Blog

System Metadata Tables and INFORMATION_SCHEMA in SQL Server

Information about assemblies as well as the assembly code itself and the dependencies is stored in the system metadata tables, which, in general, store information about SQL Server database objects, such as tables and indexes. Some metadata tables store information for the entire database instance and exist only in the  MASTER database; some are...

Visual Studio 2005/2008 on Vista Internet Explorer cannot display the webpage

I faced a strange problem with Visual Studio 2005 and Visual Studio 2008 which is I have several ASP.NET Projects some of them using .NET 2.0 or Visual Studio 2005 and the others are using .NET 3.5 or Visual Studio 2008. The problem was when I try to run the Web Application I got this...

How to Access controls on Master Pages from Content Pages in ASP .NET

We will assume that we have a Label control called "Label1" on your Master Page, you might want to change the text of that Label.To do that write this code in your content page: Label lbl = new Label(); lbl = (Label)Master.FindControl("Label1"); lbl.Text = "Text"; Of course, this is all assuming the label is OUTSIDE the ContentPlaceHolder

Cross Page Postback in ASP.NET

This is a new feature in ASP .NET 2.0. The IButtonControl Interface contains a new property called PostBackUrl which points to the page to which the current page will postback, Button, ImageButton and LinkButton implements this interface and exposes the cross page postback functionality. When user clicks the button in the current page will postback...

The permissions granted to user ‘Domain\UserName’ are insufficient for performing this operation

I have faced a problem when I tried to open the Reporting Service Web Site for SQL Server 2005 running on Vista Ultimate. As you can see from the title of the post the error was "The permissions granted to user 'Domain\UserName' are insufficient for performing this operation" I have installed SQL Server 2005 Service Pack 2...

How Microsoft missed this!

Nobody can create a folder anywhere named as “con” , “PRN” , “LPT1” , “LPT2” , “LPT3” , “COM1” ,”aux” , “COM2” or “NUL” on any Windows Operating System This is something pretty cool...and unbelievable... At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened! It is a standard device name in...

SQL Injection

It is a way of hacking on a database driven application in which the hacker executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet, bypassing the firewall. SQL injection hackers are used to steal information from a database from which the data would normally not be available...