Changing Values in Array
Tag: Programming
Asp.Net Ajax II : textbox watermark extender
Asp .Net Ajax II : textboxwatermarkextender
PHP Tutorials: MySQL (Part 1)
Using phpmyadmin to create a new table on a database. The basics!
How do I get started in writing/programming in T-SQL?
I am completely confused on what T-SQL really is and how it is different from SQL and its variants. How do you guys program something using T-SQL language? I mean where do you actually ‘encode’ those T-SQL codes? In cobol I use notepad as the programming environment. Do I need to download something like that…
Learn Java part 15
learn Jave programming in the easiest way
How to generate a random number sequence that is non-repeating in visual basic .net ?
I am writing a matching program, and need 24 objects to randomly appear, each twice, across 48 spaces. I figured the best way for me to do this would be to assign the positions a number 1 through 48. but the problem is I can’t find a way to generate a random number sequence in…
iPhone SDK Programming, A Beginner’s Guide
ISBN13: 9780071626491 Condition: NEW Notes: Brand New from Publisher. No Remainder Mark. Product Description Develop your own iPhone applicationsIdeal for non-Mac programmers, this introductory guide shows developers how to create applications for the world’s most popular smart phone. You will learn how to use�a modified version of�the Mac development environment, the Objective-C programming language, and…
Asp.Net 2.0 Membership I : loginstatus loginname
Microsoft Asp.Net 2.0 Membership I : loginstatus loginname – Shalvin Also View : Membership II loginview Contol : youtube.com Membership III createuserwizard youtube.com Membership IV Roles : youtube.com Membership V Role and Membership Classes (Without voice) : video.google.com Membership V Denying Anonymous users (Without voice) : video.google.com Membership VIII Protecting a folder : video.google.com shalvinpd.blogspot.com
Asymmetric Cryptography in Java
Security plays a significant role in our day to day life. So far software applications are concerned, security of data is required for authentication and for several validations. Normally while developing the applications, we use the concept of cryptography for password encryption and decryption. Some applications require more security, so they go for high end…
Learn Java part 9
learn Jave programming in the easiest way