Author: senseiken
-
Microsoft ASP.NET 2.0 Member/Role Management with IIS, Part 1: Security and Configuration Overview
Microsoft ASP.NET 2.0 Member/Role Management with IIS, Part 1: Security and Configuration Overview.
-
Lorelle on WordPress ยป Comment Spam Fighter Spam Karma 2.1 Released
For those who have followed my exploits battling comment spam over the past year, and have employed the same thorough techniques to save your site from horrid comment spammers, you will be excited to know that there is a new release of Spam Karma 2. Lorelle on WordPress » Comment Spam Fighter Spam Karma 2.1…
-
VG.net: Animated Vector Graphics
Struggling with complex graphics code? VG.net speeds the development of all graphical applications, providing: A graphical editor integrated in Visual Studio .NET. Design graphics in the Picture Designer the same way you design UserControls: without writing code. Graphical objects: rectangles, rounded rectangles, ellipses, arcs, pies, polygons, polylines, splines, paths, images, text, and Groups. Automatic screen…
-
Efficient Data Paging with the ASP.NET 2.0 DataList Control and ObjectDataSource
Last weekend I posted about how to implement super efficient data-paging using the new ROW_NUMBER() within SQL 2005 (which is supported with the free SQL Express edition and up) and the new ASP.NET 2.0 GridView/ObjectDataSource controls. The BIG win with this approach is that it enables a web-application to efficiently retrieve only the specific rows…
-
Joshua Flanagan – ProfileView
This is the official home of my new ProfileView control. ProfileView is an ASP.NET 2.0 server control that enables your users to view and/or edit their Personalization Profile. Read my original post about it for more background.January 8, 2006: Release 1.1.108.2006Properties now display in the order they are listed in web.config Design-time view now uses…
-
Joshua Flanagan – ASP.NET Role Provider Visual Studio template
Of all the new providers that ASP.NET 2.0 introduces, I think the RoleProvider will be the most frequently implemented in a corporate IT environment. Intranet applications can usually take advantage of Windows integrated authentication for user identification. By default, this will create a WindowsPrincipal object that contains all of the user’s domain groups as roles…
-
Alas, a blog ยป Blog Archive ยป Bondage and Patriarchy
Oh, I don’t reject the idea that BDSM should be subject to RF analysis, Charles, it’s just that I’ve found some discussions on the subject difficult to participate or make any headway in. It seemed that the parameters were too restrictive, as I mentioned above. For another eggzample, when I suggested that as human social…
-
Official Shrub.com Blog ยป Blog Archive ยป Girl Power? [Girls & Game Ads, Part 3]
How can it be a triumph of female agency when the woman who’s kicking some ass is doing it in the context of male desire? Over and over again, the ads and the games they sell build up women of strength – both physical and mental – only to ascribe that power to a facet…
-
feminist: Autonomy
Are feminists expected to act within their moral duty, or can a feminist be considered a feminist and still seek out the desires they wish, either instinctual or cultural/societal desires? I think the correct word for this is autonomy.Is there a code of ethics for feminists, or can feminists be part of the movement with…