Contents

WithEvents and Handles clause requires form us to declare the object variable and the event handler as we write our code, so linkage is created upon compilation. On the other hand, with AddHandler and RemoveHandler, linkage is created and removed at runtime, which is more flexible.Let's assume that we want to load several MDI child forms, allowing each of them to be loaded only once, and of course to know when one of the child forms is closed. Since we have several forms ...

VB.Net: Dynamic Usage Of Eventhandlers

VB.Net: Dynamic Usage Of EventhandlersWithEvents and Handles clause requires form us to declare the object variable and the event handler as we write our code, so linkage is created upon compilation. On the other hand, with AddHandler and RemoveHandler, linkage is created and removed at runtime, which is more flexible.Let's assume that we want to load several MDI child forms, allowing each of them to be loaded only once, and of course to know when one of the child forms is closed. Since we have several forms to load we would like to use the AddHandler and RemoveHandler keywords so we can be flexible and write the minimal code we can.Let's get dirty.1. In each MDI child form we have to declare a public event.Public Event FormClosed(ByVal f As Form)2. In each MDI child form we have to use the Form_Closed method which handles the MyBase.Closed class and raise the FormClosed event.Private Sub Form1_Closed(ByVal sender As Object, ByVal e As System.EventArgs) _ Handles MyBase.Closed RaiseEvent FormClosed(Me)End Sub3. On our MDI form we need to declare two member variables. The first's of type Form and the second's type is ArrayList.Private m_f(0) as FormPrivate m_sLoadedChildForms As New ArrayList4. We need to implement a method the will search the MDI child forms that are loaded. We'll also use this method when we unload the MDI child forms.Private Function SearchChildForm(ByVal strSearchForm As String, _Optional ByVal idxEventHandler As Long = -1) As Long Dim i As Long = 0 For i = 0 To m_sLoadedForms.Count - 1 If m_sLoadedForms.Item(i) = strSearchForm Then Dim j As Long = 0 For j = m_f.GetLowerBound(0) To m_f.GetUpperBound(0) If m_f(j).Name = strSearchForm Then idxEventHandler = j Next j Return i End If Next Return -1End Function5. We need to implement a method to load the mdi child forms and use the SearchChildForm method in order not to load the same mdi child form second time.Private Sub LoadChildForms(ByVal f As Form) If m_f.GetUpperBound(0) > 0 Then ReDim Preserve m_f(m_f.GetUpperBound(0) + 1) End If m_f(m_f.GetUpperBound(0)) = f If Not SearchChildForm(m_f(m_f.GetUpperBound(0)).Name()) >= 0 Then m_f(m_f.GetUpperBound(0)).MdiParent = Me AddHandler m_f(m_f.GetUpperBound(0)).Closed, _ AddressOf UnloadChildForm m_f(m_f.GetUpperBound(0)).Show() m_sLoadedChildForms.Add(m_f(m_f.GetUpperBound(0)).Name) Else If m_f.GetUpperBound(0) > 0 Then ReDim Preserve m_f(m_f.GetUpperBound(0) - 1) End If End IfEnd Sub6. At last we need to implement a method to take out our mdi child form from the array list so we can load it again if we want.Private Sub UnloadForm(ByVal sender As System.Object, ByVal e As System.EventArgs) Dim i As Long Dim s As String = sender.GetType().Name Dim IndexForEventHandler = -1 i = SearchChildForm(s, IndexForEventHandler) If i >= 0 Then m_sLoadedForms.RemoveAt(i) If IndexForEventHandler >= 0 Then RemoveHandler m_f(IndexForEventHandler).Closed, AddressOf UnloadForm m_f(IndexForEventHandler) = Nothing End IfEnd Sub

About Norton Anti-Virus

About Norton Anti-Virus

With the many types of anti-virus software, it is helpful to read a brief description of what the different types do and how they can be beneficial to you and your computer. Norton Anti-virusSymantec's Norton AntiVirus software is perhaps the world's most trusted antivirus solution. It is available for both Windows PC's, and Macintosh (Symantec Antivirus for Macintosh - S.A.M). Norton AntiVirus is a very reliable and easy-to-use anti-virus product. It's the best anti-virus product for catching viruses in downloaded files and E-mail. Norton AntiVirus is also more expensive than McAfee VirusScan although not by much, and the added abilities of Norton can easily make up the difference.Norton AntiVirus includes many tools that can be run in the background, including watching for suspicious PC activity and automatically checking downloaded files for viruses. Norton AntiVirus is also automatically configured to handle E-mail virus scanning for email messages coming into your computer, as well as those you send. This process automatically scans and cleans both incoming and outgoing email, stopping viruses from infecting your computer or spreading to others. It removes viruses automatically, without interrupting your work and prevents infections during real-time online chats, and also detects viruses in instant-message attachments. Because so many viruses and internet worms are now spread using email and Instant Message Systems, this is extremely valuable and necessary protection.Norton InstallationInstallation is simple. Simply install the CD in your CD drive, and the installer will launch automatically. The installer should ask you if you want to do a pre-install scan of your system for viruses. This is a very good thing to do. Once this is finished, the installation will proceed, and you can accept all the defaults without worry. Once the installation is complete, you'll be prompted to go online and get up-to-date virus definitions. DO NOT skip this step. Having up-to-date virus definitions is essential to the performance of any antivirus software. Normal UseNorton is a very hands-off program. Pretty much it is an install and forget program that looks after itself. It will automatically notify you if there is anything that you need to do. If a virus is found, the software will try to automatically repair the file, if it can't, it will place the file in a safe 'quarantine' zone, and let you know. In addition to looking for known viruses, the Norton Antivirus Bloodhound feature tries to spot new viruses and worms by their behaviour that is common to such nasty programs. Checking your system and downloading updates are two things you need to do regularly. Norton Antivirus makes them painless by setting up a full system scan once a week and checking for new updates (both to the software, and virus definitions) whenever you're online. These simple update scans hardly slow down your PC down at all.Overall, Norton Antivirus is an excellent way to guard against viruses. It is the system that I recommend to my clients most often, and that I use personally.

Biometric keyboard signature authentication for Windows logon - A Short Guide to DiBiSoft-s BioKeyLogon.

Biometric keyboard signature authentication for Windows logon - A Short Guide to DiBiSoft-s BioKeyLogon.

Hello! We are glad you've come.Application of biometric methods allows you to significantly increase the security of your confidential information. Knowing the passphrase will not suffice for the intruder anymore, as he will need to possess the unique physical parameters of the legal owner of the protected data.The market of biometric authentication means already exists. As a rule, they are represented by expensive hardware/software solutions used for access control in large commercial or public institutions, where the overall cost of information is much higher than the cost of biometric systems themselves. For the majority of companies, firms, small offices, home and mobile computers, where the level of data confidentiality is relatively low, the use of highly expensive biometric systems is not financially justified.The passphrase analysis method is one of the existing authentication methods. As a rule, it complements the standard password authentication method. In such methods, the user must know the passphrase and should be able to correctly type it using the keyboard. That is how the standard passphrase authentication procedure is extended by biometric keyboard signature authentication.However, the cost of such a solution will be significantly lower that the cost of biometric systems with a comparable level of authentication errors. For instance, the cost of a biometric system that uses iris scanning lies in the ballpark of 500 dollars, whereas retina scanning systems are priced around 4000 dollars, the cost of the scanner accounting for the largest fraction of the overall cost.BioKeyLogon is a new original solution in the field of "biometric authentication" . BioKeyLogon enables you to extend the standard OS login procedure by using a discreet biometric authentication procedure based on keyboard signature. This application works with Windows 2000/2003/XP and is intended for home, small office and corporate use.The developers of BioKeyLogon solved the following problems: - The influence of the psychophysical condition of the user has been minimized;- The process of creating the user's biometric model has been simplified (usually the user had to enter the password at least 20 times);- The system's ability to analyze the indistinct keyboard signature of an "average" user has been improved;- The system now monitors the dynamics of the user's keyboard behavior and makes appropriate dynamic changes to the user's biometric model.BioKeyLogon fully integrates into the system and stays hidden. Users log into the system the same way they did before, but the software discreetly checks the dynamics of password entry. If this parameter is different from the reference value, the system will react as if an incorrect answer has been entered. If the intruder knows the password only and tries to log into a system protected by BioKeyLogon, the chances of his success will be minimal. The situation will also appear confusing, as the system will report a wrong password notification message for the password that the intruder will deem fully valid.The procedure of discreet biometric authentication based on keyboard signature is used only for those users that keep a reference keyboard signature stored in their system. Other users will use the standard password-protected login. All biometric data of the system users are stored in an additional secure location.You can read more about BioKeyLogon from our product page: http://www.allmysoft.com/download-biokeylogon-software.html You can take a look and download the program that best suites your needs from our website:http://www.allmysoft.comHave a nice day!---Alexander B.www.allmysoft.com

Finding Photo Editing Software

Finding Photo Editing Software

If you take a lot of pictures, or are getting ready for an event where youll want to have lots of quality photos to include in your family album (i.e. weddings, holiday get-togethers), youll want to know more about photo editing software that is both affordable and easy to use. Here are some software programs for editing photographs and graphics that you may want to check out.Virieu has a free photo editing program that is easy to use, and is compatible with most computers. With the program, you can add captions to your pictures, frame your portraits digitally, and make your photos into backgrounds for your screen or to send out in your email by using the fade and shade features that come along with the program. The programs will also show you how to darken or lighten certain sections of the picture, so that you can remove certain items from your photograph. You can try the editing software out for free during a 21-day trail, and then the service is $29.00.www.reallusion.com also has a wide variety of editing equipment to try that will make any picture you take look professional and impressive. You can take advantage of the muscle-based facial enhancement feature, so that you can fix the faces of the people you take pictures of to create a more flattering photograph. Other products from the company include the Effect 3D Studio, a graphics editing and design program that allows you to make animated graphics no matter what your skill level is. You can also purchase CrazyTalk, a program that allows you to create animated talking characters for PowerPoint and DVD presentations. Most computers are equipped to download the programs (a Windows 98 or higher is usually acceptable), and you can try the products out before you purchase any of the programs. In order for you to download, edit, and save your photos on your computer, youll need a digital camera to take your pictures with. Brands like Canon and Olympus have great digital cameras that are easy for you to use, and produce quality photos that you can save on your computer. You may also want to pick up a book or two with some more basic information on photo editing software, so that youll know which programs are easiest to use and most affordable. You can also find new and used photo editing programs, such as Instant Photo Editor on sites like www.amazon.com, with complete CD-ROM instructions on how to make sure you edit great photos every time you use the program.

SQL Server 2000 Data Types

SQL Server requires that each variable and column in a table should be defined with respect to the type of data it will store. From a bit to a huge image and binary storage types, the allocation is supposed to help the user conform to the data required, and help the engine allocate space and processing speed efficiently. Built-in data types SQL Server 2000 recognizes the following built in data types: Data Types Description bigint Integer data from -2^63 through 2^63-1 int Integer data from -2^31 through 2^31 - 1 smallint Integer data from -2^15 through 2^15 - 1 tinyint Integer data from 0 through 255 bit Integer data with either a 1 or 0 value decimal Fixed precision and scale numeric data from -10^38 +1 through 10^38 -1 numeric Fixed precision and scale numeric data from -10^38 +1 through 10^38 -1 money Monetary data values from -2^63 through 2^63 - 1 smallmoney Monetary data values from -214,748.3648 through +214,748.3647 float Floating precision number data from -1.79E + 308 through 1.79E + 308 real Floating precision number data from -3.40E + 38 through 3.40E + 38 datetime Date and time data from January 1, 1753, through December 31, 9999, with an accuracy of 3.33 milliseconds smalldatetime Date and time data from January 1, 1900, through June 6, 2079, with an accuracy of one minute char Fixed-length character data with a maximum length of 8,000 characters varchar Variable-length data with a maximum of 8,000 characters text Variable-length data with a maximum length of 2^31 - 1 characters nchar Fixed-length Unicode data with a maximum length of 4,000 characters nvarchar Variable-length Unicode data with a maximum length of 4,000 characters ntext Variable-length Unicode data with a maximum length of 2^30 - 1 characters binary Fixed-length binary data with a maximum length of 8,000 bytes varbinary Variable-length binary data with a maximum length of 8,000 bytes image Variable-length binary data with a maximum length of 2^31 - 1 bytes cursor A reference to a cursor sql_variant A data type that stores values of various data types, except text, ntext, timestamp, and sql_variant table A special data type used to store a result set for later processing timestamp A database-wide unique number that gets updated every time a row gets updated uniqueidentifier A globally unique identifier Bigint, sql_variant, and table are new to SQL Server 2000 User-defined data types You can make user-defined data types too, which sometimes can be more descriptive of the value types held in the object. This may make it easier for the programmer to document and work with the data. These data types are based on the built in types, and can be outfitted with preprogrammed defaults, checks, constraints, etc. . To create a user-defined data type, use sp_addtype datatypename, basedatatype, NULL'/'NOT NULL' How to choose the appropriate data type SQL Server stores data in data pages that are 8Kb (8192 bytes) in size. The system uses some of that s Sometimes, the system uses only 8060 bytes are availableto that are available to store user's data. Consider the size of a row of data in your tables. If the rows are large, make sure that multiples of the fit conveniently on a data page so that page space is not wasted. This is cut down on disk paging overhead when accessing the data. You want to maximize the number of rows of data which that will fit on a page. This can be accomplished both by splitting the tables, and by choosing the smallest data type which that will accommodate your data. . In you are using integer data, data; consider that the tinyint datatype will accommodate data which that will fit into one byte of storage. So if the range of all of the data in your field (or variable) is between 0 and 255, use the tinyint datatype. If the range is between -32,768 and 32,767, use the smallint data type. And if If you need to store integer data from -2,147,483,648 through 2,147,483,647, use int data type. Similarly with smallmoney. If smallmoney. if your value range is between -214748.3648 and 214,748.3647, use the smallmoney datatype. Use smalldatetime data type instead of datetime data type, if you need to store the date and time data from January 1, 1900 through June 6, 2079, with accuracy to the minute. Prefer varchar.nvarchar to text/ntext whenever possible because the text and image fields are stored separately, which produces additional paging. And prefer char/varchar to nchar/nvarchar data types because the n types require twice as much storage space. The n types are used primarily for unicode data. Resources Tutorial: SQL 7 & Database Files This is a useful tutorial on SQL & and database Files. Information: Complete information on SQL This resource provides complete information on SQL. Metro NY / NJ SQL Server ConsultantsWe specialize is custom database software. Call us for a free consultation (973) 635 0080 or email us at paladn.com

Bookmark Managers: Programs vs. Web Services

The rapid development of the World Wide Web in recent years has led to an explosive growth of information on the Internet. Our contemporary lifestyle would be unimaginable without access to such a super-abundant cornucopia of valuable information and web surfing has now become an everyday occupation for even the most diverse sections of society.This rapid expansion of web resources raises some new issues for all of us. How could you possibly remember; after a long search, the address of that crucial web page? How will you be able to return to the page without repeating a tedious web search through hundreds and thousands of pages? The answer is obvious, you need a program that will allow you to easily create and manage a database of web resources. Of course, this database must be quick, intuitive and convenient to use. One way to resolve this problem is to use your web browser's bookmarks feature. Bookmarks are a popular term for the lists of web page links stored in web browsers, although they are called 'Favorites' in Internet Explorer. These web browser bookmark systems have some severe limitations. For example, each bookmark list will only be compatible with a specific web browser. If you use several different web browsers you will have to manage the bookmark system in each one. Web browser bookmark lists may become cumbersome to use when your bookmark list grows beyond a few items. Important features missing from web browser bookmark systems include:- Powerful search functions;- Synchronization of bookmarks between different computers;- Detection and automatic deletion of duplicate bookmarks;- Checks for availability of bookmarked web pages.Specialist programs and web services that store and organize bookmarks are now available and they offer a comprehensive solution to these problems. They are called bookmark managers or bookmark organizers (in this article both terms have the same meaning). The difference between online (web-based) bookmark managers and standalone bookmark managers is in the location of the stored bookmark database and in the way that the database is accessed. Web services called 'online bookmark managers' store the user's bookmarks on their remote servers and their bookmarks may be accessed from any browser. A standalone bookmark organizer is simply a program which runs on your local computer. It stores the bookmark database on a hard disk and allows access through its own built-in interface.Here are some examples of web-based bookmark managers:iKeepBookmarks.com - http://www.ikeepbookmarks.comLinkaGoGo - http://www.linkagogo.comMurl - http://murl.comYou can find more links to online bookmark managers here: http://dmoz.org/Computers/Internet/On_the_Web/Web_Applications/Bookmark_Managers/Bookmark management software can be found here:Link Commander - http://www.resortlabs.com/bookmark-manager/linkcommander.phpLinkman - http://www.outertech.com/index.php?_charisma_page=product&id=5Powermarks - http://www.kaylon.com/power.htmlAny software catalog will contain plenty of links to bookmark managers. For example: http://www.snapfiles.com/shareware/misctools/swurlorg.htmlOffline and online bookmark managers each have relative advantages and disadvantages due to their differing methods of database storage and access.An online bookmark manager does not depend on any particular computer. If you have an Internet connection you can access your bookmarks from any computer in the world. You don't need to synchronize the bookmarks on your home/work PC or notebook because they will all access the same bookmarks database. With an online bookmark manager you can access your bookmarks even when you are in an Internet cafe! Another advantage is that most of them are free. They will cost you time, though, because you access your bookmarks via an Internet connection. More importantly, most of the web interfaces are not as convenient as software based bookmark managers and don't have so many useful features. For example, they can't search for and delete duplicate database items. Here are some of the other potential disadvantages of using online bookmark managers: 1) You risk losing all your bookmarks if, for some reason, the web service closes down.2) There is a danger of unauthorized access to your private bookmarks because your bookmark manager server may not be secure against hackers. The advantages and disadvantages of offline bookmark managers are almost exactly opposite to those of online bookmark managers and will be discussed next.Any offline bookmark manager is tied to the computer on which it is installed. It stores your bookmarks in a database (which usually has its own proprietary format) that is located on one of the hard drives. To use your bookmarks on several computers you will need to install the program on each computer and find a way to synchronize the bookmark databases. Most of the currently available bookmark organizers do have a database synchronization feature. Also, there are now devices with high data transfer speeds (e.g. flash drives) that can store an independent bookmark database and allow it to be shared between several computers.Another disadvantage of bookmark manager software is the price. There are some free programs out there, but they don't have a great number of features and technical support is often weak or unavailable. The programs that require payment are inexpensive, though, usually costing from $20 to $40. The user licenses of such programs will normally allow you to install the programs on all of your computers.In my opinion, the disadvantages of standalone bookmark managers are minimal compared to their advantages. The location of both the program and database on the same computer guarantees you fast access to your bookmarks and high security from hacker attacks. The convenience of the program interface and the number of useful features are limited only by the power of the computer and the skills of developers.So, how should you organize your bookmarks? Should you use an online or offline bookmark manager? I don't think there is a definite answer. It all depends on your preferences and working habits. If mobility is your priority, if you travel often and wish to access your bookmarks no matter where you are and from any computer, then you should consider an online bookmark manager. If speed, ease of use, security and functionality is most important to you then an offline bookmark manager might be a better choice.

Summary

WithEvents and Handles clause requires form us to declare the object variable and the event handler as we write our code, so linkage is created upon compilation. On the other hand, with AddHandler and RemoveHandler, linkage is created and removed at runtime, which is more flexible.Let's assume that we want to load several MDI child forms, allowing each of them to be loaded only once, and of course to know when one of the child forms is closed. Since we have several forms ...