v 4.0 beta for VS2008 is out

0 komentar
I just now receieved an email from Jet Brains team informing that ReSharper v 4.0 beta for VS 2008 is out... Below is the verbatim email in case anyone of you was interested...

"I just wanted to let you know that ReSharper 4.0 beta for Visual Studio 2008 is now available for a test drive at:
http://www.jetbrains.com/resharper/beta.html?nlrs

In addition to enhanced productivity features, ReSharper 4.0 beta offers several new features for C# 3.0 including:

- New code analysis, context actions and quick-fixes;
- New refactorings (such as Convert to Extension Method, Convert to Automatic Property, Convert Anonymous Type to Named);
- Updated IntelliSense.

Final release of ReSharper 4.0 is coming soon! If you would like to learn more about upgrade availability, please contact me directly."


Some of you had reported some bugs in VS that ReSharper was causing some failures for you... Please go ahead and try this version, I am guessing those issues must be resolved here...
Suni

Download Nokia Troubleshooting Solution

0 komentar

Download Here

Note :
Not all nokia type displayed at this software
Suni

Download Emulator

0 komentar
MIDPX Emulator

Saya sudah membahas pada posting saya sebelumnya tentang emulator untuk testing aplikasi game handphone pada komputer. Tetapi ada yang keterusan juga lho, temen saya lebih senang koleksi game handphone trus dia mainkan memakai emulator, karena ukuran file game handphone yang lebih kecil daripada game yang sebenarnya. Tapi ya itu, ukuran layarnya ya sesuai dengan ukuran handphone, kecil.

Emulator untuk aplikasi game handphone bisa anda download disini


Emulator Mobile Pack contains :

1. NHAL Emulator
2. Sjboy Emulator
3. Minisoy Emulator



Pass : http://www.2mobile.ws

Download MIDPX

MidpX is an integration tool to help user to manage your j2me software.

MidpX 1.0.1 Integrated J2ME Emulator Suite. J2ME Win32

Midp2Exe 1.3.1 J2ME Free Download also Runtime Virtual Machine

From Rapidshare

Alternative Link


Download SJboy Emulator

Direct download to www.sjboy.cn

Download SjBoy

From Rapidshare


Semoga bermanfaat :P
Suni

Start application from Run panel

0 komentar

It�s always good to open a program in Windows XP by just pressing ctrl+r program command and enter, but it�s not applicable for all the programs like yahoo messenger or Google talk pr any program that you use. If it�s not their by default but we can make a shortcut easily to create shortcut of those applications. Here is process for creating a shortcut to start application from run command.

1) Make a short cut of application that you want to use from run.

2) For making shortcut either use create new shortcut wizard of windows or go to the exe location of that particular program. Suppose you want to use yahoo messenger than go to C:\Program Files\Yahoo!\Messenger rite click on YahooMessenger.exe and click on send to desktop option.

3) It will create a shortcut of yahoomessager.exe on your desktop. Rename it to your desired name. I gave name AP yahoo.

4) Now copy this shortcut and paste it into c:\windows\system32

5) Press windows and then type APyahoo and enter. It will start your yahoo messenger.

6) You can make shortcut for any program that you want even for your particular file by this method

Suni

Database Triggers, Encapsulation and Composition

0 komentar

When Object Oriented Programming burst into the mainstream,
encapsulation rapidly came to be accepted as a basic tenet of sound
programming. Modern database servers provide a wonderful way to
tightly couple code and data, a way that is secure, non-subvertible,
flexible and powerful. This week we will see the first use of the
database trigger, and examine its curious ability to accomplish
the same goal as OOP encapsulation. Furthermore,
while the database requires no analog to the idea of inheritance,
triggers also serve as a very powerful way to build up business
processes through composition.



There are links to related essays on normalization and denormalization at the bottom of this post.



This blog has two tables of contents, the
Topical Table of Contents and the list
of
Database Skills.



Triggers 101



A "trigger" is a small computer program stored on the database
server that fires whenever a table is written to. The
trigger can validate and if necessary reject the operation, and
it can also modify the data being written. These two simple abilities
can be combined to implement incredibly powerful operations and
combinations of operations.



Before we get to the first example, we need to review the four basic
options that are available when you define a trigger. These four options
will be used in the examples below, and this quick review can serve as
a reference when you review the examples.



  • INSERT UPDATE and DELETE Triggers can be defined for each
    of these operations, and most databases allow you to assign define
    a trigger to fire on combinations, like INSERT and UPDATE but not
    DELETE. Most servers also allow you to define multiple triggers to
    fire on each event.
  • BEFORE or AFTER. A trigger can be defined to fire before
    or after the operation. Triggers that fire before an operation can
    modify the data being written or reject the operation. Triggers that
    fire afterwards are good for writing to history tables.
  • STATEMENT or ROW. Some SQL statements such as DELETE
    and UPDATE affect multiple rows. All popular servers (that I know of)
    fully support having a trigger fire on each row of the operation.
    It is sometimes desirable for performance reasons to fire a trigger
    only once, either before or after the rows are affected. Support for
    this ability varies widely in the real world.
  • SECURITY. Security models vary widely in the wild. My
    favorite amongst the servers I have used is Postgres, which lets you
    grant all users complete freedom to fire any trigger. This is so useful
    because it lets you define security just once in terms of table access,
    and since triggers fire on table access, the effective trigger security
    shows up for free.


The First Example: Denormalization Patterns



Three weeks ago I reviewed the three basic "http://database-programmer.blogspot.com/2008/04/denormalization-patterns.html"
>Denormalization Patterns
that are used to put calculated values into
a database. These denormalization patterns fit hand-in-glove with triggers.
The following code shows three simple calculations that can be performed in
a trigger. I should note that the syntax is peculiar to Postgres, and you
will need to review your own server's documentation to get the syntax right.
If you have never written a trigger before, I should further warn that Postgres
has a perverse two-step process, it makes you write a function and then attach
that function to a trigger. MS SQL Server lets you define the trigger and code
together in one step, which makes much more sense. But that being said, here
it is:




CREATE FUNCTION order_lines_before_row_func RETURNS TRIGGER AS
$BODY$
-- execute the FETCH of the price
SELECT INTO new.price price FROM items
WHERE items.sku = new.sku ;

-- EXTEND The price
SET new.extended_price = new.price * new.qty;

-- AGGREGATE the total to the sales order
UPDATE ORDERS set lines_total = COALESCE(lines_total,0) + new.extended_price;
$BODY$
SECURITY DEFINER LANGUAGE PLPGSQL;

-- This second step is a peculiar requirement of postgres,
-- by contrast, MS SQL Server would have let me define these options
-- above and would not require this very annoying second step.
CREATE TRIGGER order_lines_before_row_trigger
BEFORE INSERT OR UPDATE
ON ORDER_LINES
FOR EACH ROW
EXECUTE PROCEDURE order_lines_before_row_func;


It is no understatment to say that you can build huge applications of
hundreds of tables that use little more than the example above repeated over
and over across many tables. There is of course more to the story, lots
more, but the example above lays the pattern for most of what follows.



The Second Example: Playlist Ordering



Some months ago a member of the "http://www.liphp.org/"
>Long Island PHP User's Group
asked about a method for ensuring that
an ordered playlist would never have two songs in the same position.
This question struck me because it is a great example of the general
problem of maintaining any ordered list when you may be moving items
around. It turns out an extremely simple trigger takes care of
it neatly.




CREATE FUNCTION playlist_before_row_func RETURNS TRIGGER AS
$BODY$
-- given a column "position", if an item is given a position,
-- already occupied by another row, bump that other row forward
UPDATE playlist SET position = position + 1
WHERE position = new.position;
$BODY$
SECURITY DEFINER LANGUAGE PLPGSQL;

-- This second step is a peculiar requirement of postgres,
-- by contrast, MS SQL Server would have let me define these options
-- above and would not require this very annoying second step.
CREATE TRIGGER playlist_before_row_trigger
ON playlist
BEFORE INSERT OR UPDATE
FOR EACH ROW
EXECUTE FUNCTION playlist_before_row_func();


This trigger works because triggers will cascade, which is
explained next.



Some Notes on Cascading Triggers



A trigger can contain code that executes an UPDATE statement, which
may then fire other triggers, which themselves contain UPDATE
statements, and so on. This is called cascading.



The second example above only works if a trigger can cascade. The
chart below shows how it works. The first column shows the value
of "position" for a few rows. Imagine the user inserts a new
row at position 1, "stepping on" the value that is already there.
The trigger shown in example two takes care of everything:






- POSITION -
Old | New | Trigger action
-----+-----+------------------------------------------------------
| 1 | Insert causes trigger to fire the UPDATE
1 | 2 | UPDATE flips this from 1 to 2, causing trigger to fire again
2 | 3 | 2nd UPDATE flips this from 2 to 3, causing the trigger to fire again
3 | 4 | 3rd UPDATE flips this from 3 to 4, trigger fires a 4th time
6 | 6 | Fourth UPDATE finds no target row, execution ends, no action on this row
7 | 7 | no action


This patterns has some latent performance issues that are too complex to get
into until I can do a complete essay on this table pattern.
But the point here is that those performance problems are
a part of the pattern itself, and using a trigger for the pattern is
actually the fastest way to implement the pattern.



Encapsulation, Subversion and Security



The term encapsulation is used (as far as I know) exclusively by
Object Oriented theorists. Nevertheless, it is striking how well
the term describes the effect of triggers. When a trigger is put
onto a table, you have the tightest possible integration of code
and data, at least as far as database applications are concerned.
This is true because the trigger allows for non-subvertibility
and integrated security.



A system is said to be "subvertible" if a program or user
can, by accident or malice, disobey a business rule or circumvent
any of the protections set up in the system. Triggers
represent a non-subvertible implementation of business rules,
because no application code or user can bypass their actions.
If that is not encapsulation I don't know what is.



There is a really nifty advantage to triggers that falls into this
general discussion. When you implement calculations in triggers,
you can freely allow access to the database from outside of your
own application. This is a crucial feature when selling to companies
with large IT departments that expect this ability like a birthright.
Going further along these lines, you can implement browser and
desktop versions of the application without recoding all of the
calculations.



Last week we had an "http://database-programmer.blogspot.com/2008/05/introducing-database-security.html"
>Introduction To Security
in which we saw that database security
is implemented as restrictions on who can INSERT, UPDATE, DELETE
or SELECT from a table. This dovetails perfectly with the use of
triggers because it allows you to think of security entirely in terms
of table access, which is what it all boils down to in the end anyway.
Using triggers plus table security gives the tightest possible integration
of security and business logic, and puts your entire security framework
on a simple and consistent basis.




Third Example: Composition



The Object Oriented Programmer is used to instantiating and using
objects together in different patterns. This technique, known as
"composition", is one of the basic ways for classes to interact
with each other. I will not argue here that triggers are an
exact analog to composition, because such a statement is not true and
will invite meaningless debates over terms. What I will argue is that
within a database the use of triggers to write to other tables accomplishes
the same goal: the interaction of code from different but related
contexts.



To illustrate this, our third example makes use of the cascading
effect described above to link together the ORDER_LINES table, the
ORDERS table, and the CUSTOMERS table. The idea is this. One of the
rules on the ORDER_LINES table is that the extended_price must be
calculated whenever price or qty change. But there is also a rule on the
ORDERS table that it must always contain the total of the line items
of the orders. Now let us imagine that the CUSTOMERS table must always
contain the total of all open orders for the customer. A complete example
for INSERT, UPDATE and DELETE would be far more than will
fit here, but if we concentrate just on
UPDATE operations we can see the general idea:




-- This is a modified form of example one above
CREATE FUNCTION order_lines_before_row_func RETURNS TRIGGER AS
$BODY$
-- EXTEND The price
SET new.extended_price = new.price * new.qty

-- AGGREGATE the total to the sales order,
-- notice that we are subtracting the old value and
-- adding the new
UPDATE ORDERS set lines_total
= COALESCE(lines_total,0)
+ new.extended_price
- old.extended_price;
$BODY$
SECURITY DEFINER LANGUAGE PLPGSQL;

-- The trigger above affected the ORDERS table, and now
-- we go the next step and affect the customers table
CREATE FUNCTION orders_before_row_func RETURNS TRIGGER AS
$BODY$
-- AGGREGATE the total to the customer
UPDATE CUSTOMERS set orders_total
= COALESCE(orders_total,0)
+ new.lines_total
- old.lines_total;
$BODY$
SECURITY DEFINER LANGUAGE PLPGSQL;

-- Postgres requires this 2nd step, but I'm not going into it here
CREATE TRIGGER order_lines_before_row_trigger .....
CREATE TRIGGER orders_before_row_trigger.....


I want to repeat here that I am not claiming this mechanism is an
exact analog to composition, but I do want to stress that when you go
with triggers a lot of code disappears out of your application, and
you may find yourself wondering how all of this fits with the OOP
mentality. All programming systems require the basic ability to
both isolate code while also defining and controlling how these
isolated fragments can interact. OOP makes use of inheritance and
composition to relate code segments to each other, but triggers
change the scene quite radically. The trigger encapsulates the
behavior of the table, and because triggers can update other tables,
the ability to have cascading or secondary actions is satisfied.



My final note on this idea is to repeat something I have stressed
in these essays many times. The seasoned and experienced database
programmer thinks of things in terms of his basic building block,
the table. The trigger gives him the ability to attach code directly
to this building block. The fact that triggers can update other
tables gives him the necessary mechanism to have operations that
span multiple tables.




Future Essays on Triggers



There is far more to cover on triggers, and I have glossed over many
details in this first introduction. Future essays will demonstrate table
design patterns that have their cleanest implementations with triggers,
and we will also examine grave performance issues that must be considered
on large complex systems.
Before we get to that however, next week we will have an
introduction to meta data and data dictionaries, which we have to cover
first because they lead to more essays on triggers and code generation,
and the data dictionary will play more and more into future essays on
table design patterns.



Conclusion



Triggers are a very powerful mechanism for creating business logic that
is guaranteed to execute, cannot be subverted, dovetails nicely with
security. The trigger has the curious property of strongly encapsulating
code and data, even though we do not usually use the term encapsulation
to describe this. Triggers put great power in the hands
of the programmer.





Related Essays




This blog has two tables of contents, the
Topical Table of Contents and the list
of
Database Skills.



The normalization essays on this blog are:


Suni
0 komentar
Operating System Up gradation

By being a system and network admin some time I saw that some of the system got corrupted because of virus and I cannot help myself to do anything for that computer. I was wondering if I can get any solution and can save my time to avoid reinstallation of system and can save valuable time. I tried this way that might be a very well known method for many of you but it was a very new method for me and I tried that it worked and now I don�t go for reformat of my machine every time. Here is process what I have done. It�s just simple upgrade of operating system instead of formatting or reinstallation. Its very much similar to repair.

1) If your computer is infected by virus than first attach your infected hard disk to some other computer that have a good antivirus that can scan all latest threats and can delete them.

2) Scan your secondary hard disk clean its viruses.

3) Once you are sure its virus free now add infected (now cleaned) hard disk to its original machine.

4) Boot machine as normal.

5) Login on this machine from administrator group user.

6) Insert operating system CD in this it should be the same OS that you are running. If you are running Windows XP SP2 it should be windows XP sp2 or Windows XP sp3. If you are running Win2K3 it should be Win 2k3.

7) If your auto run is enabled it will give you a screen that will ask you to install windows on this system.

8) Click on install windows link ( first option)

9) In next screen it will ask you to upgrade or new installation Choose upgrade. Now drop it for next one hour.

10) Once it�s upgraded you might face problem of screen resolution just restart your machine once again and it will be corrected by default. You all the software and drivers are as it was before installation.

Precaution

1) I always recommend taking backup of your important data before doing anything like this. In fact one should take back-up of all imp data before making any change.

2) Operating system CDs should be correct and correct version too.

3) Make sure to install Latest Antivirus with update before connecting it on network or internet.

Suni

Hard disk cloning tool

0 komentar

Few months back I got a task of mirroring of hard disk from one hard disk to another hard disk due to some project requirement. I checked many tool but I did not found any good solution for me as I had to copy Linux Hard disk. I tried to use Norton Ghost but it didn�t worked for me I tried to use Ghost for Linux but I found it too difficult for use for a non professional user because I had to give this tool to those people who are only familiar with some basic of hardware and software .

After a long search I found a good tool that can full fill my requirement and it was simple enough to use that anyone could use it. it was a simple few step process that any computer user can do who know how to make a secondary hard disk and how to boot from CD.

The tool is call PC Inspector clone Max. This tool is free full version. Its size is only few KB and can copy data of any size hard disk.

Using the new direct DMA support, from Hard disk to hard disk data can be copied speeds up to 3.3 GB per minute via high speed mode.

This high speed is achieved by PC INSPECTOR� clone maxx through intelligent inspection of the PC motherboard and the hard drive controller. The software independently determines the fastest data transmission rate and achieves these exceptional speeds through optimal utilization of the DMA chipset on the motherboard of your PC.

CloneMAX can be started directly from a boot disk. The copying process of hard disk is indepented to file system that means you can copy any data from one hard disk to another hard disk. It copies data sector wise not by the file system. That means it doesn�t matter you are copying data of FAT,NTFS EXT or Reiser or how many partition you have in your hard disk.


The full version of PC INSPECTOR clone maxx can be obtained at no cost from the sponsor "CONVAR � Die Datenretter� http://www.pcinspector.de/Sites/clone_maxx/info.htm?language=1

Process for cloning of hard disk:

1) Download ISO file from above location and make a CD of this ISO file that would be bootable CD. You can use any of your favorite CD burning tools for burning this ISO file in CD.

2) Attach the new hard disk in computer as secondary (say hard disk2) in which you want to copy data of old hard disk (say hard disk1).

3) Set you bios setting firs boot device CD/DVD rom.

4) On your computer and insert newly created CD in CD rom.

5) It should get booted from CD ROM and you will see a screen to select language. Press 6 for English Language.

6) Wait for Hard disk scan. After that you will get a screen that will show you hard disk.

7) Now select source drive that is old drive (say hard disk 1). Press the number of that hard disk drive. Here it is 1.

8) Now select the desination drive that is new drive in which you want to copy data of hard disk (say hard disk 2). Press the number of hard disk here it is 2. It won�t display hard disk 1 in this screen.

9) It will ask for confirmation if your source and destination hard disk are correct press Y if it�s ok for you.

10) It will give you an estimated time to complete the cloning of hard disk.

11) Once it�s done it will say press any key and remove CD remove hard disk and us as you want.

Precaution:

1) Destination hard disk should be greater than the source hard disk.

2) Before cloning make sure the hard disk order that you are trying is correct. If you are not sure about your hard disk number you might lose your data also.

3) If you are using this first time or have any doubt please use it on testing machine and then go for production machine.


Suni

Visual Studio 2008 SP1 Beta Released

0 komentar

 

Just today we released Visual Studio 2008 SP1 beta...  VS 2008 SP1 beta is truly a feature packed release for Web Developers...  From enhancements in WCF space to including WAP (Silverlight and MVC with download) in VWD Express there are tons of things you can do with VS 2008 SP1...

John Dundon has written a very detailed post about the release on our team blog below:

http://blogs.msdn.com/webdevtools/archive/2008/05/12/visual-studio-2008-sp1-beta.aspx

Also ScottGu has put forward a much more broader blog post about SP1 beta on his blog below... Do take time and read through the these two posts...

http://weblogs.asp.net/scottgu/archive/2008/05/12/visual-studio-2008-and-net-framework-3-5-service-pack-1-beta.aspx 

If you have question, queries or feedback do not hesitate to write to me at Vishal.Joshi@Microsoft.com

Suni

Dynamic Data's new Code Gallery SP1 Version Released

0 komentar

 

Our team just released new version of ASP.NET Dynamic Data in Code Gallery.  This version of Dynamic Data release works on VS 2008 SP1 and also contains the new Blinq wizard for Dynamic Data.  You can read more about it at: http://code.msdn.microsoft.com/dynamicdata.

Code Gallery is a new model that our team is using to share early previews of our work in Dynamic Data.  This allows our team to share the latest developments with the community as soon as they meet the minimum quality bar.  Usually we would release something only after it goes through rigorous quality bar but this model allows community to view and provide feedback while we are still completing our work on the feature...  Hope you will enjoy looking at this more transparent model of technology releases from Microsoft...

Suni

Windows XP SP3

0 komentar

Microsoft launched Windows service pack 3 before few days back. You can download this update from Microsoft website and you can install it on your computer for latest updates and some new feature also. As per Microsoft if you are installing for a single computer they recommend to have a update installation of service pack 3 that is of lower size in data but I recommend to download network installation pack and use it even if you reformat your machine you wont need to go to Microsoft website again for a new installation.

http://www.microsoft.com/downloads/details.aspx?FamilyID=5b33b5a8-5e76-401f-be08-1e1555d4f3d4&DisplayLang=en

Here is a good FAQ for SP3 that I found. It covers almost all the basic required information of service pack three what it contains and other informations. http://www.winsupersite.com/faq/xp_sp3.asp

New Features in windows XP SP3

Network Access Protection compatibility. Announced years ago, this feature allows Windows XP machines to interact with the NAP feature in Windows Server 2008. This functionality is built into the RTM version of Windows Vista as well.

Product Key-less install option. As with Windows Vista, new XP with SP3 installs can proceed without entering a product key during Setup.Its applicable for those installation that will install with installation CD of windows xp with sp3. This would be similar to Windows XP . I did not get a chance to check it out so can not comment for this.

Kernel Mode Cryptographics Module. A new kernel module that "encapsulates several different cryptographic algorithms," according to Microsoft.

"Black hole" router detection algorithm. XP gains the ability to ignore network routers that incorrectly drop certain kinds of network packets. This, too, is a feature of Windows Vista.

You can get more details of these features on Google or Microsoft.

Precaution for installing Windows Service pack 3.

1) Take Backup: If you will apply this service pack without taking any backup than also it wont affect anything in your computer but most secured way is to take backup of your important system data like outlook dbx,pst file, your bookmarks and other settings like that. For taking backup you can use Norton ghost also that will create a complete backup of your XP with all installed software and settings so you can restore this latter. I Will post a detailed information about norton ghost very soon.

2) If you are using Vista theme of CrystalXP.net than make sure to uninstall your crystal XP theme and than reinstall it after installing windows XP sp3. If you will install XP SP3 without uninstalling crystal XP theme you will get an scattered resolution.

3) Previous System Restore Point would get deleted: If you have any previous system restore point that you want to use than do no install service pack three. If you will install service pack three all previous System restore point would get deleted.


I have given all the information from sources and my personal experience please use your brain before applying any thing .

Suni

Introducing Database Security

0 komentar

For a database application, all security in the end becomes a question
of who can read and write to what tables. While this is obvious to
veteran database programmers, it is not always so obvious to
relative newcomers. A programmer who thinks primarily in terms
of code will be used to conceptualizing actions, steps, procedures
and so forth. This programmer will therefore think of
security in terms of who is allowed to perform what actions.
However, when you examine the actions performed by database
application code, you find that, no surprise, it is a lot of database
reads and writes.



This week in The Database Programmer we are going to see the basics
of table-based security. This is a blog for anybody who wants to
learn the practical realities of working with databases.
A new essay is published every Monday morning, and the "http://database-programmer.blogspot.com/2007/12/database-skills-complete-contents.html"
>Complete Table of Contents is here
.



Table Permissions 101



The most basic unit of storage for a database is the table, and so
security begins with deciding who can do what to a table. The SQL
language has one read command and three write commands (INSERT,
UPDATE, and DELETE), so there are four possible permissions that
can be granted to a user. Most databases out there provide syntax
that is pretty close to this, which makes some direct permission
assignments to a group named "ARSTAFF"




CREATE GROUP ARSTAFF
GRANT SELECT ON RECEIVABLES TO ARSTAFF
GRANT INSERT ON RECEIVABLES TO ARSTAFF
GRANT UPDATE ON RECEIVABLES TO ARSTAFF
GRANT DELETE ON RECEIVABLES TO ARSTAFF


These commands should be run at the same time that your tables
are built, they are part of the basic database build.



A Basic Security Dictionary



A very basic security dictionary will list all tables and show who
can do what to what. The dictionary begins with a single table,
which lists tables and groups and permissions, something like
this:




TABLE | GROUP | SELECT | INSERT | UPDATE | DELETE
-------------+-----------+--------+--------+--------+--------
AR_INVOICES | AR_STAFF | 1 | 1 | 1 | 0
AR_PAYMENTS | AR_STAFF | 1 | 1 | 1 | O
CUSTOMERS | AR_STAFF | 1 | 1 | 1 | 0
CUST_TYPES | AR_STAFF | 1 | 0 | 0 | 0
CUST_TYPES | AR_ADMIN | 1 | 1 | 1 | 1


Security permissions should always be defined in terms of
groups, not individual users. This is important because it lets
you make the group definitions part of the basic definition of the
system, leaving the system administrator free to add users to
groups at his own discretion.



Deny By Default And Determining a User's Permissions



Most security systems make use of the idea of deny by default.
This means you do not have to specify who cannot see a table,
the system starts out by assuming that nobody can see anything.
Users can then only work with a table if they are in a group
that can work with that table.



Another key idea is this: if a user is in even one group
that allows a permission, the user gets the permission, even
if his other groups are not allowed in.



With these two ideas, deny-by-default, and any-group-gets-you-in,
then assuming you have a table that lists what groups each user is in,
you can find a particular user's permissions on a table with
this query:




SELECT MAX(select) as select
,MAX(insert) as insert
,MAX(update) as update
,MAX(delete) as delete
FROM secure_dictionary
WHERE table = 'table name'
AND group IN (list,of,groups,user,is,in)


If the query comes back empty, the user has no rights, otherwise
you will get the user's permissions for that table.



Enhancing Our Security Dictionary



The security dictionary portrayed above can become tedious to
work with because it often happens that you want to make similar
assignments to groups of tables. For instance, in an accounting
application you may an "APSTAFF" group that has basic permissions
on Accounts Payable tables, and an "APADMIN" group that can do
anything to any table in Accounts Payable. However, those groups
have no permissions on the Accounts Receivable tables, so you
have two new groups, "ARSTAFF" and "ARADMIN". Likewise for
inventory, general ledger, and so forth.



This can all be made much easier by organizing your tables into
modules and defining default permissions within a module to
each group. The expanded dictionary would have these tables:




THE TABLE OF TABLES

TABLE | MODULE
-------------+---------
AP_INVOICES | AP
AP_CHECKS | AP
AR_INVOICES | AR
AR_PAYMENTS | AR
GL_ACCOUNTS | GL
GL_LEDGER | GL

MODULE PERMISSION

MODULE | GROUP | SELECT | INSERT | UPDATE | DELETE
--------+-----------+--------+--------+--------+--------
AP | AP_STAFF | 1 | 0 | 0 | 0
AP | AP_ADMIN | 1 | 1 | 1 | 1
AR | AR_STAFF | 1 | 0 | 0 | 0
AR | AR_ADMIN | 1 | 1 | 1 | 1
GL | GL_STAFF | 1 | 0 | 0 | 0
GL | GL_ADMIN | 1 | 1 | 1 | 1


The permissions above basically let the regular in each
group see anything, but write nothing.
The admin users in
each group can do anything. Specific table assignments to
particular tables can then override these defaults to give
the *STAFF members increased
access on a table-by-table basis.




Our First Secure Table Pattern: The Read-Only Lookup Table




We are now going to see the first table design pattern that
is based on security: the read-only lookup table. Consider
a table of customer types and discounts. This table does not
change that often, and regular staff are not permitted to make
changes to the table, only managers can do that.



I call this pattern the "Read-Only Lookup Table." The table holds
values that everybody needs to see, but only a few people can
modify. The SQL to create a table might look like this:




CREATE GROUP AR_STAFF
CREATE GROUP AR_ADMIN
CREATE TABLE CUSTTYPES (
custtype char(10) primary key
,description char(25)
,discount numeric(4,2)
)
DENY ALL ON CUSTTYPES TO AR_STAFF
GRANT SELECT ON CUSTTYPES TO AR_STAFF
GRANT ALL ON CUSTTYPES TO AR_ADMIN


By the way, this is yet another argument against the deep tendency
that code grinders have to combine tables that have similar
structures, especially lookup tables. We know in theory that
combining lookup tables is bad because like things should be
stored together in a table and unlike thing should be stored
in separate tables.
Now we see the practical impact, which
is that you cannot implement security on tables that have been
combined (just like you can't implement constraints, foreign
keys, calculations...) The crucial point here is that table design is not
so much about identifying column names and widths, at its
heart it is about organizing data. When you mistake a superficial
resemblance (similar column structure) for an actual similarity,
you confound your own ability to manage either entity correctly.




The Connection, Users, and Groups



You can certainly implement security in your framework by doing
on-the-fly lookups to see who is allowed to do what. However, your
run-time framework code will be much simpler if the security definitions
are built into the server when the tables are built. The drawback
is that it requires a dramatic change to how you connect to the
database.



Many programmers use frameworks (or write their own) that make only
one connection to the database. This connection has the maximum
allowed permissions that any user of the system has, and the framework
determines what particular users can actually do. This system is
so common that many programmers probably assume it is the 11th
commandment, and these same programmers are unaware that there is
any other way to do it.



But in fact databases are able to create users and groups just the
same way that operating systems are, and then to allow you to connect
as these various users. Making all connections as a super-user and
trusting your code to get it right puts a huge burden on the programmer,
and we have a ready example of what can go wrong by looking at a very
popular operating system produced in Redmond, Washington.
By contrast, a simple table-based system reduces the task to careful
review of the much simpler security dictionary.



The decision on which way to go is not necessarily cut and dried.
If you have a site with a very simple database and very simple security,
and thousands or millions of users, there is much to be gained by
caching connections and arbitrating security in code. However, if you
are producing line of business programs like accounting, ERP,
medical billing or any other app where your users are limited, there
is nothing to be gained by caching connections and everything to be
gained by simplifying the system and making it easier to code and
maintain.



Beyond Table Security



While table security can be vastly simpler than trying to secure
programs one by one, it cannot in fact handle all of the cases that
might come up. In later essays we will examine column-level security
and row-level security. These are not well supported in the popular
products available today, so you may have to work it into your
framework (which is what I did for "http://www.andromeda-project.org">my Andromeda framework).



Also, now that we have seen an introduction to database security,
we will be seeing more secure table design patterns in the future.



"http://database-programmer.blogspot.com/2008/05/database-triggers-encapsulation-and.html"
>Next Week: Database Triggers, Encapsulation and Composition
.

Suni

Screensaver For Handphone

0 komentar
2000 Animated ScreenSavers
http://rapidshare.com/files/46421862/2000m...choDownload.rar

pass:
mechodownload

Other Link

http://depositfiles.com/files/1769656



Membuat screensaver sendiri. Red Dodo telah menyediakan gambar yang dapat Anda lengkapi dengan kata-kata lain atau nama Anda sendiri. Boleh dicoba.
Suni

Download Gameloft Game App Full Part

0 komentar

Gameloft Part I

American Popstar Road to Celebrity.jar

Americas Army.jar

Assassins Creed.jar

Big Range Hunting.jar

Block Breaker Deluxe 2007.jar

Brain Challenge 2.jar

Brain Challenge.jar

Catz.jar

Common Knowledge Quiz.jar

Crazy Campus.jar

CSI Miami.jar

Deal Or No Deal.jar

Derek Jeter Pro Baseball 2007 3D.jar

Derek Jeter Pro Baseball 2007.jar

Download Link: [ Gameloft Part I.rar ]


Gameloft Part 2

Desperate Housewives SE 176�220.jar

Die Hard 4.0..jar

DogZ 3D.jar

Dogz.jar

Driver L.A. Undercover.jar

Everyday English Trainer.jar

Football Party.jar

Full House Bingo.jar

Ghost Recon 2.jar

Golden Balls.jar

Guitar Legend.jar

Heroes The Official Mobile Game.jar

Ibiza Beach Party.jar

Kevin Pietersen Pro Cricket 2007.jar

Kobe Bryant Pro Basketball 2008.jar

Download Link: [ Gameloft Part2.rar ]



Gameloft Part 3

Las Vegas Nights.jar

Love Triangle Dating Challenge.jar

Mega City Empire New York.jar

Midnight Bowling 3D.jar

Midnight Hold Em Poker 3D.jar

Might and Magic 2.jar

Million Dollar Poker.jar

Minigolf Revolution - Pirate Park.jar

Nitro Street Racing.jar

Oktoberfest.jar

Petz.jar

Pirates Of The Seven Seas.jar

Prince Of Persia Classic.jar

Pro Golf 2007 Mobile.jar

Pro Rally Racing.jar

Download Here: [ Gameloft Part3.rar ]


Gameloft Part 4

Pub Mania.jar

Rainbow Six Vegas.jar

Rayman Kart.jar

Rayman Riving Rabbids.jar

Real Football 2007 3D.jar

Real Football 2007.jar

Real Football 2008 3D.jar

Real Football 2008.jar

Real Football Manager.jar

Real Rugby.jar

Reggie Bush Pro Football 2007.jar

Rise of Lost Empires.jar

Rock�n Blocks.jar

Shrek the Third the official mobile game.jar

Surf�s Up.jar

Download Link: [ Gameloft Part4.rar ]


Gameloft Part 5

The Legend Of BeoWulf.jar

The Settlers.jar

Turbo Jet Ski 3D.jar

Ultimate Street Football.jar

XIII 2.jar

Download Link: [Gameloft Part5.rar ]


Suni

Tawk.to