Question about Microsoft Visual Basic 6.0 for PC

1 Answer

Source code for asset tracking system

Monitoring the system configuration and system details from the server of the other clients without any disturbance to the clients.it is also used to identify the misplacing components of the clients.if any mismatch found in the client it should be alerted in the server.

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    President:

    An expert whose answer got voted for 500 times.

  • Master
  • 392 Answers

Just take a look to this site:
http://www.codeproject.com/
you'll get all your answers about VB and totally .NET there by a simple search
enjoy it!

Posted on Feb 21, 2009

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

Issue with time synchronizing(NTP) on layer 2 switch


I know this is probably not going to help you out but you did try going to Alcatel-Lucents web page and search through there or calling them at 800 995-2696? Good Luck! Sorry I couldn't be of some help

Mar 04, 2014 | Alcatel OmniSwitch 6850 (OS6850-48)

1 Answer

Server details are not incorrect but being told they are


Hi here are the server details for yahoo. Please check them against your current configuration and reply back with OS, Mail client and your error details if this configuration doesnt work.
  • Incoming server - imap.mail.yahoo.com
  • Outgoing Server - smtp.mail.yahoo.com
  • Incoming port - 993 (SSL enabled)
  • Outgoing port - 465 (Again SSL or TLS enabled)
  • Username - full email address@yahoo.com
  • Password - your password.

Thank you.

Mar 03, 2011 | Yahoo Mail

1 Answer

Difference between proxy server firewall and something called a gateway firewall ....Just a homework question..need another angle other then the veryconfusing textbook


In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has many potential purposes, including:
  • To keep machines behind it anonymous (mainly for security).[1]
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]
  • To apply access policy to network services or content, e.g. to block undesired sites.
  • To log / audit usage, i.e. to provide company employee Internet usage reporting.
  • To bypass security/ parental controls.
  • To scan transmitted content before delivery for malware.
  • To scan outbound content, e.g. for data leak protection.
  • To circumvent regional restrictions.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is a (usually) Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching

A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.
Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.

Dec 11, 2009 | Office Equipment & Supplies

1 Answer

How can i connect client computers to server where clients have no hard disk.How clients can boot and access hard drive of server?


Hi,
u can connect with ur client through terminal server. for that u've to server 2003. u can see the steps that how to configure terminal server for that u've to go this link:

http://support.microsoft.com/kb/300847

Sep 25, 2009 | Microsoft Windows Xp Home Edition Sp2...

2 Answers

I can receive emails, but not send them. The error message says that my server does not recognize my email account. What can I do to be able to send emails since I am receiving them? John


Either your email service has changed their outgoing server or they are having issues. Contact your email provided to ensure you have the correct smtp server listed in your email program..

Jul 06, 2009 | Computers & Internet

1 Answer

Every time i try to get on youtube it comes up.But when i click on my account it says 400 bad request. when i tryed to click on my friends video of gymnastics it says 400 bad request. Please Help Quick


Introduction
The Web server (running the Web site) thinks that the data stream sent by the client (e.g. your Web browser or our CheckUpDown robot) was 'malformed' i.e. did not respect the HTTP protocol completely. So the Web server was unable to understand the request and process it.

It almost always means bad programming of the client system and/or the Web server. 

400 errors in the HTTP cycle

Any client (e.g. your Web browser or our CheckUpDown robot) goes through the following cycle:
Obtain an IP address from the IP name of the site (the site URL without the leading 'http://'). This lookup (conversion of IP name to IP address) is provided by domain name servers (DNSs). 
Open an IP socket connection to that IP address. 
Write an HTTP data stream through that socket. 
Receive an HTTP data stream back from the Web server in response. This data stream contains status codes whose values are determined by the HTTP protocol. Parse this data stream for status codes and other useful information. 

This error occurs in the final step above when the client receives an HTTP status code it recognises as '400'.

Fixing 400 errors - general

There is a low-level program bug in the client or the Web server or both. If you do not have access to the source code for these systems, the only thing you can do is refer the problem to technical support people at the companies that developed the systems.

Fixing 400 errors - CheckUpDown

You should never see this error at all when you use our CheckUpDown service. It indicates that the two systems (our robot and the Web server) fundamentally disagree on the syntax of HTTP data streams.

Please contact us directly (email preferred) whenever you encounter 400 errors. Only we can resolve them for you. Unfortunately this may take some time, because we have to analyse the underlying HTTP data streams and may have to liaise with your ISP and the vendor of the Web server software to agree the exact source of the error.

Jun 14, 2009 | YouTube Videos

1 Answer

Dhcp in server 2003 in domain not working


Windows 2003 server supports DHCP. If you don't see in Administrative tool DHCP maybe the DHCP role is not enabled. You can add this role in "Manage your server". You don't need to reinstall win 2003 server.
Another way to access DHCP management tool is: in command prompt type mmc and then File> "Add remove snap-in" then "Add" and select DHCP.

Jan 06, 2009 | Microsoft Windows Server Standard 2003 for...

Not finding what you are looking for?
Microsoft Visual Basic 6.0 for PC Logo

456 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2642 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18344 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...