Tuesday, December 26, 2006

Chicken Guinea

What a fever is this? Chicken Gunea!

i had to stay @ Home for around 5 days because of this Fever & had to suffer a lot coz of this fever!

Chicken Guinea is a high fever accompanied wit joint stiffness & pains when bit by a mutant mosquitoes (usually with white patches over the legs & are usually seen only in the day light) symptons- high fever with joint pains & stiffness lasting for 4 days causes - 1 and only cause is by mosquito bite and is deadly in some cases if ignored.

Doctor asked only for Rest+have liquid stuffs for Hungry! Anyhow once the fever is over i cant eat anything coz the i wont feel any taste of anything! For that only liquid stuffs is good! Thanks my mama & for my family siblings to help me in this situation! I pray Almighty to not to give this fever for anyone!

Thursday, November 16, 2006

An attempt to attach an auto-named database for file "C:\AAA\database.mdf" failed. A database with the same name exists, or specified file cannot be o

This one of the next headache you have to solve at the time of hosting your application in any web server, and its as follows:

An attempt to attach an auto-named database for file c:\hosting\webhost4life\member\shanti23\aba\LatestABAWebsite\App_Data\aspnetdb.mdf failed. A database with the same name exists, or specified file cannot be opened, or it is located on UNC share.

we have to add following few lines to the App.conf file as below:

just refer the link: http://dotnetforum.lk/blogs/ammar/default.aspx


alternatively you can rename the database at the time of deploying the web application if any further exception bugged you! hopes this will help you all!


Exception Details: System.Data.SqlClient.SqlException: Failed to update database.

i would like to share my experience with you all because when you started working with SQL Server Express 2005 you have to encounter probelms like one of which am i going to explain you in this blog entry: hopes it will helps you to not to search it for the same problem throughout days or months, as i have to search it for the solution for many days!

Exception Details: System.Data.SqlClient.SqlException: Failed to update database "c:\hosting\webhost4life\member\abc23\aba\LatestABAWebsite\App_Data\aspnetdb.mdf" because the database is read-only.

This will happen mainly coz of the folder permission that we have to apply for the App_data folder: so to rectify this problem you have to follow these steps:

After selecting the 'properties' on the "App_Data" directory,

1. Select the security tab
2. CLick on Add... under "Group or User names:" table
3. On the next window, select Advanced, another window appears and on this, select or rather click on "find now" and a list of Groups and Users should appear on the bottom table.
4. Click on ASPNET followed by OK, and the same on the next 2 windows.

if you need to enable the security tab in Windows XP Professional you have to uncheck the setting for "Use simple file sharing (recommended)" under the View tab in the Folder Options control panel applet to enable the Security tab to be displayed. after that you can be able to view the security tab when you viewed any folder properties.

App_Offline.htm

If you place a file with this name in the root of a web application directory, ASP.NET 2.0 will shuts-down the current web application, unloads the web application from the domain server, and stops processing any new incoming requests for that application.

ASP.NET will also then responds to all requests for dynamic pages in the application by sending back the content of the app_offline.htm file.

For example: you might want to have a “Site is under construction” or “the current website is down for maintenance” or "Uploading Changes" message.

This is one of the convenient & easy way to take down your application while you are making big changes or copying lots of new page functionality (at the same time you can avoid the annoying problem of people hitting and activating your site in the middle of a content update). It can also be a useful way to immediately unlock and unload a SQL Express 2005 database whose .mdf data files are residing in the /app_data directory. This will be applicable for the Access (*.mdb) files too!

Once you have removed the app_offline.htm file from the root, the very next request into the web application will cause ASP.NET to load the application and application domain again, and life will continue along as normal.

Thursday, November 02, 2006

AFTER A LONG TIME BACK RESTARTED BLOGGING

hii,

restarted blogging! i was so busy for last few months as i have joined with a new company here in colombo!

hope to see you all soon.

Ammar.

Tuesday, July 11, 2006

The Haditha Massacre

Genocide In Iraq

Tuesday, June 27, 2006

What is a Packet Sniffer?

A packet sniffer is a device or program that allows eavesdropping on traffic traveling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis.

All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Each segment has the destination address attached, the source address, and other information such as the number of packets and reassembly order. Once they arrive at the destination, the packet's headers and footers are stripped away, and the packets reconstituted.

In the example of the simplest network where computers share an Ethernet wire, all packets that travel between the various computers are "seen" by every computer on the network. A hub broadcasts every packet to every machine or node on the network, then a filter in each computer discards packets not addressed to it. A packet sniffer disables this filter to capture and analyze some or all packets traveling through the ethernet wire, depending on the sniffer's configuration. This is referred to as "promiscuous mode." Hence, if Ms. Wise on Computer A sends an email to Mr. Geek on Computer B, a packet sniffer set up on Computer D could passively capture their communication packets without either Ms. Wise or Mr. Geek knowing. This type of packet sniffer is very hard to detect because it generates no traffic of its own.

A slightly safer environment is a switched Ethernet network. Rather than a central hub that broadcasts all traffic on the network to all machines, the switch acts like a central switchboard. It receives packets directly from the originating computer, and sends them directly to the machine to which they are addressed. In this scenario, if Computer A sends an email to Computer B, and Computer D is in promiscuous mode, it still won't see the packets. Therefore, some people mistakenly assume a packet sniffer cannot be used on a switched network.

But there are ways to hack the switch protocol. A procedure called ARP poisoning basically fools the switch to substituting the machine with the packet sniffer for the destination machine. After capturing the data, the packets can be sent to the real destination. The other technique is to flood the switch with MAC (network) addresses so that the switch defaults into "failopen" mode. In this mode it starts behaving like a hub, transmitting all packets to all machines to make sure traffic gets through. Both ARP poisoning and MAC flooding generate traffic signatures that can be detected by packet sniffer detection programs.

A packet sniffer can also be used on the Internet to capture data traveling between computers. Internet packets often have very long distances to travel, passing through several routers that act like intermediate post offices. A packet sniffer might be installed at any point along the way. It could also be clandestinely installed on a server that acts as a gateway or collects vital personal information.

A packet sniffer is not just a hacker's tool. It can be used for network troubleshooting and other useful purposes. However, in the wrong hands, a packet sniffer can capture sensitive personal information that can lead to invasion of privacy, identity theft, and other serious eventualities.
The best defense against a packet sniffer is a good offense: encryption. When strong encryption is used, all packets are unreadable to any but the destination address, making packet sniffers useless. They can still capture packets, but the contents will be undecipherable. This illustrates why it is so important to use secure sites to send and receive personal information, such as name, address, passwords, and certainly any credit card information or other sensitive data. A website that uses encryption starts with https. Email can be made secure by encrypting with a program like PGP (Pretty Good Privacy), which comes with seamless plug-ins for all major email programs.

What is SSL (Secure Sockets Layer)?

SSL or Secure Sockets Layer is a security protocol created by Netscape that has become an international standard on the Internet for exchanging sensitive information between a website and the computer communicating with it, referred to as the client.

SSL technology is embedded in all popular browsers and engages automatically when the user connects to a
web server that is SSL-enabled. It's easy to tell when a server is using SSL security because the address in the URL window of your browser will start with https. The "s" indicates a secure connection.

When your browser connects to an SSL server, it automatically asks the server for a digital Certificate of Authority (CA). This digital certificate positively authenticates the server's identity to ensure you will not be sending sensitive data to a hacker or imposter site. The browser also makes sure the domain name matches the name on the CA, and that the CA has been generated by a trusted authority and bears a valid digital signature. If all goes well you will not even be aware this handshake has taken place.

However, if there is a glitch with the CA, even if it is simply out of date, your browser will pop up a window to inform you of the exact problem it encountered, allowing you to end the session or continue at your own risk.

Once the handshake is completed, your browser will automatically encrypt all information that you send to the site, before it leaves your computer. Encrypted information is unreadable en route. Once the information arrives at the secure server, it is decrypted using a secret key. If the server sends information back to you, that information is also encrypted at the server's end before being sent. Your browser will decrypt it for you automatically upon arrival, then display it as it normally does.
For those running a secure server it is also possible to authenticate the client connecting to the server to ensure, for example, that the person is not pretending to be someone who has been granted restricted access. Another feature of SSL technology is the ability to authenticate data so that an interceder cannot substitute another transmission for the actual transmission without being detected.

Though SSL makes exchanging sensitive information online secure, it cannot guarantee that the information will continue to be kept secure once it arrives safely at the server. For assurance that sensitive information is handled properly once it has been received, you must read the site's privacy policy. It does little good to trust your personal data to SSL, if the people who ultimately have it will be sharing it with third parties, or keeping it on servers that are not bound by restricted access and other security protocols. Therefore it is always wise to read any site's privacy policy, which includes security measures, before volunteering your personal information online.

What are Computer Cookies?

A computer cookie is a small text file which contains a unique ID tag, placed on your computer by a website. The website saves a complimentary file with a matching ID tag. In this file various information can be stored, from pages visited on the site, to information voluntarily given to the site. When you revisit the site days or weeks later, the site can recognize you by matching the cookie on your computer with the counterpart in its database.

There are two types of cookies: temporary and permanent.

Temporary cookies, also called session cookies, are stored temporarily in your browser's memory and are deleted as soon as you end the session by closing the browser.

Permanent cookies, also called persistent cookies, are stored permanently on your computer's hard drive and, if deleted, will be recreated the next time you visit the sites that placed them there.

Cookie technology addressed the need to keep track of information entered at a site so that if you submitted a registration form for example, the site could associate that information with you as you traveled through the site's pages. Otherwise, every time you clicked on a different page in the site, establishing a new connection, the site would lose the information in reference to you, and would have to ask you for it again.

A temporary cookie solved this problem in the short term by setting aside a little bit of your browser's memory to make a "folder" to save information for you. But temporary cookies were lost as soon as you closed your browser. You were not recognized on subsequent visits.

Persistent cookies solved this problem. They allowed a site to recognize you permanently by transferring a text file to your computer with a unique ID tag, matching a complimentary file on the server. Now cookies could persist for years.

Both temporary and permanent cookies can be used for many helpful purposes. Automatic registration log-on, preserving website preferences, and saving items to a shopping cart are all examples of cookies put to good use.

But permanent cookies resulted in unanticipated uses as well.

Many websites began keeping track of when an individual visited, what pages were viewed, and how long the visitor stayed. This information was stored in the visitor's cookie. When he returned, the log of previous visits to the site was immediately known, and the new visit was added to his log. If the visitor ever offered personal information at the site, his real identity, address and other personal information was associated with the anonymous ID tag. Website profiling was born.

Marketers had an even more unique advantage. A given marketer may have advertising rights on several hundred or even many thousands of the most popular websites. In this way the marketer can pass cookies to surfers on countless sites, then recognize a surfer's unique ID tag whenever he or she visits one of their affiliated sites. In this way the marketer can track someone across the web, from site to site, logging a comprehensive profile of the individual's surfing habits over a period of months and even years. Sophisticated profiling programs then sort the data provided by the cookie to categorize the target in several different areas, based on statistical data. Gender, race, income level, political leanings, religious affiliation and even sexual orientation can all be determined with various degrees of accuracy through cookie profiling. Much depends on how much a person surfs, and where they choose to go online.

As a result of public outcry in response to surreptitious profiling, cookie controls were placed in post 3.x browsers to allow users to turn cookies off -- options that were not available in 1995 when permanent cookie technology was first embedded into browsers without public awareness or knowledge of how they could be used. Third-party cookies often have their own controls, as they are normally cookies placed by marketers that are used for profiling.

Cookie controls also allow user-created lists for exceptions, so that one can turn cookies off, for example, but exempt sites where cookies are put to a useful purpose.

The name "cookie" comes from fortune cookie, because of the hidden information inside.

What is RSS (Really Simple Syndication)?

RSS or Really Simple Syndication is a useful tool for keeping updated on your favorite websites. RSS makes use of an XML code that constantly scans the content of a website for updates and then broadcasts those updates to all subscribers through a feed.

RSS feeds are typically used with news sites or blogs, although any website can use them to disseminate information. When an update is sent out, it includes a headline and a small amount of text, either a summary or the lead-in to the larger story. You will need to click a link to read more.

In order to receive RSS feeds, you must have an aggregator, a feed reader. There are a number of aggregators online, many of them free, so with a little bit of searching, you should be able to find an interface that appeals to you. In addition to being available on your computer, RSS feeds can also be read on PDAs and cell phones.

When you come across a website you would like to add to your aggregator, you can do so in one of two ways. Most sites that offer an RSS feed have an "RSS" or "XML" button on their homepage that you can click on and it will instantly add that feed to your aggregator. Depending on your aggregator, you may instead need to copy and paste the URL of the feed into the program.

By either method, the feed will be available as soon as you've added it, and your next update could arrive in seconds. If you ever decide that you don't want to receive updates anymore, you simply delete the feed or URL from your aggregator.

Perhaps you already receive information on website updates through some sort of e-mail newsletter. RSS feeds are preferable to newsletter updates because they are instantaneous; you don't have to wait until a designated day of the week to receive your summary. They will also never be held up by a spam filter.

RSS feeds are used daily by the people who realize the convenience of up-to-the-minute news and reports and the time they can save reading only those updates interested for them rather digging into older stuff again and again, and they look to become even more popular in the future.

101 Simple ways to Brighten Some Ones Day

  1. Call an old friend, just to say hi.
  2. Hold a door open for a stranger.
  3. Invite someone to lunch.
  4. Compliment someone on his or her appearance.
  5. Ask a coworker for their opinion on a project.
  6. Bring cookies to work.
  7. Let someone cut in during rush hour traffic.
  8. Leave a waitress or waiter a big tip.
  9. Tell a cashier to have a nice day.
  10. Call your parents.
  11. Let someone know you miss them.
  12. Treat someone to a movie.
  13. Let a person know you really appreciate them.
  14. Visit a retirement center.
  15. Take a child to the zoo.
  16. Fill up your spouse's car with gas.
  17. Surprise someone with a small gift.
  18. Leave a thank-you note for the cleaning staff at work.
  19. Write a letter to a distant relative.
  20. Tell someone you thought about them the other day.
  21. Put a dime in a stranger's parking meter before the time expires.
  22. Bake a cake for a neighbor.
  23. Send someone flowers to where they work.
  24. Invite a friend to tea.
  25. Recommend a good book to someone.
  26. Donate clothing to a charity.
  27. Offer an elderly person a ride to where they need to go.
  28. Bag your own groceries at the checkout counter.
  29. Give blood.
  30. Offer free baby-sitting to a friend who's really busy or just needs a break.
  31. Help your neighbor rake leaves or shovel snow.
  32. Offer your seat to someone when there aren't any left.
  33. Help someone with a heavy load.
  34. Ask to see a store's manager and comment on the great service.
  35. Give your place in line at the grocery store to someone who has only a few items.
  36. Hug someone in your family for no reason.
  37. Wave to a child in the car next to you.
  38. Send a thank-you note to your doctor.
  39. Repeat something nice you heard about someone else.
  40. Leave a joke on someone's answering machine.
  41. Be a mentor or coach to someone.
  42. Forgive a loan.
  43. Fill up the copier machine with paper after you're done using it.
  44. Tell someone you believe in them.
  45. Share your umbrella on a rainy day.
  46. Welcome new neighbors with flowers or a plant.
  47. Offer to watch a friend's home while they're away.
  48. Ask someone if they need you to pick up anything while you're out shopping.
  49. Ask a child to play a board game, and let them win.
  50. Ask an elderly person to tell you about the good old days.
  51. During bad weather, plan an indoor picnic with the family.
  52. Buy someone a goldfish and bowl.
  53. Compliment someone on their cooking and politely ask for a second helping.
  54. Dance with someone who hasn't been asked.
  55. Tell someone you mentioned them in your prayers.
  56. Give children's clothes to another family when your kids outgrow them.
  57. Deliver extra vegetables from your garden to the whole neighborhood.
  58. Call your spouse just to say, I love you.
  59. Call someone's attention to a rainbow or beautiful sunset.
  60. Invite someone to go bowling.
  61. Figure out someone's half-birthday by adding 182 days, and surprise them with a cake.
  62. Ask someone about their children.
  63. Tell someone which quality you like most about them.
  64. Brush the snow off of the car next to yours.
  65. Return your shopping cart to the front of the store.
  66. Encourage someone's dream, no matter how big or small it is.
  67. Pay for a stranger's cup of coffee without them knowing it.
  68. Leave a love letter where your partner will find it.
  69. Ask an older person for their advice.
  70. Offer to take care of someone's pet while they're away.
  71. Tell a child you're proud of them.
  72. Visit a sick person, or send them a care package.
  73. Join a Big Brother or Sister program.
  74. Leave a piece of candy on a coworker's desk.
  75. Bring your child to work with you for the afternoon.
  76. Give someone a recording of their favorite music.
  77. Email a friend some information about a topic they are especially interested in.
  78. Give someone a homemade gift.
  79. Write a poem for someone.
  80. Bake some cookies for your local fire or police department.
  81. Organize a neighborhood cleanup and have a barbecue afterwards.
  82. Help a child build a birdhouse or similar project.
  83. Check in on an old person, just to see if they're okay.
  84. Ask for the recipe after you eat over at someone's house.
  85. Personally welcome a new employee at work and offer to take them out for lunch.
  86. While in a car, ask everyone to buckle up because they are important to you.
  87. Let someone else eat the last slice of cake or pizza.
  88. Stop and buy a drink from a kid's lemonade stand.
  89. Forgive someone when they apologize.
  90. Wave to someone looking for a parking space when you're about to leave a shopping center.
  91. Send a copy of an old photograph to a childhood friend.
  92. Leave a pint of your spouse's favorite flavor of ice cream in the freezer with a bow on it.
  93. Do a household chore that is usually done by someone else in the family.
  94. Be especially happy for someone when they tell you their good news.
  95. Compliment a coworker on their role in a successful project.
  96. Give your spouse a spontaneous back rub at the end of the day.
  97. Serve someone in your family breakfast in bed.
  98. Ask someone if they've lost weight.
  99. Make a donation to a charity in someone's honor.
  100. Take a child to a ballgame.And last, but not least...
  101. WITH LOVE...ammar

Friday, June 23, 2006

Restarted Blogging

mmmm..........restared to blogging on blogspot! coz of busy schedule i was unable to blog too! :0

Saturday, April 22, 2006

What is managed code?

Recently I have been working on pulling together some background information just to improve my knowledge bit further and I thought I'd share it here.

What is managed code?

Managed code is code that has its execution managed by the .NET Framework Common Language Runtime. It refers to a contract of cooperation between natively executing code and the runtime. This contract specifies that at any point of execution, the runtime may stop an executing CPU and retrieve information specific to the current CPU instruction address. Information that must be query-able generally pertains to runtime state, such as register or stack memory contents.

The necessary information is encoded in an Intermediate Language (IL) and associated metadata, or symbolic information that describes all of the entry points and the constructs exposed in the IL (e.g., methods, properties) and their characteristics. The Common Language Infrastructure (CLI) Standard (which the CLR is the primary commercial implementation) describes how the information is to be encoded, and programming languages that target the runtime emit the correct encoding. All a developer has to know is that any of the languages that target the runtime produce managed code emitted as PE files that contain IL and metadata. And there are many such languages to choose from, since there are nearly 20 different languages provided by third parties – everything from COBOL to Camel – in addition to C#, J#, VB .Net, Jscript .Net, and C++ from Microsoft.

Before the code is run, the IL is compiled into native executable code. And, since this compilation happens by the managed execution environment (or, more correctly, by a runtime-aware compiler that knows how to target the managed execution environment), the managed execution environment can make guarantees about what the code is going to do. It can insert traps and appropriate garbage collection hooks, exception handling, type safety, array bounds and index checking, and so forth. For example, such a compiler makes sure to lay out stack frames and everything just right so that the garbage collector can run in the background on a separate thread, constantly walking the active call stack, finding all the roots, chasing down all the live objects. In addition because the IL has a notion of type safety the execution engine will maintain the guarantee of type safety eliminating a whole class of programming mistakes that often lead to security holes.

Contrast this to the unmanaged world: Unmanaged executable files are basically a binary image, x86 code, loaded into memory. The program counter gets put there and that’s the last the OS knows. There are protections in place around memory management and port I/O and so forth, but the system doesn’t actually know what the application is doing. Therefore, it can’t make any guarantees about what happens when the application runs


Managed code is code executed by a .NET virtual machine, such as Microsoft's .NET Framework Common Language Runtime, The Mono Project, or DotGNU Project.

In a
Microsoft Windows environment, all other code has come to be known as unmanaged code. In non-Windows and mixed environments, managed code is sometimes used more generally to refer to any interpreted programming language.

Managed refers to a method of exchanging information between the program and the
runtime environment. It is specified that at any point of execution, the runtime may stop an executing CPU and retrieve information specific to the current CPU instruction address. Information that must be accessible generally pertains to runtime state, such as processor register or stack memory contents.

The necessary information is then encoded in
Common Intermediate Language (formerly known as Microsoft Intermediate Language) and associated metadata.

Before the code is run, the Intermediate Language is compiled into native
machine code. Since this compilation happens by the managed execution environment's own runtime-aware compiler, the managed execution environment can guarantee what the code is going to do. It can insert garbage collection hooks, exception handling, type safety, array bounds, index checking, etc.

This is traditionally referred to as
Just-in-time compilation. However, unlike most traditional just in time compilers, the file that holds the pseudo machine code that the virtual machine compiles into native machine code can also contain pre-compiled binaries for different native machines (eg x86 and PowerPC). This is similar in concept to the Apple Universal binary format.

Friday, March 17, 2006

My DNA Test

Do this test and get You PersonalDNA. This nice test from http://personaldna.comAnd this my result. How about you

How to recruit the right person for the job?

Put about 100 bricks in some
particular order in a closed
room with an
open window.

Then send 2 or 3 candidates in
the room and close the door.
Leave them alone and come back
after 6 hours and then analyze
the situation.

If they are counting the
bricks.
Put them in the accounts
department.

If they are recounting them..
Put them in auditing.

If they have messed up the
whole place with the bricks.
Put them in engineering.

If they are arranging the
bricks in some strange order.
Put them in planning.

If they are throwing the
bricks at each other.
Put them in operations.

If they are sleeping.
Put them in security.

If they have broken the bricksinto pieces.
Put them in information
technology.

If they are sitting idle.
Put them in human resources.

If they say they have tried
different combinations, yet
not a brick has
been moved.
Put them in sales.

If they have already left for
the day.
Put them in marketing.

If they are staring out of the
window.
Put them on strategic
planning.

And then last but not least.
If they are talking to each
other and not a single brick
has been
moved.
Congratulate them and put them
in top management.

Monday, March 13, 2006

Office "12"

The 2007 Microsoft Office release, available by the end of 2006, is an integrated system of programs, servers, and services that will help you meet your business and personal needs. Work more efficiently, stay organized, and more easily collaborate and share information using the security-enhanced 2007 Microsoft Office system.

Register to get the latest news about the 2007 Microsoft Office release, formerly code-named Office "12", including notification when Beta 2 is available.

By default, documents created in the next release of Microsoft Office products will be based on new, XML-based file formats. Distinct from the binary-based file format that has been a mainstay of past Microsoft Office releases, the new Office XML Formats are compact, robust file formats that enable better data integration between documents and back-end systems. An open, royalty-free file format specification maximizes interoperability in a heterogeneous environment, and enables any technology provider to integrate Microsoft Office documents into their solutions.

The new Office XML Formats introduce a number of benefits not only for developers and the solutions they build, but also for individual users and organizations of all sizes.

http://www.microsoft.com/office/preview/suites.mspx

Friday, March 10, 2006

World's Fastest, Most Expensive Car Hits the Market
















Bugatti Veyron Costs More Than $1 Million, Can Hit 62 Mph In 2.5 Seconds

When your car costs more than $1.2 million, travels over 230 mph, and hits 62 mph in 2.5 seconds, you do not sit in a passenger cabin — you sit in a "survival cell."
The "survival cell" is the heart of the Bugatti Veyron, billed as the world's fastest, most expensive and most exclusive factory-built car. It will arrive in the United States beginning early next year.

Wednesday, March 01, 2006

Baby

Nice Baby

Tuesday, February 28, 2006

Assemblies

Assemblies

The assembly is the building block of a VB.NET application. Basically, an assembly is a collection of the types and resources that are built together to provide functionality to an application.

· Assemblies look like dynamic link libraries (.dll) or executable programs (.exe).
· Differ from .exe and .dll files in that they contain the information found in a type library plus the information about everything else needed to use an application or component.
· Includes a mix of Microsoft Intermediate Language (IL) and machine code.
· Invokes the CLR by machine code found in the first several bytes of an assembly file.
· Contains one or more files.
· An application can be composed of one or more assemblies.
· An assembly can be a single portable executable (PE) file (like an .exe or .dll) or multiple PE files and other external resource files such as bitmap files.

Assemblies store metadata (data about the application) and include:

§ Information for each public class or type used in the assembly – information includes class or type names, the classes from which an individual class is derived, etc.
§ Information on all public methods in each class – includes the method name and any return values.
§ Information on every public parameter for each method – includes the parameter name and type.
§ Information on public enumerations including names and values.
§ Information on the assembly version (each assembly has a specific version number).
§ Intermediate language code to execute.
§ Required resources such as pictures, assembly metadata – also called the assembly manifest (the assembly title, description, version information, etc).

Multiple versions of an assembly can run simultaneously on the same client computer. This aids with compatibility with previous versions.

Assemblies shared by multiple applications on a client computer can be installed into the global assembly cache of Windows – this enhances security because only users with Administrator privileges on the machine can delete from the global assembly cache.

Strong-Named Assemblies

The strong-named assembly concept is used to guarantee the uniqueness of an assembly name – unique names are generated with the use of public and private key pairs when an assembly is compiled.

Applications can generally only run with the assembly version with which they are originally compiled. In order to update a component (such as a DLL for a control you've created), a publisher policy file is used to redirect an assembly binding request to a new version.

The .NET framework checks the integrity of strong-named assemblies to ensure they have not been modified since they were last built. This prevents unauthorized modification before loading.

The .NET framework creates a strong-named assembly by combining the assembly identify (name, version, and culture information) with a public key and digital signature.

As the programmer, you must generate the strong name key file (.snk filename extension) that contains the public-private key pair by using the Strong Name (Sn.Exe) utility or Visual Basic.NET IDE (this latter choice is usually the approach taken – simply involves clicking the right block during the building of an assembly). In fact, a project's property page has a Strong Name section to automatically generate a strong name key file to add to a project. The public key is inserted into an assembly at compile time. The private key is used to sign the assembly.

Versioning Strong-Named Assemblies

This shows an example publisher policy file written in XML. This file would be compiled for shipment with a new component version using the Assembly Generation tool (Al.Exe). This signs the assembly with the strong name used originally with the first version in order to confirm that the new component is from a valid source.

(configuration)
(runtime)
(assemblyBinding)
(dependentAssembly)
(assemblyIdentity name = "myassembly"
publicKeyTokey="ba76ce45677f9cd6"
culture="en-us"/)
(bindingRedirect
oldVersion="1.0.0.0"
newVersion="2.0.0.0"/)
(codeBase version="2.0.0.0"
href=
http://www.fh.ora2003.edu/Test.dll/)
(/dependentAssembly)
(/assemblyBinding)
(/runtime)
(/configuration)

Ooops :-( i was unable to write less than sign and greater than sign in this blog so i had to use
( - less than sign
) - greater than sign.

The publicKeyTokey attribute is a hexadecimal value that identifies the strong name of the assembly.

How to send e-mail programmatically with System.Web.Mail and Visual Basic .NET

This article demonstrates how to use System.Web.Mail to send an e-mail message in Visual Basic .NET.

1.Start Microsoft Visual Studio .NET. On the File menu, click New and then click Project. Click Visual Basic Projects, click the Console Application template, and then click OK. By default, Module1.vb is created.


2.Add a reference to System.Web.dll. To do this, follow these steps:

a.On the Project menu, click Add Reference.
b.On the .NET tab, locate System.Web.dll, and then click Select.
c.Click OK in the Add References dialog box to accept your selections. If you receive a prompt to generate wrappers for the libraries you selected, click Yes.


3.In the code window, replace the whole code with:Imports System.Web.Mail

Module Module1
Sub Main()
Dim oMsg As MailMessage = New MailMessage()
' TODO: Replace with sender e-mail address.
oMsg.From = "sender@somewhere.com"
' TODO: Replace with recipient e-mail address.
oMsg.To = "recipient@somewhere.com"
oMsg.Subject = "Send using Web Mail"
' SEND IN HTML FORMAT (comment this line to send plain text).
oMsg.BodyFormat = MailFormat.Html
'HTML Body (remove HTML tags for plain text).
oMsg.Body = "'Hello World!'" ' you can use html tags here to edit your texts as you wish
' ADD AN ATTACHMENT.
' TODO: Replace with path to attachment.
Dim sFile As String = "C:\temp\Hello.txt"
Dim oAttch As MailAttachment = New MailAttachment(sFile, MailEncoding.Base64)
oMsg.Attachments.Add(oAttch)
' TODO: Replace with the name of your remote SMTP server.
SmtpMail.SmtpServer = "MySMTPServer"
SmtpMail.Send(oMsg)
oMsg = Nothing
oAttch = Nothing
End Sub
End Module

4.Modify code where you see "TODO".
5.Press F5 to build and run the program.
6.Verify that the e-mail message has been sent and received.

How To Create Classes and Objects in Visual Basic .NET

In Visual Basic .NET, a class can contain fields, methods, and properties. This article demonstrates how to create a new class to represent a baseball team. In this article, you will define fields, methods, and properties for the class. You will then create an object of this class type and make use of its methods and properties.

http://support.microsoft.com/kb/307210/en-us

How to create a custom menu in Visual Basic .NET 2003

really fun article :-)

just refer this link

http://support.microsoft.com/kb/888168/en-us

How to send attachments in an e-mail message by using Visual Basic .NET

To send attachments in an e-mail message by using Visual Basic .NET, follow these steps:

1.Start Microsoft Visual Studio .NET.

2.On the File menu, point to New, and then click Project.

3.In the Visual Basic Projects types list, click Console Application. By default, the Module1.vb file is created.

4.If Office Outlook 2003 is installed on your development computer, add a reference to the Microsoft Outlook 11.0 Object Library. If Outlook 2002 is installed on your development computer, add a reference to the Microsoft Outlook 10.0 Object Library. To do so, follow these steps:

a.On the Project menu, click Add Reference.
b.Click the COM tab, locate Microsoft Outlook 11.0 Library or Microsoft Outlook 10.0 Object Library, and then click Select.
c.In the Add References dialog box, click OK.
d.If you are prompted to generate wrappers for the libraries that you selected, click Yes.

5.In the code window, replace the code with the following:Module Module1


Sub Main()
' Create an Outlook application.
Dim oApp As Outlook._Application
oApp = New Outlook.Application()
' Create a new MailItem.
Dim oMsg As Outlook._MailItem
oMsg = oApp.CreateItem(Outlook.OlItemType.olMailItem)
oMsg.Subject = "Send Attachment Using OOM in Visual Basic .NET"
oMsg.Body = "Hello World" & vbCr & vbCr
' TODO: Replace with a valid e-mail address.
oMsg.To = "user@example.com"
' Add an attachment
' TODO: Replace with a valid attachment path.
Dim sSource As String = "C:\Temp\Hello.txt"
' TODO: Replace with attachment name
Dim sDisplayName As String = "Hello.txt"
Dim sBodyLen As String = oMsg.Body.Length
Dim oAttachs As Outlook.Attachments = oMsg.Attachments
Dim oAttach As Outlook.Attachment
oAttach = oAttachs.Add(sSource, , sBodyLen + 1, sDisplayName)
' Send
oMsg.Send()
' Clean up
oApp = Nothing
oMsg = Nothing
oAttach = Nothing
oAttachs = Nothing
End Sub
End Module

6.Search for the TODO text string in the code, and then modify the code for your environment.
7.Press the F5 key to build and to run the program.

8.Make sure that the e-mail message and the attachment have been sent.

Wednesday, February 22, 2006

Life is a....



Life is a challenge
Meet it
Life is a gift
Accept it
Life is an adventure
Dare it
Life is a sorrow
Face it
Life is a duty
Perform it
Life is a mystery
Unfold it
Life is a game
Play it
Life is a song
Sing it
Life is an opportunity
Take it
Life is a journey
Complete it
Life is a promise
Fulfill it
Life is a love
Love it
Life is a beauty
Praise it
Life is a spirit
Realize it
Life is a struggle
Fight it
Life is a puzzle
Solve it
Life is a goal
Achieve it