No new comments.
View All Comments
No new messages.
View All Messages
No new notifications.
View All Notifications
Request a new Category
No tag found
Refine by Author
John Charles Olamendy(4)
Vijai Anand Ramalingam(3)
Dhananjay Kumar (2)
Gowry S Paramasivam(1)
Gowri S Paramasivam(1)
Rajesh N K(1)
John Hudai Godel(1)
Shashi Jeevan M P(1)
Anand Kumar Rao(1)
Sudipta Sankar Das(1)
Rajendra Kumar Yerra(1)
Rehan Ahmad Abbasi(1)
No resource found
Mouse and Key Events
Sep 11, 2001.
This article explains the usage of key and mouse events. The following code shows you how you can read mouse position on mouse move.
XML Signatures in Microsoft .NET
Mar 28, 2002.
In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
.NET COM Interoperability - Part 1: Using COM Components from .NET Framework
Apr 02, 2002.
The DotNet framework exposes COM objects through a proxy called the runtime callable wrapper (RCW). The primary function of RCW is to marshal call between a managed client (.Net) and unmanaged COM object. The runtime maintains a single RCW for each COM object.
Key Logger Application in C#
Jun 30, 2002.
In this article, I'll explain an easy but an important concept of how to catch user pressed keys and write them into a log file.
Using Visual Studio .NET to Build and Deploy Applications
Jul 29, 2002.
No matter how much time you spend designing your application there is one key stage where it can all fall apart, the build and deployment stage.This is a first in a series of articles in which I am going to demonstrate how to use Visual Studio .NET.
Windows Forms Printer Selection List
Jul 30, 2002.
In this example we will create a sample windows form containing a combo box which will list the printers installed on the machine on which the program runs. The default printer for the machine is set as the default selection in the combo box.
Double Buffer Drawing with DirectDraw: Part1
Aug 15, 2002.
Because we will be primary focusing on 2D game programming in the first articles, we will use the DirectX7 API which is perfect for its DirectDraw class and simplicity. Don’t worry for not having the right DLL because DirectX8 has full backward compatibility to DirectX7 and the COM object should already be available on your computer if you have DirectX 8 installed.
Form Designer in C# and .NET
Sep 02, 2002.
The FormMaker.NET Application has an undo feature for removing controls you just placed on the form and a fine tuning placement mechanism for positioning the control through the arrow keys.
Extracting Modules and Component(RSAParameter) from X509Certificate PublicKey
Nov 04, 2002.
In some applications, it might be necessary to extract the modulus and exponent from the X509Certificate PublicKey. The X509Certificate.GetPublicKey() returns a byte array that contains the ASN.1 Encoding information along with the modulus and exponent as described in the RFC2459.
Cryptography in Microsoft.NET Part I: Encryption
Dec 12, 2002.
In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
Cryptography in Microsoft.NET Part I: Encryption
Dec 12, 2002.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
DigitizeAny - A .NET Windows Digitization Tool
Dec 17, 2002.
DigitizeAny uses Win32 API calls to obtain the coordinates of the cursor and then translates to the graph coordinates once set. Since a mouse click would essentially bring to focus the window where it is pointed to, this tool uses the key event to capture the coordinates of the cursor.
Code Generator for Basic Stamp II Microcontroller
Oct 15, 2003.
The Basic II Stamp is programmed by the language its named after, Basic. The language is a combination of Basic syntax and built in key words that control the Basic Stamp II chip.
Oracle Connectivity in .NET
Dec 03, 2003.
This whitepaper takes you through different ways of database connectivity to Oracle database from .NET. This also talks about the advantages and disadvantages of all of these technologies.
Object Oriented Concepts in C#
Dec 24, 2003.
In this article we will discuss key concepts of object orientation with their practical implementation in C#. We will discuss here basics of OOPS including Interfaces, Access Modifiers, inheritance, polymorphism etc.
Real Life SQL and .NET: Part I
Jan 13, 2004.
Welcome to the world of SQL and the huge, growing database technologies of today’s business all over the SQL world. By reading this article, we have begun accepting the knowledge that will soon be required for survival in today’s world of relational database and data management. Alas, for the reason that it is first necessary to provide a background of SQL and cover some preliminary concepts that we need to know, the majority of this article is text in paragraph format.
Host Integration Server 2000 : An Overview
Feb 24, 2004.
This white paper highlights some of the features offered by Microsoft's Host Integration Server 2000. This white paper also gives an overview of key benefits and features in Host Integration Server 2000.
Report Generation in .NET
Feb 27, 2004.
Report generation is an integral part of enterprise application development. Choosing the right kind of report generation strategy decides the success of the application in terms of cost and performance. The white paper discusses some of the key factors that need to be considered when architecting reporting systems in .NET and C#.
Using Enter and Tab Keys to Navigate on a Form
Mar 24, 2004.
When building Windows Forms application you may want to use a tab or return key to navigate on your textboxes. This code shows you how to do it.
A Macro for Creating Properties from Private Fields
May 12, 2004.
Macros are a useful way of speeding up your coding efforts, however writing them can be a somewhat daunting task. Luckily, .NET gives you a pretty powerful recording feature for recording macros from key strokes.
OneNote 2003 - An Introduction
Jul 13, 2004.
Microsoft Office OneNoteTM2003 is part of next generation of Microsoft Office products. It allows users to electronically capture, organize, and reuse notes on thick clients.
Sep 16, 2004.
Extreme Programming is new development technique getting adopted in the software development and the key strength of this methodology is simplicity, team work, quality and testing.
Oct 05, 2004.
CopySchema is a utility for copying all the data from one Oracle schema to another. Although similar to the exp/imp and bulk load utilities of Oracle, it has the advantage of offering a simple GUI interface and of handling changes to the schema.
Public Key Token Generation Algorithm
Jan 31, 2005.
The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
Best Practices of Exception Management
Mar 08, 2005.
Exception management is one of the key area for all kinds of application development .You should adopt an appropriate strategy for exception management to build high quality and robust application .It is a very powerful concept and makes the development work very easy if its used efficiently.
SmartPhone Album Program with C#
Mar 16, 2005.
This article shows how to represent image’s thumbnail in ListView control, how to work with multi-forms and pass information with each other in a smart phone application, how to do simple image-processing, how to scroll picture in a picturebox and use the smart phone’s dpad keys.
Exploring Security in .NET: Part I
Jul 05, 2005.
This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
ASP.NET Session State
Sep 21, 2005.
Session state is nothing more than memory in the shape of a dictionary or hash table, e.g. key-value pairs, which can be set and read for the duration of a user's session.
Hashtable in C#
Nov 14, 2005.
Hashtable is useful when you need to store data in a key and value pair. This article shows how to use hashtable in C#.
Important Aspects about Components
Jan 12, 2006.
In this article, I wil discuss some properties and key definitions about component programming.
Delay Signing an Assembly
Jan 18, 2006.
In this article we will elaborate the terminology Delay Signing as well as what it means. How it works and the approach to achieve it.
How to Read and Write System Registry Keys using C# (VS.Net 2005)
Feb 09, 2006.
Most of the time while working with the Enterprise Application will need to store the user preferences inside the windows system registry. In a general term Windows Registry is the database that holds all the settings Windows needs to function.
Use Customized Indexers
Mar 14, 2006.
Many of you are aware of indexers and its properties. For those unaware of it want to know that indexers are used to represent objects using indexes or even using keys. I.e. we can represent an object of a class by the way an array is using.
Creating MS Word Document using C#, XML and XSLT
Mar 21, 2006.
This simple program demostrate how to create well formatted MS Word documents using C#, XML and XSLT. Using XSLT to create Word documents requires the knowledge of RTF key words.
Data mining and SQL Server 2005
Apr 11, 2006.
Data mining is a key member in the Business Intelligence (BI) product family in SQL Server 2005 . Data mining is about analyzing data and finding hidden patterns using automatic or semiautomatic means, which can be explored for valuable information. It is about learning the characteristics of data set, which are not possible to discover by simple seeing.
System Views and Functions in SQL Server 2005 by Steve on Jul 06, 2006
Jul 06, 2006.
I tried to explore some basic TSQL functions and VIEWS in SQL Server 2005. I believe this would be useful when we write DDL-DML Statements.
Understanding Connection Pooling
Jul 27, 2006.
This article is to go in deep in dome key features in the ADO.NET 2 which was shipped with VS 2005. In this article I will go trough one of the key features which is the Connection Pooling.
The .NET 2.0 Framework Provider Pattern
Aug 11, 2006.
The Provider Model Design Pattern was first introduced with the .NET 1.1 framework, specifically in the ASP.NET starter kits and was formalized in ASP.NET Whidbey as a membership management provider API (Application Program Interface). It's primary purpose is to separate the definition for an API from the implementation. This keeps the API flexible by enabling the core functionality to be flexible and easily changed.
Using Delegates to Communication Between Windows Forms
Sep 04, 2006.
Delegates are one of the wonderful features of .Net Framework. Their primary use is focused on support event handling and callback mechanism. In this article we will explore how to use delegate as callback support to make simple communication between deferent opened windows forms
Restricting User Input
Dec 28, 2006.
This article describes an approach to restricting the user’s input to letters only, numbers only, letters or numbers only, and special characters only. The approach is simple to implement and can be used whenever it is necessary to restrict a user’s response to instances where it is necessary to capture information from the user into a form’s text box control.
Encrypt a File Using Rijndael
Jan 03, 2007.
In this artical, we will encrypt a file and embed a encrypted key through wich we encrypt that file
Key Issue of sharing
Jan 23, 2007.
Describing how can we share a key from one place to another.
Windows Workflow Foundation at a glance
Apr 27, 2007.
This article is intended to show information about Windows Workflow Foundation (WWF) of key part of Microsoft.NET 3.0 technologies suite. I will illustrate the concepts and the main components of this technology.
How to Submit Form When User Press Enter Key on DropDownList Box
May 25, 2007.
Programming in C#: Understanding the SortedDictionary Class
Jun 21, 2007.
This article illustrates a powerful collection in C#, the SortedDictionary. In the article we will discuss two ways to sort key-value pairs: using an IComparer object and using IComparable keys.
Cryptography in Asp.net
Sep 07, 2007.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
Running a web site in Kiosk mode with c#
Jan 30, 2008.
This article addresses a simple approach to supporting the display of a web site in kiosk mode using a simple win forms application.
One or more rows contain values violating non-null, unique, or foreign-key constraints
Mar 14, 2008.
You may get this error when using a typed DataSet. This tip shows how to fix it.
Using OUTPUT Clause for Getting Deleting Information from Several Tables.
Apr 01, 2008.
In this article I will explain how you can use such a T-SQL (SQL Server 2005) feature as OUTPUT clause in order to get information about rows, which were affected, when deleting process is executed for several tables, “connected” by foreign keys. The examples are written using T-SQL and C#.
Cascading Deletes in LINQ to SQL
Jul 03, 2008.
This article will discuss alternative methods for performing cascading deletes using LINQ to SQL. Cascading delete refers to the action of removing records associated by a foreign key relationship to a record that is the target of a deletion action.
Opening Jars with C#
Jul 07, 2008.
This article shall describe an approach that may be used to extract Jar files. Jars are merely files compressed using zip compression; the primary difference between a standard trash zip file and a jar file is that the jar file includes a manifest; also a true jar files can be run as an executable on a machine equipped with the java runtime.
Exception and error handling in enterprise applications
Jul 31, 2008.
In this article, I try to cover the key principles and the main techniques of exception and error handling with examples in SQL Server, Oracle and Microsoft .NET.
Attaching a Digital Certificate (Public Key) to an HTTPS Request
Aug 10, 2008.
This article will guide you on how to post data to an HTTPS (i.e., secure connection) URL from a Windows application (.NET) by attaching a digital certificate from a certificate file and getting the response back.
To be a Business Analyst
Aug 29, 2008.
The Business Analyst (BA) is one of the key roles in any software development project. Many times it is their work which makes or breaks a software project. This article provides an insight of what we need to look at for a BA
Software Architecture Styles
Jan 13, 2009.
An Architecture style is a set of principles which you can use to build a system Typically Architecture styles depends on their focusing areas. Implementing the software architecture styles depends on the capacity of your organization for implementing it and infrastructure constraints. This post explains which architecture style is to use based on demands.
Retaining your best people
Apr 25, 2009.
You can replace equipment, infrastructure, tools, etc but at the end of the day it’s the people i.e. human capital which is the critical success factor in today’s competitive environment. Retaining key talent is one of the topmost priorities for all successful managers.
Implementing business rules using customized DataSet objects
May 15, 2009.
Information systems contain and enforce rules about the business they support. A rule is constraint which describes the way how objects are to behave. Field-level validations are checks that pertain to the property values of the underlying business entities. For example, a field must be 50 characters or less in length or some fields are required while other fields are optional as well as some fields must be greater than a specific value.
Stream operation in WCF
Jun 01, 2009.
WCF provides the support for Stream object. It typically recommends the developer to handle the message which size is too large as Stream object for the sake of high performance. However, there are some constraints on Stream operation to note.
ADO.NET Objects: Part II
Jul 23, 2009.
In this article I will explain about ADO.NET objects. This will help you in understanding them in an easy manner.
How to turn a mobile device into a mighty survey assistant
Jul 29, 2009.
Marketing research and perfect customers’ knowledge are key factors for successful business. One of the best ways how to get to know your customers and their preferences is running surveys. Usually, the surveys are run by mobile workers using paper based forms. It might sound archaic, yet there are companies that use this manual approach. However, this outdated process can be easily replaced using mobile devices allowing data processing automation.
Triple DES Encryption and Decryption using User provided key
Oct 29, 2009.
In this article, I will explain how to do a Triple DES encryption on a plain text using user provided key. I will calculate a MD5 Hash on the key provided by the user. And that key will be user to encrypt and decrypt the message.
Data Column in ADO.NET
Oct 30, 2009.
In this article I will explain about Data Colum in ADO.Net.
Triple DES Encryption and Decryption in WPF
Feb 18, 2010.
In this article we will see how a set of data can be encrypted and saved in file and again while reading it should be readable/decrypted based on key.
What is Business Connectivity Services - A Beginner View
Mar 12, 2010.
In this article we will learn what is Business Connectivity Services and take a look it's key features and some of the common usage scenarios.
Mind Puzzle Game in C#
Apr 12, 2010.
This is a simple game written in C# in which user presses Up, Down, Left, Right arrow keys to play this game.
Update app.config key value at run time in WPF
May 06, 2010.
In this article I am going to show how we can update a key value in app.config file in WPF. For this add reference of System.Configuration in your application.
Button in C#
Jun 01, 2010.
Button class in Windows Forms represents a Button control. A Button control is a child control placed on a Form and used to process click event and can be clicked by a mouse click or by pressing ENTER or ESC keys.
Dictionary in C#
Jul 10, 2010.
A Dictionary class represents a dictionary in C# that is used to represent a collection of keys and values pair of data. This article demonstrates how to use a dictionary in C#.
Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.Net
Aug 19, 2010.
In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
How to use google ajax search api to embed video searh in web application:
Aug 21, 2010.
Google has launched Ajax API for different purposes “video search” is one of them. Many user's gets confused all about it many times how to get google key, how to embed video search in web application. So here I am explaining how to use video search in web application.
Make Combination of Keys For Our Trial Version Application
Sep 08, 2010.
In this article we make a combination of keys for our trial period application.
Unit testing with VSTS
Sep 20, 2010.
Unit testing is validation and verification methodology where the developers test the individual units of source code. Some key points to remember are - A unit is the smallest part in the application which can be tested. So it can be a method, function or class.
Understanding .NET 2.0 and 3.5 Components
Oct 05, 2010.
This article discusses the key components of .NET Framework 2.0, 3.0, and 3.5.
SharePoint 2010 Site Templates: Create, Save and Use
Dec 15, 2010.
SharePoint site is the key place to bring together all content and activities associated with a particular process, project or group. And there are situations when these processes or projects are regularly repeated within an organization. So to ensure consistency and facilitate continuous improvement a site template can be helpful and time saving.
Dictionary Class in C#
Dec 28, 2010.
The Dictionary class gives us the opportunity to map some values to specific keys; in real life scenarios we need this mechanism to represent some values whenever we call the key associated with them according to an event.
Working with Animating Attached Properties, Splines-Key Frames and Easing Functions in Windows Phone 7
Dec 30, 2010.
You can use Silverlight animations in a couple different ways to move an element around the screen. One way is to target a TranslateTransform set to the element’s RenderTransform property.
Effective Web Services - Four Key Things
Jan 11, 2011.
When you create a web service, you need to address various design issues to build an effective and portable web service. In this article we will discuss various design issues that we face while building a web service.
Learn what is Gestures to Transforms in Windows Phone 7
Jan 13, 2011.
The primary means of user input to a Windows Phone 7 application is touch. A Windows Phone 7 device has a screen that supports at least four touch points, and applications must be written to accommodate touch in a way that feels natural and intuitive to the user and the XNA programmers have two basic approaches to obtaining touch input.
Understanding Routed Event in Silverlight
Feb 04, 2011.
Silverlight elements use KeyDown and KeyUp events to notify you when a key is pressed. These events use bubbling, so they travel up from the element that currently has focus to the containing elements.
Key Spline Editor in Expression Blend 4
Feb 07, 2011.
Animation Art has become a universal art form that has entertained, informed, and instructed generations around the world for almost 100 years. Animation speaks to everyone in a universal language.
How to bind Dictionary
pair to List box and dropdown list
Feb 11, 2011.
This tutorial explaiins how to bind a Dictionary<key,value> pair to a listbox/dropdown list. The following simple steps show how to bind your listbox/dropdown list to Dictionary<key,value> pair.
Dynamically Naming the Constraint
Mar 04, 2011.
A constraint is nothing but a condition placed on the column or object. Let's see a small example of creating a Primary Key constraint.
Some good Debugging tips
Mar 14, 2011.
Here I am going to explain for you a few shortcut keys which can make debugging faster and more accurate.
Best SharePoint Upgrade Practices
Mar 24, 2011.
Before planning a SharePoint upgrade, certain key points carry importance for a successful implementation.
Web Farm - Simple Overview
Mar 25, 2011.
In this article we are going to discuss a simple overview of the Web Farm and its advantages.
Using Windows Data Protection
Mar 31, 2011.
Windows Data Protection (or WDP) is an encryption system provided by the operating system based on a key which is automatically generated from the logged-in user’s password.
Unique column constraints in SharePoint 2010
Apr 01, 2011.
In this article we will be seeing how to enforce unique value for a list or library column in SharePoint 2010.
Configure Key Filters in SharePoint 2010
Apr 06, 2011.
In this article we will be seeing how to configure key filters in SharePoint 2010.
Programmatically Configure Key Filters in SharePoint 2010
Apr 08, 2011.
In this article we will be seeing how to configure key filters in SharePoint 2010 using C#.
Add Root Node & Child Node to a TreeView Selected Node At Runtime and Rename the Selected Node
Apr 24, 2011.
This article will show how to add a Root Node & Child Node to a TreeView selected node at runtime & the user can rename the node by pressing the "F2' key from the keyboard...
Add X-Power to Your XML Development with Liquid XML Studio 2011
May 16, 2011.
Today, more and more applications are migrating to the Web and the Cloud services are taking over the world; XML has become one of the key and vital parts of the data exchange mechanism. Whether you are developing client centric applications or building a consumer product, you will end up working with XML.
Generate Database Script with Table Data From SQL Server 2008
Jun 09, 2011.
In this article I will describe how to generate a database script for a table with all it's data, views, stored procedures, constraints and login credentials.
Create an Analysis Services Project
Jun 13, 2011.
SQL Server Analysis Services (SSAS) provides a unified and integrated view of all your business data as the foundation for all of your traditional reporting, online analytical processing (OLAP) analysis, Key Performance Indicator (KPI) scorecards, and data mining.
Working With the DataTable Class in C#
Jun 21, 2011.
A DataTable object represents tabular data as an in-memory, tabular cache of rows, columns, and constraints.
Jul 04, 2011.
Jul 04, 2011.
Windows Azure - Regenerate New Access Keys For Azure Storage Account
Jul 18, 2011.
In this article we are going to see how to generate new Access Keys for an Azure Storage Account using the Windows Azure Management Portal.
Windows Azure - Get Access Keys For Azure Storage Account
Jul 18, 2011.
In this article we are going to see how to fetch the Access Keys of an Azure Storage Account using the Windows Azure Management Portal.
Enter Hot key on Textbox in c#
Sep 02, 2011.
In this article, we'll look at using the Enter key to do processing
Live Tiles in Windows Phone 7.5 or Mango phone
Sep 14, 2011.
In Windows Phone 7 Live tiles was only possible through Push notification. However Windows Phone 7.5 (code name: Mango) allows developers to update, create primary and secondary tiles without push notifications.
C# Corner Chandigarh DevCon16
Chandigarh DevCon16 is a one-day Developer Conference where programmers, technologists, authors, and members meet, demonstrate, plan, and hang out.
CBeyond Cloud Services
TERMS & CONDITIONS
REPORT A BUG
©2016 C# Corner. All contents are copyright of their authors.
Terms & Conditions
©2016 C# Corner. All contents are copyright of their authors.