C# Corner

Resources  
  • Assemblies : The Ins and Out : Part IIApr 16, 2001. In this part, I will discuss both Private and Shared assemblies and how to create a "Shared Assembly".
  • Mouse and Key EventsSep 11, 2001. This article explains the usage of key and mouse events. The following code shows you how you can read mouse position on mouse move.
  • Constructor and Destructors in C#Oct 10, 2001. This detailed article talks about how constructors and destructors work in C# and how to use them in your applications.
  • Email Notifier with Microsoft Agent--- GENIENov 16, 2001. Email notifier with Microsoft Agent is a TCP/IP application that notifies the user if there is email in the user's email server.
  • SOAP Message with Binary AttachmentsFeb 28, 2002. Recently Microsoft announced new format called DIME: Sending Binary Data with Your SOAP Messages.
  • XML Signatures in Microsoft .NETMar 28, 2002. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Key Logger Application in C#Jun 30, 2002. In this article, I'll explain an easy but an important concept of how to catch user pressed keys and write them into a log file.
  • Macro to Update References of all Projects in a SolutionJul 24, 2002. When working in enterprise development there are occasions when you have a solution file with 10 or more projects in it all using private assemblies.
  • Using Visual Studio .NET to Build and Deploy ApplicationsJul 29, 2002. No matter how much time you spend designing your application there is one key stage where it can all fall apart, the build and deployment stage.This is a first in a series of articles in which I am going to demonstrate how to use Visual Studio .NET.
  • Windows Forms Printer Selection ListJul 30, 2002. In this example we will create a sample windows form containing a combo box which will list the printers installed on the machine on which the program runs. The default printer for the machine is set as the default selection in the combo box.
  • Form Designer in C# and .NETSep 02, 2002. The FormMaker.NET Application has an undo feature for removing controls you just placed on the form and a fine tuning placement mechanism for positioning the control through the arrow keys.
  • Extracting Modules and Component(RSAParameter) from X509Certificate PublicKeyNov 04, 2002. In some applications, it might be necessary to extract the modulus and exponent from the X509Certificate PublicKey. The X509Certificate.GetPublicKey() returns a byte array that contains the ASN.1 Encoding information along with the modulus and exponent as described in the RFC2459.
  • Cryptography in Microsoft.NET Part I: EncryptionDec 12, 2002. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Cryptography in Microsoft.NET Part I: EncryptionDec 12, 2002. In this article, Gowry sheds lights on the basics of cryptography and how it can be implemented in .NET.
  • DigitizeAny - A .NET Windows Digitization ToolDec 17, 2002. DigitizeAny uses Win32 API calls to obtain the coordinates of the cursor and then translates to the graph coordinates once set. Since a mouse click would essentially bring to focus the window where it is pointed to, this tool uses the key event to capture the coordinates of the cursor.
  • SMTP InternationalizationJul 16, 2003. You can find many articles dedicated to C# SMTP implementation on this or other sites.
  • Code Generator for Basic Stamp II MicrocontrollerOct 15, 2003. The Basic II Stamp is programmed by the language its named after, Basic. The language is a combination of Basic syntax and built in key words that control the Basic Stamp II chip.
  • Oracle Connectivity in .NETDec 03, 2003. This whitepaper takes you through different ways of database connectivity to Oracle database from .NET. This also talks about the advantages and disadvantages of all of these technologies.
  • Object Oriented Concepts in C#Dec 24, 2003. In this article we will discuss key concepts of object orientation with their practical implementation in C#. We will discuss here basics of OOPS including Interfaces, Access Modifiers, inheritance, polymorphism etc.
  • Real Life SQL and .NET: Part IJan 13, 2004. Welcome to the world of SQL and the huge, growing database technologies of today’s business all over the SQL world. By reading this article, we have begun accepting the knowledge that will soon be required for survival in today’s world of relational database and data management. Alas, for the reason that it is first necessary to provide a background of SQL and cover some preliminary concepts that we need to know, the majority of this article is text in paragraph format.
  • SOAP, .NET, and COM an Introduction - Part IIIFeb 02, 2004. This article starts with the basics of SOAP, SOAP XML model and its data types followed by the integration of SOAP functionality in .NET class library and how .NET developers can take advantages of SOAP in their applications.
  • Host Integration Server 2000 : An OverviewFeb 24, 2004. This white paper highlights some of the features offered by Microsoft's Host Integration Server 2000. This white paper also gives an overview of key benefits and features in Host Integration Server 2000.
  • Report Generation in .NETFeb 27, 2004. Report generation is an integral part of enterprise application development. Choosing the right kind of report generation strategy decides the success of the application in terms of cost and performance. The white paper discusses some of the key factors that need to be considered when architecting reporting systems in .NET and C#.
  • Using Enter and Tab Keys to Navigate on a FormMar 24, 2004. When building Windows Forms application you may want to use a tab or return key to navigate on your textboxes. This code shows you how to do it.
  • A Macro for Creating Properties from Private FieldsMay 12, 2004. Macros are a useful way of speeding up your coding efforts, however writing them can be a somewhat daunting task. Luckily, .NET gives you a pretty powerful recording feature for recording macros from key strokes.
  • OneNote 2003 - An IntroductionJul 13, 2004. Microsoft Office OneNoteTM2003 is part of next generation of Microsoft Office products. It allows users to electronically capture, organize, and reuse notes on thick clients.
  • Extreme ProgrammingSep 16, 2004. Extreme Programming is new development technique getting adopted in the software development and the key strength of this methodology is simplicity, team work, quality and testing.
  • Public Key Token Generation AlgorithmJan 31, 2005. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
  • Starting With SharepointFeb 11, 2005. Microsoft came up with an idea of "Sharepoint Server", and now it's only a matter of few clicks to build an enterprise-portal. This article shows you how.
  • Digging Deeper - Structures in C# Feb 22, 2005. Structures in C# are similar to structures in C and C++ but with several prominent differences. In C#, structures are value types.
  • Best Practices of Exception ManagementMar 08, 2005. Exception management is one of the key area for all kinds of application development .You should adopt an appropriate strategy for exception management to build high quality and robust application .It is a very powerful concept and makes the development work very easy if its used efficiently.
  • SmartPhone Album Program with C#Mar 16, 2005. This article shows how to represent image’s thumbnail in ListView control, how to work with multi-forms and pass information with each other in a smart phone application, how to do simple image-processing, how to scroll picture in a picturebox and use the smart phone’s dpad keys.
  • Exploring Security in .NET: Part IJul 05, 2005. This article highlights some of the key concepts of .NET Security like Code Access Security, Evidence based Security and many more.
  • ASP.NET Session StateSep 21, 2005. Session state is nothing more than memory in the shape of a dictionary or hash table, e.g. key-value pairs, which can be set and read for the duration of a user's session.
  • Hashtable in C#Nov 14, 2005. Hashtable is useful when you need to store data in a key and value pair. This article shows how to use hashtable in C#.
  • Important Aspects about ComponentsJan 12, 2006. In this article, I wil discuss some properties and key definitions about component programming.
  • Delay Signing an AssemblyJan 18, 2006. In this article we will elaborate the terminology Delay Signing as well as what it means. How it works and the approach to achieve it.
  • How to Read and Write System Registry Keys using C# (VS.Net 2005)Feb 09, 2006. Most of the time while working with the Enterprise Application will need to store the user preferences inside the windows system registry. In a general term Windows Registry is the database that holds all the settings Windows needs to function.
  • Internationalization Getting StartedMar 09, 2006. This article introduces the concept of Internationalization in application development. Starting off with the basics of character encoding and Unicode, the article discusses the best practices to be followed in writing culture aware code and designing Internationalized user interfaces with adequate examples in .NET (C#).
  • Use Customized IndexersMar 14, 2006. Many of you are aware of indexers and its properties. For those unaware of it want to know that indexers are used to represent objects using indexes or even using keys. I.e. we can represent an object of a class by the way an array is using.
  • Creating MS Word Document using C#, XML and XSLTMar 21, 2006. This simple program demostrate how to create well formatted MS Word documents using C#, XML and XSLT. Using XSLT to create Word documents requires the knowledge of RTF key words.
  • Data mining and SQL Server 2005Apr 11, 2006. Data mining is a key member in the Business Intelligence (BI) product family in SQL Server 2005 . Data mining is about analyzing data and finding hidden patterns using automatic or semiautomatic means, which can be explored for valuable information. It is about learning the characteristics of data set, which are not possible to discover by simple seeing.
  • Understanding Connection PoolingJul 27, 2006. This article is to go in deep in dome key features in the ADO.NET 2 which was shipped with VS 2005. In this article I will go trough one of the key features which is the Connection Pooling.
  • Restricting User InputDec 28, 2006. This article describes an approach to restricting the user’s input to letters only, numbers only, letters or numbers only, and special characters only. The approach is simple to implement and can be used whenever it is necessary to restrict a user’s response to instances where it is necessary to capture information from the user into a form’s text box control.
  • Encrypt a File Using RijndaelJan 03, 2007. In this artical, we will encrypt a file and embed a encrypted key through wich we encrypt that file
  • Key Issue of sharing Jan 23, 2007. Describing how can we share a key from one place to another.
  • Assembly in .NETFeb 23, 2007. The .NET assembly is the standard for components developed with the Microsoft.NET.
  • Windows Workflow Foundation at a glanceApr 27, 2007. This article is intended to show information about Windows Workflow Foundation (WWF) of key part of Microsoft.NET 3.0 technologies suite. I will illustrate the concepts and the main components of this technology.
  • Build a Simple Watermarking Utility in C#May 07, 2007. This article shall describe an approach to building a simple watermarking utility that may be used to add watermarks to any supported image file format. The resulting application shall permit the user to open any supported image file format into a scrollable picture box.
  • How to Submit Form When User Press Enter Key on DropDownList BoxMay 25, 2007. This small codes written in JavaScript will help you to submit form when user press enter key on dropdownlist.
  • Programming in C#: Understanding the SortedDictionary ClassJun 21, 2007. This article illustrates a powerful collection in C#, the SortedDictionary. In the article we will discuss two ways to sort key-value pairs: using an IComparer object and using IComparable keys.
  • Cryptography in Asp.netSep 07, 2007. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
  • Running a web site in Kiosk mode with c#Jan 30, 2008. This article addresses a simple approach to supporting the display of a web site in kiosk mode using a simple win forms application.
  • One or more rows contain values violating non-null, unique, or foreign-key constraints Mar 14, 2008. You may get this error when using a typed DataSet. This tip shows how to fix it.
  • Using OUTPUT Clause for Getting Deleting Information from Several Tables.Apr 01, 2008. In this article I will explain how you can use such a T-SQL (SQL Server 2005) feature as OUTPUT clause in order to get information about rows, which were affected, when deleting process is executed for several tables, “connected” by foreign keys. The examples are written using T-SQL and C#.
  • Cascading Deletes in LINQ to SQLJul 03, 2008. This article will discuss alternative methods for performing cascading deletes using LINQ to SQL. Cascading delete refers to the action of removing records associated by a foreign key relationship to a record that is the target of a deletion action.
  • Exception and error handling in enterprise applicationsJul 31, 2008. In this article, I try to cover the key principles and the main techniques of exception and error handling with examples in SQL Server, Oracle and Microsoft .NET.
  • Attaching a Digital Certificate (Public Key) to an HTTPS RequestAug 10, 2008. This article will guide you on how to post data to an HTTPS (i.e., secure connection) URL from a Windows application (.NET) by attaching a digital certificate from a certificate file and getting the response back.
  • To be a Business AnalystAug 29, 2008. The Business Analyst (BA) is one of the key roles in any software development project. Many times it is their work which makes or breaks a software project. This article provides an insight of what we need to look at for a BA
  • Manage your business visits and private appointments in a single mobile appFeb 04, 2009. In this article i will create controls which are part of Resco MobileForms Toolkit.
  • Retaining your best peopleApr 25, 2009. You can replace equipment, infrastructure, tools, etc but at the end of the day it’s the people i.e. human capital which is the critical success factor in today’s competitive environment. Retaining key talent is one of the topmost priorities for all successful managers.
  • How to turn a mobile device into a mighty survey assistantJul 29, 2009. Marketing research and perfect customers’ knowledge are key factors for successful business. One of the best ways how to get to know your customers and their preferences is running surveys. Usually, the surveys are run by mobile workers using paper based forms. It might sound archaic, yet there are companies that use this manual approach. However, this outdated process can be easily replaced using mobile devices allowing data processing automation.
  • What are Access Modifiers in C#?Aug 20, 2009. In this article I will explain you about accessibility modifiers in C#.
  • Triple DES Encryption and Decryption using User provided keyOct 29, 2009. In this article, I will explain how to do a Triple DES encryption on a plain text using user provided key. I will calculate a MD5 Hash on the key provided by the user. And that key will be user to encrypt and decrypt the message.
  • Data Column in ADO.NETOct 30, 2009. In this article I will explain about Data Colum in ADO.Net.
  • Advanced Typography in GDI+Dec 31, 2009. In this article I will explain about Advanced Typography in GDI+.
  • String Encoding/Decoding and Conversions in C# Feb 02, 2010. In this article I will explain you about String Encoding/Decoding and Conversions in C#.
  • Triple DES Encryption and Decryption in WPFFeb 18, 2010. In this article we will see how a set of data can be encrypted and saved in file and again while reading it should be readable/decrypted based on key.
  • What is Business Connectivity Services - A Beginner ViewMar 12, 2010. In this article we will learn what is Business Connectivity Services and take a look it's key features and some of the common usage scenarios.
  • Mind Puzzle Game in C#Apr 12, 2010. This is a simple game written in C# in which user presses Up, Down, Left, Right arrow keys to play this game.
  • Update app.config key value at run time in WPFMay 06, 2010. In this article I am going to show how we can update a key value in app.config file in WPF. For this add reference of System.Configuration in your application.
  • Button in C#Jun 01, 2010. Button class in Windows Forms represents a Button control. A Button control is a child control placed on a Form and used to process click event and can be clicked by a mouse click or by pressing ENTER or ESC keys.
  • Dictionary in C#Jul 10, 2010. A Dictionary class represents a dictionary in C# that is used to represent a collection of keys and values pair of data. This article demonstrates how to use a dictionary in C#.
  • Public Key Encryption (RSA Method) for Encryption and Decryption in ASP.NetAug 19, 2010. In this article we will learn how use Public Key Encryption for Encryption and Decryption in ASP.Net
  • How to use google ajax search api to embed video searh in web application:Aug 21, 2010. Google has launched Ajax API for different purposes “video search” is one of them. Many user's gets confused all about it many times how to get google key, how to embed video search in web application. So here I am explaining how to use video search in web application.
  • Make Combination of Keys For Our Trial Version ApplicationSep 08, 2010. In this article we make a combination of keys for our trial period application.
  • Unit testing with VSTSSep 20, 2010. Unit testing is validation and verification methodology where the developers test the individual units of source code. Some key points to remember are - A unit is the smallest part in the application which can be tested. So it can be a method, function or class.
  • Understanding .NET 2.0 and 3.5 Components Oct 05, 2010. This article discusses the key components of .NET Framework 2.0, 3.0, and 3.5.
  • SharePoint 2010 Site Templates: Create, Save and UseDec 15, 2010. SharePoint site is the key place to bring together all content and activities associated with a particular process, project or group. And there are situations when these processes or projects are regularly repeated within an organization. So to ensure consistency and facilitate continuous improvement a site template can be helpful and time saving.
  • Dictionary Class in C#Dec 28, 2010. The Dictionary class gives us the opportunity to map some values to specific keys; in real life scenarios we need this mechanism to represent some values whenever we call the key associated with them according to an event.
  • Working with Animating Attached Properties, Splines-Key Frames and Easing Functions in Windows Phone 7Dec 30, 2010. You can use Silverlight animations in a couple different ways to move an element around the screen. One way is to target a TranslateTransform set to the element’s RenderTransform property.
  • Effective Web Services - Four Key ThingsJan 11, 2011. When you create a web service, you need to address various design issues to build an effective and portable web service. In this article we will discuss various design issues that we face while building a web service.
  • Zipping and Emailing Project - Using DotNetZipJan 31, 2011. What about having a utility that zips and emails your project folder content? I agree that the source control tools provides backup. But this utility can be used to easily take the backup of your private projects at home.
  • Understanding Routed Event in SilverlightFeb 04, 2011. Silverlight elements use KeyDown and KeyUp events to notify you when a key is pressed. These events use bubbling, so they travel up from the element that currently has focus to the containing elements.
  • Key Spline Editor in Expression Blend 4Feb 07, 2011. Animation Art has become a universal art form that has entertained, informed, and instructed generations around the world for almost 100 years. Animation speaks to everyone in a universal language.
  • How to bind Dictionary pair to List box and dropdown listFeb 11, 2011. This tutorial explaiins how to bind a Dictionary<key,value> pair to a listbox/dropdown list. The following simple steps show how to bind your listbox/dropdown list to Dictionary<key,value> pair.
  • Understanding C# Constructors and it's typeMar 03, 2011. In other words a constructor is a class default method that gets automatically executed whenever a class's object is created or whenever the class is initialized.
  • Dynamically Naming the ConstraintMar 04, 2011. A constraint is nothing but a condition placed on the column or object. Let's see a small example of creating a Primary Key constraint.
  • Some good Debugging tipsMar 14, 2011. Here I am going to explain for you a few shortcut keys which can make debugging faster and more accurate.
  • Best SharePoint Upgrade PracticesMar 24, 2011. Before planning a SharePoint upgrade, certain key points carry importance for a successful implementation.
  • Web Farm - Simple OverviewMar 25, 2011. In this article we are going to discuss a simple overview of the Web Farm and its advantages.
  • Using Windows Data ProtectionMar 31, 2011. Windows Data Protection (or WDP) is an encryption system provided by the operating system based on a key which is automatically generated from the logged-in user’s password.
  • Configure Key Filters in SharePoint 2010Apr 06, 2011. In this article we will be seeing how to configure key filters in SharePoint 2010.
  • Programmatically Configure Key Filters in SharePoint 2010Apr 08, 2011. In this article we will be seeing how to configure key filters in SharePoint 2010 using C#.
  • Creating And Using Shared AssemblyApr 13, 2011. By default every assembly is a private assembly. If we add a reference to a private assembly to any project, a copy of the assembly is given to the project.
  • Add Root Node & Child Node to a TreeView Selected Node At Runtime and Rename the Selected NodeApr 24, 2011. This article will show how to add a Root Node & Child Node to a TreeView selected node at runtime & the user can rename the node by pressing the "F2' key from the keyboard...
  • Hour 2: Understanding 5 ASP.NET State Management Techniques in 5 HoursApr 28, 2011. In a simple way see understanding 5 ASP.NET state management techniques in 5 hours.
  • Add X-Power to Your XML Development with Liquid XML Studio 2011May 16, 2011. Today, more and more applications are migrating to the Web and the Cloud services are taking over the world; XML has become one of the key and vital parts of the data exchange mechanism. Whether you are developing client centric applications or building a consumer product, you will end up working with XML.
  • Create an Analysis Services ProjectJun 13, 2011. SQL Server Analysis Services (SSAS) provides a unified and integrated view of all your business data as the foundation for all of your traditional reporting, online analytical processing (OLAP) analysis, Key Performance Indicator (KPI) scorecards, and data mining.
  • Menu Button in JavaScriptJul 04, 2011. In this small article you will see how to use a Menu Button in JavaScript.

About private-key-encoding

NA
File APIs for .NET
Aspose are the market leader of .NET APIs for file business formats – natively work with DOCX, XLSX, PPT, PDF, MSG, MPP, images formats and many more!
VSLive! Anaheim