Quick bit of example php code to pull people’s details out of the Durham University user database (not LDAP, this is a separate database with slightly different details) – this database is just sitting on the mysql server without a password! The applications of this database are endless, in this simple example the script grabs everyone from […]
Read MoreIris Exchequer Fails to Install
Had a strange problem with a machine at work failing to do a clean install of the latest version (v6.01.223) of Iris Exchequer (Pervasive edition) running on Windows XP… Windows reported the installer as not responding in its final stages and it crashed out. Running the installer to upgrade other machines to the latest worked […]
Read MoreWorking with MDI Window Backgrounds in .NET
Its not unreasonable to want to work with the background of an MDI container area; in a project I’m working on I thought it would be neat to have a custom background image in the container rather than the boring SystemColors.AppWorkspace gray. Turns out this isn’t all that straightforward, especially if you want to be […]
Read MoreEthernet Fail
O RLY?
Read MoreiTunes2MSN
Welcome to the online home of iTunes2MSN – a program that works with MSN Messenger and iTunes to set your display picture to the currently playing album art. This project is written by myself acting under the name “VBE Software”, it is coded in Visual Basic 6.0 and the source code is freely available from […]
Read MoreCCS
A business management suite, initially focused on Customer Relations Management but now expanding to manage stock of materials and production management. The solution is engineered for the L.R. Group of Companies (manufacturers of Jubilee Clips) to take over from a network of spreadsheets and simple databases and work alongside an off-the-shelf business mangagement solution.
Read MoreURMANT
URMANT is a subscription system for managing the in-school process of writing UCAS references for students. It is designed for use by office staff, subject teachers, mentors/UCAS reference writers and UCAS Co-Ordinators/Head of Sixth Forms. Make a further enquiry about URMANT Visit URMANT (for existing users only) Report an URMANT Issue/Bug How Does it Work? […]
Read MoreNetwork Security
Network Security is concerned with three main areas: Secrecy. Only the sender and intended receiver should understand the content of messages. Authentication. The sender and receiver need to confirm their identities. Integrity. Need to ensure the message is not altered without detection.
Read MoreGetting E-mail Out of OWA
or … “Ha, take that ITS“ The Problem… Getting all my e-mail in one place has been something of a challenge recently, the goal was to have all my e-mail end up under one account – with a single web interface to access all my e-mail on the go. Finally, tonight I think I’ve cracked […]
Read MoreCollections in Java
The Java API contains numerous classes for managing collections (or sets) of objects. A collection allows us to easily model a large number of data values or objects. There are four main types of collections which are available through various API packages; firstly lists. A list is an ordered collection of objects, we’d use this […]
Read More