... Function
96 CHAPTER 3 VISUAL BASIC PROGRAMMING ESSENTIALS
svchost 425 5744
svchost 6549504
SearchIndexer 536 125 44
sqlwriter 37150 72
searchFilterHost 3514368
cmd 20 80768
iexplore 25 0073088
As you can ... " ;20 20 Palm Ave., Santa Barbara, CA 90000",
Name:= "Peter Evans", EMail:= "PeterEvans@example.com"))
You’ll see the following in the Immediate windo...
... Using the .NET SDK 16
1. 11. 1 Compiling with Visual Basic. NET 19
1. 11. 2 Compiling with C# 20
1. 11. 3 Testing the application 20
1. 12 Conclusion 20
1. 10
Using Visual Studio .NET 15
Chapter 1
component ... can a network program do? 2
1. 4 IP addresses 3
1. 5 The network stack 6
1. 6 Ports 7
1. 7 Internet standards 7
1. 8 What is .NET? 9
1. 9...
... target machine actively refused it.”
As usual, the following assemblies are added:
C#
using System.Threading;
using System.Net;
using System.Net.Sockets;
using System.Text;
using System.IO;
VB.NET
imports ... 76 3.6 Socket-level networking in .NET
stand and recognize these techniques when they are used in code written by
other developers.
The most important class in .NET net...
... we intend to use in
this application. Put this code at the beginning of the program:
C#
using System.Threading;
using System.Net;
using System.Net.Sockets;
using System.Text;
4.2 HTTP 1 03
Chapter ... server.
And, the usual namespaces are thrown in:
C#
using System.Threading;
using System.Net;
using System.Net.Sockets;
using System.Text;
using System.IO;
VB.NET
Imports System.Thre...
... support for interoperating with Netware in .NET, and
it is no small undertaking to integrate a .NET application with a Novell net-
work. If you have to do so, look at the DOS command-line interfaces ... many users can send and receive undirected email,
which is sorted into subjects of interest.
Two basic tasks can be performed with NNTP: reading postings and
creating ne...
... may contain more information about the original
message. In either case, SHA1 should be sufficient.
9.4.2 Using SHA
Create a new Windows application in Visual Studio .NET as usual, and
draw ... certificate is known as X .50 9. This is
an international standard maintained by the IETF Public Key Infrastruc-
ture (PKIX) working group. X .50 9 comes in three versions: v1, v2, an...
... authoritative in the domain. DNS servers routinely query each
other for updated information, and in this way the information slowly
10.8 Load balancing 269
Chapter 10
C#
public void run()
{
string sURL ... resource for creating AVI files programmatically is
www.shrinkwrapvb.com. The code examples are in Visual Basic 6. 0, but they
can be ported to VB.NET from within Visual...
... reading data when using WMI; you can also per-
form actions on remote computers using this technology. Functions such as
starting and stopping services, rebooting, and starting and terminating ... concludes with information
about how to use new classes introduced in .NET 2.0 Whidbey to gather
systemwide network information.
13.2 IP-level network tapping
Network tapping...
... MMCKINFO mmckinfoParentIn = new MMCKINFO();
MMCKINFO mmckinfoSubchunkIn = new MMCKINFO();
int hmmioIn = 0;
mmioinfo mmioinf = new mmioinfo();
mmioinf.adwInfo =
(new StringBuilder()).Append(' ...
14.3
Listening for incoming phone calls 391
Chapter 14
C#
public delegate int LineCallBackDelegate(int dwDevice, int
dwMessage, int dwInstance, int dwParam1, int dwParam2,
int dwPar...
... forwarding and adver-
tising on the automatic tunneling pseudointerface, using the following
command (with the interface ID substituted accordingly):
netsh interface ipv6 set interface <
interface ... 16
VB.NET
Public Class Form1
Inherits System.Windows.Forms.Form
Public Shared port As Integer
As in the server, the port needs to be set to 99 99. This is set from within
the form Loa...
... time that the data has been changed in the database, we refresh the data in
the DataSet so that we have an accurate representation of what’s been done to it. This
operation has been encapsulated ... so that our own code knows
we’re creating a new record (used later when we save the data). Lastly, we update the
application’s status line to indicate that a new record was successfully created ....
... Generator. This program will generate an XSD schema to match an existing
database that can be distributed to users of the data to make sure that the data is
correct. It will also communicate the ... the workspace.
Name the element Computer and enter information into the grid to create our computer
data. Figure 7. 3 illustrates what your workspace should resemble when you’re done.
Note that ....
... more work than automatic pagination.
To Paginate or Not to Paginate
Usually you will want to stick with automatic pagination and use it when it is appro-
priate. For example, you could create ... the configuration file, which I’ll cover in detail later.
Forms Authentication
and Authorization
Forms authentication and authorization are ideal for Web sites and Web applications
that are open ....