C# Corner

Resources  
  • Yahtzee Program using C#Jan 24, 2000. The Visual C# environment has given the programmer the ability to create applications in RAD mode without the steep learning curve for the C++ programmer. (I do miss templates though!). The above application, yahtzee, is based on a popular poker-like dice game.
  • Implementing Delegates in C#Feb 04, 2001. The Zip file contains two projects. One is VB.Net and the other is C#. Each project is an example of the same use of a delegate. A base class is derived and the delegate calls a method on several classes derived from the base class.
  • Implementing Delegates in C# : Part 2Feb 13, 2001. This is second part of Timothy's Delegates in C# series...
  • Using Delegates to Choose Right FunctionApr 01, 2001. The need to call different class method based on some string passed to class is an old problem.
  • Writing Secure Code using C#Apr 06, 2001. Code access security is a mechanism that grants/denies access to resources within a method call. For example, code written by a person may be allowed to write to the disk while code from another one may be forbidden from accessing the disk. This control can be enforced even if the code written by both of them is used within a single application
  • Protecting IL Code from unauthorised DisassemblingApr 09, 2001. Microsoft .NET proved a mechanism where the code written in VB.NET, C# or any CLS compliant languages to generate MSIL (Microsoft Intermediate Language)code which targets the CLR and executes. This is an excellent mechanism to abstract the high level code from the underlying hardware.
  • Using Microsoft Message Queues to build Scalable SolutionsApr 12, 2001. This tutorial shows you how to create, send, and received messages using MSMQ from the .NET base class library (System.Messaging) and C#.
  • Understanding How Assert Effects SecurityApr 25, 2001. Assert is a security action that is evaluated at run time. Code Access Permission classes and Permission Sets support a method called Assert. Using the Assert method to control access to resources or actions will allow your code to perform actions that it normally has permission to perform and will allow other callers up stream in the call stack to have access that they would not normally have.
  • Defining Custom Entry PointsApr 30, 2001. In this article i am going to demonstrate how we can manipulate the IL code to change the behaviour of how the .NET programme executes.
  • Viewing Assembly PermissionsMay 02, 2001. In this article I will show you how you can view the Code Groups that an assembly belongs to and what permissions belong to the assembly. I will demonstrate the Caspol utility supplied with the .NET SDK.
  • Using .NET Framework Multithreading and GDI+ to Enrich the user experienceMay 04, 2001. This tutorial shows you how to create, send, and received messages using MSMQ from the .NET base class library (System.Messaging) and C#.
  • FTP Explorer in C#May 21, 2001. I have developed a GUI based FTP client application. This takes connection information and populates folder and files in treeview and listview respectively.
  • Events and DelegatesJul 26, 2001. Events in C# are based on delegates, the Originator defining one or more callback functions as delegates and the listening object then implements then.
  • Console Based Windows FormAug 15, 2001. This sample application shows you how to create Windows Forms from console.
  • Move Grid PuzzleAug 15, 2001. This is a console based application the user will be prompted for move such as L-Left, R-Right, U-Up, D-Down, E-Exit.
  • An insight into Code Reusability and COM Interoperability : Part IAug 28, 2001. Code reusability is the art of using existing code to achieve better productivity and ease of maintenance. The concept of reusability is not new. Its existence has been evident since the evolution of mankind.
  • Calendar Using DateTime ClassSep 05, 2001. The console based calendar program is a which when run shows current month's calendar using the C# Date Time Class.
  • Web Based Front-End for SMTP Email ProgramSep 14, 2001. I have written a web based front end for SMTP email program. I have compiled it into a DLL.
  • using Array Class and IEnumeration in C#Sep 14, 2001. This article illustrates the usage of Array class and IEnumerator. Array class Provides methods for creating, manipulating, searching and sorting arrays, thereby serving as the base class for all arrays in the common language runtime.
  • IComparable: Under the HoodSep 21, 2001. We now calling Array.Sort() on C# Types such as int, char, string will automatically do sorting based on that type.
  • Oracle Database ConnectivitySep 26, 2001. This is a GUI based data entry application which shows how to add, modify and delete records using Oracle Database.
  • GUI Based Opinion PollSep 26, 2001. This is a article on how to create a opinion poll in C#. It creates a Text file on your c drive storing the voting parameters in it.
  • Console Based ChatOct 01, 2001. This is a article on how to create a simple console based chat application using socket connections.
  • TextReader and TextWriter in C#Oct 16, 2001. This article covers the information of how to read or write (Unicode) character based data through TextReader and TextWriter.
  • Oracle Database ViewerOct 17, 2001. This is a GUI based application which connects to an Oracle database depending upon the DSN, username and password that you provide. It then shows the list of tables on the left hand side in the form of a treeview.
  • An insight into Code Reusability and COM Interoperability - Part 2Nov 26, 2001. We have mushrooms of network systems running across the globe based on many proprietary protocols. In order to integrate these systems to communicate with each other in a more meaningful way, developers or organizations have to face an uphill task.
  • A Quiz Application using Windows FormDec 27, 2001. This code shows you how to validate data in windows forms, add or remove panel control, and write a form based quiz application.
  • Microscopic Discussion in ClassesJan 02, 2002. This article is going to take a microscopic view of classes, in terms of Inheritance(I) , Multiple Inheritance(MI) and Circular Base Classes (CBC).
  • .NET Framework and Web Services - Part 2Jan 29, 2002. Here we are going to learn how to create a WebService using VS.NET (using VB.NET.) and consume the Webservice from VB.NET Client. This Article is based on VS.NET RC1 Release.
  • Web/WAP Calender form Harrison LogicFeb 11, 2002. This application provides an updateable web-based calendar that can be viewed from both the Web and through a Mobile device, such as a cellular phone.
  • Microsoft Knowledge Base Web Service ConsumerFeb 22, 2002. In this Article I am going to show you how to consume Microsoft knowledge base Web service from our client.
  • Multi-threaded Web Applications - Case II: Port ScannerMar 12, 2002. This article continues the 4-parts series of Multi-threaded Web Applications. In the first part, I have demonstrated how you can use multi-threading with ASP.NET to make a web based search engine more responsive, and to reduce the time required to compose the result. In this article, I will demonstrate how you can apply the same technique to a web based port scanner.
  • Adding Controls to a DataGrid at RuntimeMar 19, 2002. This article below sheds some light in above area i.e. user can add any control based on his/her choice and can use it to edit the details in the data grid.
  • Mortgage Calculator in C#Mar 22, 2002. Mortgage Calculator is a C# Application developed for calculating the detailed monthly mortgage payments based on the loan amount, down payment, interest rate, mortgage duration.
  • Xite EncryptionMar 25, 2002. This class contains methods/functions for easily decrypting and encrypting data.
  • .NET Remoting: The Simple ApproachMar 26, 2002. .NET Remoting provides a powerful and high performance way of working with remote objects. Architecturally, .NET Remote objects are a perfect fit for accessing resources across the network without the overhead posed by SOAP based Web services.
  • .NET Remoting: The Interface ApproachMar 26, 2002. .NET Remoting provides a powerful and high performance way of working with remote objects. Architecturally, .NET Remote objects are a perfect fit for accessing resources across the network without the overhead posed by SOAP based Web services. .NET Remoting is easier to use than Java's RMI, but definitely more difficult than creating a WebService. In this article, we will create a remote object, and access this object using the Interface.
  • XML Signatures in Microsoft .NETMar 28, 2002. In this article we will explore XML Signature specification from W3C and its implementation in .NET using C#.
  • Tutorial: Working with Files and DirectoriesApr 03, 2002. One of the rich experiences in working with .NET is a huge collection of Base Class Libraries .
  • Using XML Based Configuration File in Windows Form ApplicationsApr 15, 2002. Often when building an application, a programmer wants to be able to change application settings without having to recompile the application.
  • Multithreading Part 4: The ThreadPool, Timer Classes and Asynchronous ProgrammingApr 16, 2002. In this article, I would discuss few more .NET classes and how and what role do they play a role in building multithreading applications.
  • .NET Security in C#Apr 22, 2002. This article shows how to make file I/O access be denied if the user running the application did not have administrator privileges.
  • Using Microsoft Agent with C#May 04, 2002. This article explains how to include MS Agent into an simple Windows Form based application using C#.
  • Welcome to COBOL.NET, corner of the C# CornerJul 01, 2002. This column will hopefully help those of you looking to use Fujitsu NetCOBOL for .NET. We are going to present some "How To" articles beginning with the basic information about the environment, the interaction with Visual Studio.NET, the Designers and the COBOL language.
  • Editable ListView in C#Jul 01, 2002. Based on the similar technique used my previous article, the Editable Listbox, we can edit columns and rows of a ListView control.
  • Create FTP and Web IIS Virtual Directory using C#Jul 03, 2002. In this example we will create a Windows Form Project that will create new FTP and Web IIS Virtual Directories from code based on the name and path specified by the user.
  • Programming Template in Web Server ControlsJul 15, 2002. Templates play a major role in managing the layout and format of the data being displayed in ASP.NET data bound controls.
  • Implementing Inheritance in C#Sep 05, 2002. Inheritance is one of the most important characteristic of OOP. In this article, I will explain how to implement the inheritance in C# by explaining through an example.
  • Calling Procedural COBOL from C#Sep 05, 2002. In a previous article we discussed how to call procedural based COBOL programs from VB.NET.
  • User Management Utility for Web Form AuthenticationSep 06, 2002. This article deals with the management of user login and password information for a Forms Authentication in ASP.NET.
  • User Management Utility for Web Form Authentication.Sep 06, 2002. This article deals with the management of user login and password information for a Forms Authentication in ASP.NET.
  • Personalizing Mobile Web ApplicationsSep 16, 2002. In this example, we will personalize the settings for a mobile web application based on the user logged into the site.
  • Customize User Interfaces and Pass User Input to Installer ClassesOct 19, 2002. In this article I am going to demonstrate how to customize your MSI install to prompt the user for some information and then pass this information to an installer class. This can be useful when needing to do something during an install based on the user input.
  • Customize User Interfaces and Pass User Input to Installer ClassesOct 29, 2002. In this article I am going to demonstrate how to customize your MSI install to prompt the user for some information and then pass this information to an installer class. This can be useful when needing to do something during an install based on the user input.
  • Viewing and Writing XML Data using ADO.NET DataSetsNov 01, 2002. Based on a real world project this article shows how to handle XML data in .NET using C# DataSets and DataViews.
  • Extracting Modules and Component(RSAParameter) from X509Certificate PublicKeyNov 04, 2002. In some applications, it might be necessary to extract the modulus and exponent from the X509Certificate PublicKey. The X509Certificate.GetPublicKey() returns a byte array that contains the ASN.1 Encoding information along with the modulus and exponent as described in the RFC2459.
  • Cryptography in Microsoft.NET Part I: EncryptionDec 12, 2002. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Cryptography in Microsoft.NET Part II: Digital Envelop and Digital SignaturesDec 18, 2002. Part-I of this article covered cryptography in the context of encryption. This part continues from where part-I left. It assumes that the reader understands the purpose of encryption, knows about the two types of encryption namely asymmetric encryption and symmetric encryption and the fundamental differences between them. It also assumes that the reader understands encryption-decryption classes in System.Security.Cryptography namespace and the stream based encryption model in. NET framework class library (FCL).
  • C# Versions of Java's StringTokernizerJan 13, 2003. Here is another C# version of the Java StringTokenizer Class from the version posted August last year on your site. Given a string and a set of delimiters, the class return an enumeration of substrings based on the delimeters passed in.
  • Hash Password GeneratorFeb 10, 2003. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Developing Secure Web Sites with ASP.NET and IIS: Part IMar 04, 2003. Developing security for a site is like paying tax. You know it should be done at the end of financial year. But you keep it for the last and some time expect you should never have to do it. It is a similar kind of situation when building a web site. There are some web sites available to general public that can be access by any one. The security for these sites can be minimum or none at all. There are some web sites that publish and hold important information that have to be secure one way or another.
  • Developing Secure Web Sites with ASP.NET and IIS - Part IMar 04, 2003. Developing security for a site is like paying tax. You know it should be done at the end of financial year.
  • Hex EditorMar 04, 2003. The article based on a hex editor in C#.
  • J2EE to .NET Migration: Quick TipsMar 26, 2003. Here are some Quick tips to get you started, in case you need to migrate a J2EE based application to a .NET based application.
  • Developing Secure Web Site with ASP.NET and IIS: PartIIMay 07, 2003. Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanisms available in ASP.NET and how they join with IIS to provide a secure platform to develop sites in Part I of this article. I will be looking at Form Authentication and how to implement it in several sample web applications.
  • Change Color of a Column Based on Column ValuesMay 15, 2003. In this article we'll see how to change the color of column based on the column value.
  • Data Access Layer based on dataSetsJul 01, 2003. This article aims to introduce the reader to several conceptual problems encountered in the development of a generic Data Access Layer (from now on referred to as DAL).
  • .NET Class for SerializationJul 14, 2003. This article is an approach to create a generic class for the serialization.
  • ColorFul Web DropDown List in ASP.NETJul 23, 2003. In this example we will build an ASP.NET User Control which provides a listing of colors with the list items displayed in the actual color that the list item represents.
  • Deleting a DataGrid Data Based on a Column ValueJul 24, 2003. In this article we'll see how to delete the records of a DataGrid based on a column value in the database table.
  • Lingo Game in C#Jul 30, 2003. It is a Lingo game developed in C#. It is based upon Game Show Network's Lingo but has a few modifications to it.
  • Authentication and Authorization in ASP.NETSep 09, 2003. There are two closely interlinked concepts at the heart of security for distributed applications - authentication and authorization.
  • FTP Server in C#Oct 13, 2003. The attached source project is a simple FTP server implementation. This version is very early release of FTP Server.
  • Late Binding With ReflectionOct 20, 2003. Component based technology has done great things for software development, allowing reuse and leading to better-written code that separates subjects and entities into distinct components.
  • W23 ProtectorNov 24, 2003. The attached project is a W23 Protector. This program protects with a Windows registry code by applying 8 various types of protections. The program also has a security account with 3 types of user system accounts which are saved in an XML file.
  • Display Alphabetically Sorted Data in a Data GridDec 24, 2003. This code sample shows you how to display data sorted alphabetically based on the values in the database.
  • Directory Services Vs RDBMSFeb 06, 2004. When storing user information, developers can have two choices to choose from - Active directory and a relational database. This article sheds lights on usefulness of each of these and when to use one over the other and vice versa.
  • Code Access SecurityFeb 06, 2004. Code Access Security represents a fundamentally different way of controlling access rights to protected resources. Traditionally, permissions such as access to the file system, databases or network were allocated based on characteristics of the user. All processes executed by the user would assume an equivalent set of permissions.
  • Extreme Programming (XP)Feb 18, 2004. Extreme Programming (XP) is a discipline of software development based on values of simplicity, communication & feedback. It works by bringing the whole team together in the presence of simple practices.
  • Validating ASP.NET Server ControlsFeb 20, 2004. Validation server controls are a series of controls that helps you validate the data that the user enters into the other controls that are provided with ASP.NET. They determine whether the form can be processed based upon the rules that you define in the validation server controls.
  • Configuring Publisher Policy FileFeb 20, 2004. Versioning in the Microsoft .NET Framework is managed at the assembly level and is only used when locating strong-named assemblies. By default, the common language runtime loads the assembly whose entire version number matches the version number in the calling assembly's metadata.
  • SQL Server Reporting ServicesFeb 25, 2004. SQL Server Reporting Services is a comprehensive, server-based platform for creating, managing, and delivering reports that contain data from relational and multidimensional data sources. This article explains the features that are supported by SQL Server.
  • Live Communication Server 2003 v 1.0Mar 12, 2004. Live Communication server enhances the power of instant messaging and real-time communications to improve employee productivity. It is based on industry-standard protocol and offers secured messaging. It is an extensible system which enables the people to communicate and collaborate on various medias.
  • Implementing Security Access Rights in ASP.NET ButtonMar 24, 2004. In Web based Application, each of the users have different privileges and access rights based on their roles. Each of these roles can have read or write access for different Web pages.
  • Monitoring Remote Log Remotely using WMI in C# and .NETMar 31, 2004. WMI (Windows Management Instrumentation) is a component of the Microsoft operating system that allows you to monitor virtually every piece of the system (either locally or remotely) as well as control the windows operating system.
  • The Matrix Class and TransformationsApr 01, 2004. Matrices play a vital role in the transformation process. In GDI+, the Matrix class represents a 3×2 matrix that contains x, y, and w values in the first, second, and third columns, respectively.
  • Combine Multiple Streams in a Single .NET Framework Stream ObjectApr 11, 2004. This article represents a simple Stream class whose data is based on the number of another .NET Framework streams.
  • Using Map in a Pocket PC ApplicationApr 19, 2004. GPS enabled applications are a good example of using a Pocket PC to locate a Pocket PC user. This attached application is a location based Pocket PC application developed using .NET compact framework.
  • Significance of Transformation OrderApr 27, 2004. When applying a composite transformation on graphics objects, the order of transformations plays a vital role. This article shows you various aspects of the transformation order and the results.
  • University Student Registration Application in ASP.NETMay 03, 2004. The aim of this project is to implement a Web application, where students can register for an online course. If the user is an administrator, he can add and remove courses and modify the student information.
  • Understanding .NET Framework at a glanceMay 05, 2004. In this article we are going to look at Microsoft .NET Framework. This is the newly established software development environment which helps developers to develop applications quickly and gives optimum, efficient, scalable, performance oriented applications in different languages like Visual Basic .NET, C#, ASP .NET, and Jscript .NET.
  • Setting Ink Overlay Properties in Tablet PCJun 02, 2004. In this article, I will write an application that allows us to set the Ink Overlay properties dynamically based on the values selected by the user.
  • Portal Development in ASP.NET 2.0Jun 04, 2004. The new security controls make authentication a breeze and web parts provides the user the means to customize content. Personalization and Membership features give developers a ready made framework for personalizing the site to suit individual user needs.
  • Web Services-InteroperabilityAug 04, 2004. In this article, we will see what interoperability is all about, comparison between Java and .NET interoperability, the benefits of and challenges faced in interoperability and the role of WS-I in this overall scenario.
  • Securing Your ASP.NET Web Applications Aug 31, 2004. Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
  • TranslateSQLOct 05, 2004. TranslateSQL is a utility for generating SQL-Server SQL scripts based on an existing Oracle schema, in essence 'translating' Oracle schemas into SQL-Server databases.
  • WS-Security Protocol with .NET – A OverviewOct 11, 2004. WS-Security is a security mechanism for web services coined by IBM, Microsoft and VeriSign. WS-Security introduces the concept of security tokens. These XML-based tokens contain claims about the sender of a SOAP message, and can include data sufficient to prove these claims.
  • SQL Server Reporting ServicesFeb 25, 2005. SQL Server Reporting Services is a comprehensive, server-based platform for creating, managing, and delivering reports that contain data from relational and multidimensional data sources. This article explains the features that are supported by SQL Server.
  • Web Based Chat ApplicationMar 15, 2005. The article explains about devloping a chat Solution in ASP.Net / C# which is differnt than any of the available solutions and works under any firewall and browser settings.
  • Enterprise Library 1.0Apr 02, 2005. Enterprise Library is a set of tested, reusable application blocks that address common problems developers face when developing enterprise-based applications.

About role-based-security

NA

SPONSORED BY

Custom Software Development
MCN is your source for developing solutions involving websites, mobile apps, cloud-computing, databases, BI, back-end services and processes and client-server applications.
European SharePoint Conference