No new comments.
View All Comments
No new messages.
View All Messages
No new notifications.
View All Notifications
Request a new Category
No tag found
Refine by Author
John Charles Olamendy(3)
Dhananjay Kumar (3)
Vijai Anand Ramalingam(2)
Gowry S Paramasivam(1)
Gowri S Paramasivam(1)
Rajesh N K(1)
John Hudai Godel(1)
Shashi Jeevan M P(1)
Anand Kumar Rao(1)
Sudipta Sankar Das(1)
Rajendra Kumar Yerra(1)
Rehan Ahmad Abbasi(1)
Manoj Singh Panwar(1)
No resource found
Mouse and Key Events
Sep 11, 2001.
This article explains the usage of key and mouse events. The following code shows you how you can read mouse position on mouse move.
XML Signatures in Microsoft .NET
Mar 28, 2002.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
Drawing B-Spline Curves
Apr 22, 2002.
The attached source code project draws spline curves between two points.
Key Logger Application in C#
Jun 30, 2002.
In this article, I'll explain an easy but an important concept of how to catch user pressed keys and write them into a log file.
Using Visual Studio .NET to Build and Deploy Applications
Jul 29, 2002.
No matter how much time you spend designing your application there is one key stage where it can all fall apart, the build and deployment stage.This is a first in a series of articles in which I am going to demonstrate how to use Visual Studio .NET.
Windows Forms Printer Selection List
Jul 30, 2002.
In this example we will create a sample windows form containing a combo box which will list the printers installed on the machine on which the program runs. The default printer for the machine is set as the default selection in the combo box.
Form Designer in C# and .NET
Sep 02, 2002.
The FormMaker.NET Application has an undo feature for removing controls you just placed on the form and a fine tuning placement mechanism for positioning the control through the arrow keys.
Extracting Modules and Component(RSAParameter) from X509Certificate PublicKey
Nov 04, 2002.
In some applications, it might be necessary to extract the modulus and exponent from the X509Certificate PublicKey. The X509Certificate.GetPublicKey() returns a byte array that contains the ASN.1 Encoding information along with the modulus and exponent as described in the RFC2459.
Cryptography in Microsoft.NET Part I: Encryption
Dec 12, 2002.
In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
Cryptography in Microsoft.NET Part I: Encryption
Dec 12, 2002.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
DigitizeAny - A .NET Windows Digitization Tool
Dec 17, 2002.
DigitizeAny uses Win32 API calls to obtain the coordinates of the cursor and then translates to the graph coordinates once set. Since a mouse click would essentially bring to focus the window where it is pointed to, this tool uses the key event to capture the coordinates of the cursor.
Code Generator for Basic Stamp II Microcontroller
Oct 15, 2003.
The Basic II Stamp is programmed by the language its named after, Basic. The language is a combination of Basic syntax and built in key words that control the Basic Stamp II chip.
Oracle Connectivity in .NET
Dec 03, 2003.
This whitepaper takes you through different ways of database connectivity to Oracle database from .NET. This also talks about the advantages and disadvantages of all of these technologies.
Object Oriented Concepts in C#
Dec 24, 2003.
In this article we will discuss key concepts of object orientation with their practical implementation in C#. We will discuss here basics of OOPS including Interfaces, Access Modifiers, inheritance, polymorphism etc.
Real Life SQL and .NET: Part I
Jan 13, 2004.
Welcome to the world of SQL and the huge, growing database technologies of today’s business all over the SQL world. By reading this article, we have begun accepting the knowledge that will soon be required for survival in today’s world of relational database and data management. Alas, for the reason that it is first necessary to provide a background of SQL and cover some preliminary concepts that we need to know, the majority of this article is text in paragraph format.
Host Integration Server 2000 : An Overview
Feb 24, 2004.
This white paper highlights some of the features offered by Microsoft's Host Integration Server 2000. This white paper also gives an overview of key benefits and features in Host Integration Server 2000.
Report Generation in .NET
Feb 27, 2004.
Report generation is an integral part of enterprise application development. Choosing the right kind of report generation strategy decides the success of the application in terms of cost and performance. The white paper discusses some of the key factors that need to be considered when architecting reporting systems in .NET and C#.
Using Enter and Tab Keys to Navigate on a Form
Mar 24, 2004.
When building Windows Forms application you may want to use a tab or return key to navigate on your textboxes. This code shows you how to do it.
A Macro for Creating Properties from Private Fields
May 12, 2004.
Macros are a useful way of speeding up your coding efforts, however writing them can be a somewhat daunting task. Luckily, .NET gives you a pretty powerful recording feature for recording macros from key strokes.
OneNote 2003 - An Introduction
Jul 13, 2004.
Microsoft Office OneNoteTM2003 is part of next generation of Microsoft Office products. It allows users to electronically capture, organize, and reuse notes on thick clients.
Sep 16, 2004.
Extreme Programming is new development technique getting adopted in the software development and the key strength of this methodology is simplicity, team work, quality and testing.
Public Key Token Generation Algorithm
Jan 31, 2005.
The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
Best Practices of Exception Management
Mar 08, 2005.
Exception management is one of the key area for all kinds of application development .You should adopt an appropriate strategy for exception management to build high quality and robust application .It is a very powerful concept and makes the development work very easy if its used efficiently.
SmartPhone Album Program with C#
Mar 16, 2005.
This article shows how to represent image’s thumbnail in ListView control, how to work with multi-forms and pass information with each other in a smart phone application, how to do simple image-processing, how to scroll picture in a picturebox and use the smart phone’s dpad keys.
Exploring Security in .NET: Part I
Jul 05, 2005.
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
ASP.NET Session State
Sep 21, 2005.
Session state is nothing more than memory in the shape of a dictionary or hash table, e.g. key-value pairs, which can be set and read for the duration of a user's session.
Hashtable in C#
Nov 14, 2005.
Hashtable is useful when you need to store data in a key and value pair. This article shows how to use hashtable in C#.
Important Aspects about Components
Jan 12, 2006.
In this article, I wil discuss some properties and key definitions about component programming.
Delay Signing an Assembly
Jan 18, 2006.
In this article we will elaborate the terminology Delay Signing as well as what it means. How it works and the approach to achieve it.
How to Read and Write System Registry Keys using C# (VS.Net 2005)
Feb 09, 2006.
Most of the time while working with the Enterprise Application will need to store the user preferences inside the windows system registry. In a general term Windows Registry is the database that holds all the settings Windows needs to function.
Use Customized Indexers
Mar 14, 2006.
Many of you are aware of indexers and its properties. For those unaware of it want to know that indexers are used to represent objects using indexes or even using keys. I.e. we can represent an object of a class by the way an array is using.
Creating MS Word Document using C#, XML and XSLT
Mar 21, 2006.
This simple program demostrate how to create well formatted MS Word documents using C#, XML and XSLT. Using XSLT to create Word documents requires the knowledge of RTF key words.
Data mining and SQL Server 2005
Apr 11, 2006.
Data mining is a key member in the Business Intelligence (BI) product family in SQL Server 2005 . Data mining is about analyzing data and finding hidden patterns using automatic or semiautomatic means, which can be explored for valuable information. It is about learning the characteristics of data set, which are not possible to discover by simple seeing.
Understanding Connection Pooling
Jul 27, 2006.
This article is to go in deep in dome key features in the ADO.NET 2 which was shipped with VS 2005. In this article I will go trough one of the key features which is the Connection Pooling.
Restricting User Input
Dec 28, 2006.
This article describes an approach to restricting the user’s input to letters only, numbers only, letters or numbers only, and special characters only. The approach is simple to implement and can be used whenever it is necessary to restrict a user’s response to instances where it is necessary to capture information from the user into a form’s text box control.
Encrypt a File Using Rijndael
Jan 03, 2007.
In this artical, we will encrypt a file and embed a encrypted key through wich we encrypt that file
Key Issue of sharing
Jan 23, 2007.
Describing how can we share a key from one place to another.
Windows Workflow Foundation at a glance
Apr 27, 2007.
This article is intended to show information about Windows Workflow Foundation (WWF) of key part of Microsoft.NET 3.0 technologies suite. I will illustrate the concepts and the main components of this technology.
How to Submit Form When User Press Enter Key on DropDownList Box
May 25, 2007.
Programming in C#: Understanding the SortedDictionary Class
Jun 21, 2007.
This article illustrates a powerful collection in C#, the SortedDictionary. In the article we will discuss two ways to sort key-value pairs: using an IComparer object and using IComparable keys.
Cryptography in Asp.net
Sep 07, 2007.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
Running a web site in Kiosk mode with c#
Jan 30, 2008.
This article addresses a simple approach to supporting the display of a web site in kiosk mode using a simple win forms application.
One or more rows contain values violating non-null, unique, or foreign-key constraints
Mar 14, 2008.
You may get this error when using a typed DataSet. This tip shows how to fix it.
Using OUTPUT Clause for Getting Deleting Information from Several Tables.
Apr 01, 2008.
In this article I will explain how you can use such a T-SQL (SQL Server 2005) feature as OUTPUT clause in order to get information about rows, which were affected, when deleting process is executed for several tables, “connected” by foreign keys. The examples are written using T-SQL and C#.
Cascading Deletes in LINQ to SQL
Jul 03, 2008.
This article will discuss alternative methods for performing cascading deletes using LINQ to SQL. Cascading delete refers to the action of removing records associated by a foreign key relationship to a record that is the target of a deletion action.
Exception and error handling in enterprise applications
Jul 31, 2008.
In this article, I try to cover the key principles and the main techniques of exception and error handling with examples in SQL Server, Oracle and Microsoft .NET.
Attaching a Digital Certificate (Public Key) to an HTTPS Request
Aug 10, 2008.
This article will guide you on how to post data to an HTTPS (i.e., secure connection) URL from a Windows application (.NET) by attaching a digital certificate from a certificate file and getting the response back.
To be a Business Analyst
Aug 29, 2008.
The Business Analyst (BA) is one of the key roles in any software development project. Many times it is their work which makes or breaks a software project. This article provides an insight of what we need to look at for a BA
Draw a smooth curve through a set of 2D points with Cubic Spline
Dec 24, 2008.
Calculate tabulated function cubic spline and approximate comprising polynomials with polylines to use them with drawing primitives.
Retaining your best people
Apr 25, 2009.
You can replace equipment, infrastructure, tools, etc but at the end of the day it’s the people i.e. human capital which is the critical success factor in today’s competitive environment. Retaining key talent is one of the topmost priorities for all successful managers.
How to turn a mobile device into a mighty survey assistant
Jul 29, 2009.
Marketing research and perfect customers’ knowledge are key factors for successful business. One of the best ways how to get to know your customers and their preferences is running surveys. Usually, the surveys are run by mobile workers using paper based forms. It might sound archaic, yet there are companies that use this manual approach. However, this outdated process can be easily replaced using mobile devices allowing data processing automation.
Triple DES Encryption and Decryption using User provided key
Oct 29, 2009.
In this article, I will explain how to do a Triple DES encryption on a plain text using user provided key. I will calculate a MD5 Hash on the key provided by the user. And that key will be user to encrypt and decrypt the message.
Data Column in ADO.NET
Oct 30, 2009.
In this article I will explain about Data Colum in ADO.Net.
Drawing Splines and Curves in GDI+
Nov 24, 2009.
In this article I will explain how to draw Splines and Curves in GDI+.
Triple DES Encryption and Decryption in WPF
Feb 18, 2010.
In this article we will see how a set of data can be encrypted and saved in file and again while reading it should be readable/decrypted based on key.
What is Business Connectivity Services - A Beginner View
Mar 12, 2010.
In this article we will learn what is Business Connectivity Services and take a look it's key features and some of the common usage scenarios.
Mind Puzzle Game in C#
Apr 12, 2010.
This is a simple game written in C# in which user presses Up, Down, Left, Right arrow keys to play this game.
Update app.config key value at run time in WPF
May 06, 2010.
In this article I am going to show how we can update a key value in app.config file in WPF. For this add reference of System.Configuration in your application.
Button in C#
Jun 01, 2010.
Button class in Windows Forms represents a Button control. A Button control is a child control placed on a Form and used to process click event and can be clicked by a mouse click or by pressing ENTER or ESC keys.
Dictionary in C#
Jul 10, 2010.
A Dictionary class represents a dictionary in C# that is used to represent a collection of keys and values pair of data. This article demonstrates how to use a dictionary in C#.
Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net
Aug 19, 2010.
In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
How to use google ajax search api to embed video searh in web application:
Aug 21, 2010.
Google has launched Ajax API for different purposes “video search” is one of them. Many user's gets confused all about it many times how to get google key, how to embed video search in web application. So here I am explaining how to use video search in web application.
Make Combination of Keys For Our Trial Version Application
Sep 08, 2010.
In this article we make a combination of keys for our trial period application.
Unit testing with VSTS
Sep 20, 2010.
Unit testing is validation and verification methodology where the developers test the individual units of source code. Some key points to remember are - A unit is the smallest part in the application which can be tested. So it can be a method, function or class.
Understanding .NET 2.0 and 3.5 Components
Oct 05, 2010.
This article discusses the key components of .NET Framework 2.0, 3.0, and 3.5.
SharePoint 2010 Site Templates: Create, Save and Use
Dec 15, 2010.
SharePoint site is the key place to bring together all content and activities associated with a particular process, project or group. And there are situations when these processes or projects are regularly repeated within an organization. So to ensure consistency and facilitate continuous improvement a site template can be helpful and time saving.
How to Draw the Bézier curve in Windows Phone 7
Dec 22, 2010.
The Bézier curve is a spline, which is a type of curve used to approximate discrete data with a smooth continuous function.
Dictionary Class in C#
Dec 28, 2010.
The Dictionary class gives us the opportunity to map some values to specific keys; in real life scenarios we need this mechanism to represent some values whenever we call the key associated with them according to an event.
Working with Animating Attached Properties, Splines-Key Frames and Easing Functions in Windows Phone 7
Dec 30, 2010.
You can use Silverlight animations in a couple different ways to move an element around the screen. One way is to target a TranslateTransform set to the element’s RenderTransform property.
Effective Web Services - Four Key Things
Jan 11, 2011.
When you create a web service, you need to address various design issues to build an effective and portable web service. In this article we will discuss various design issues that we face while building a web service.
Understanding Routed Event in Silverlight
Feb 04, 2011.
Silverlight elements use KeyDown and KeyUp events to notify you when a key is pressed. These events use bubbling, so they travel up from the element that currently has focus to the containing elements.
Key Spline Editor in Expression Blend 4
Feb 07, 2011.
Animation Art has become a universal art form that has entertained, informed, and instructed generations around the world for almost 100 years. Animation speaks to everyone in a universal language.
How to bind Dictionary
pair to List box and dropdown list
Feb 11, 2011.
This tutorial explaiins how to bind a Dictionary<key,value> pair to a listbox/dropdown list. The following simple steps show how to bind your listbox/dropdown list to Dictionary<key,value> pair.
Dynamically Naming the Constraint
Mar 04, 2011.
A constraint is nothing but a condition placed on the column or object. Let's see a small example of creating a Primary Key constraint.
Some good Debugging tips
Mar 14, 2011.
Here I am going to explain for you a few shortcut keys which can make debugging faster and more accurate.
Best SharePoint Upgrade Practices
Mar 24, 2011.
Before planning a SharePoint upgrade, certain key points carry importance for a successful implementation.
Web Farm - Simple Overview
Mar 25, 2011.
In this article we are going to discuss a simple overview of the Web Farm and its advantages.
Using Windows Data Protection
Mar 31, 2011.
Windows Data Protection (or WDP) is an encryption system provided by the operating system based on a key which is automatically generated from the logged-in user’s password.
Configure Key Filters in SharePoint 2010
Apr 06, 2011.
In this article we will be seeing how to configure key filters in SharePoint 2010.
Programmatically Configure Key Filters in SharePoint 2010
Apr 08, 2011.
In this article we will be seeing how to configure key filters in SharePoint 2010 using C#.
Add Root Node & Child Node to a TreeView Selected Node At Runtime and Rename the Selected Node
Apr 24, 2011.
This article will show how to add a Root Node & Child Node to a TreeView selected node at runtime & the user can rename the node by pressing the "F2' key from the keyboard...
Add X-Power to Your XML Development with Liquid XML Studio 2011
May 16, 2011.
Today, more and more applications are migrating to the Web and the Cloud services are taking over the world; XML has become one of the key and vital parts of the data exchange mechanism. Whether you are developing client centric applications or building a consumer product, you will end up working with XML.
Create an Analysis Services Project
Jun 13, 2011.
SQL Server Analysis Services (SSAS) provides a unified and integrated view of all your business data as the foundation for all of your traditional reporting, online analytical processing (OLAP) analysis, Key Performance Indicator (KPI) scorecards, and data mining.
Jul 04, 2011.
Jul 04, 2011.
Windows Azure - Regenerate New Access Keys For Azure Storage Account
Jul 18, 2011.
In this article we are going to see how to generate new Access Keys for an Azure Storage Account using the Windows Azure Management Portal.
Windows Azure - Get Access Keys For Azure Storage Account
Jul 18, 2011.
In this article we are going to see how to fetch the Access Keys of an Azure Storage Account using the Windows Azure Management Portal.
Enter Hot key on Textbox in c#
Sep 02, 2011.
In this article, we'll look at using the Enter key to do processing
Protecting passwords or any data in Windows Phone 7 using the Data Protection API
Oct 17, 2011.
The Windows Phone Data Protection API helps us to protect data at the application level. On Windows Phone 7, every application has their own key.
Key Value pairs in Collections
Oct 18, 2011.
A new approach has evolved in Collections ,i.e The LookUp<TKey,TValue> is one the Class in the Collection which represents a collection of keys each mapped to one or more values.
A Dictionary Class Which Permits Duplicate Keys
Nov 08, 2011.
The .NET framework contains a number of ‘Dictionary’ classes.
Special characters not allowed as a value of Partition Key and Row Key
Nov 09, 2011.
Learn why you cannot have special characters as a value of Partition Key and Row Key.
WPF DateTimeUpDown Control
Nov 10, 2011.
A DateTimeUpDown control allows us to increment or decrement the value of a DateTime using up/down keys, button spinner or the mouse wheel. The increment or decrement value depends on the current value and format of the control.
ScaffoldColumn(bool value) vs HiddenInput(DisplayValue = bool value) in MVC
Nov 11, 2011.
In this article, we will see what the use of ScaffoldColumn and HiddenInput. We will also compare what the key differences between these two attribute and what scenario we should consider these attributes for usage. So, accordingly prior to my articles on MVC we will just add these attributes and we will see what the best we can produce.
How To Handle Database and Buss.Logic in MVC 3 If the Requirements Change?
Nov 11, 2011.
In this article, let's clearly focus on how to act accordingly when the client requirement changes towards the working or produced project. So let's add a new field in this demonstration and we will see what the key steps that we need to take to handle this situation.
A Dictionary Class Which Permits Duplicate keys : Part II
Nov 14, 2011.
In this article, I present a number of adjuncts to the 'Lexicon' class which I introduced in an earlier article.
AES Encryption using 256 bit Encryption key and IV spec parameter
Nov 17, 2011.
AES is a strong algorithm to encrypt or decrypt the data. Java, .NET and C++ provide different implementation to achieve this kind of encryption.
Getting started with Expression Web
Nov 21, 2011.
In this article you will be introduced to Expression Web and its key features.
Working with Keys in MySQL
Nov 25, 2011.
In this Article we will learn about keys working in MySQL.
Add Key and Values to the Web.config File Dynamically in ASP.NET
Nov 30, 2011.
This article will help you add Key and Values dynamically to a web.config file.
Custom Software Development
MCN is your source for developing solutions involving websites, mobile apps, cloud-computing, databases, BI, back-end services and processes and client-server applications.
CBeyond Cloud Services
TERMS & CONDITIONS
REPORT A BUG
©2016 C# Corner. All contents are copyright of their authors.
Terms & Conditions
©2016 C# Corner. All contents are copyright of their authors.