|
To elaborate on Dave Kreskowiak's post.
- You need a panel (you can change the background color if you like)
- Learn GDI+ if working with winforms. Basically it involves putting the handle of the panel into a Graphics object and from there you get access to drawing tools like lines, ellipses, rectangles, ...
- If you do have the Graphics object you need code in place to redraw everything, else all the updates will draw over the previous situation.
This should get you started.
|
|
|
|
|
|
hello pple, my name is patrick, a university student persuing a bsc in computer science. am thinking of coming up with a software that uses fingerprint to carry pout transactions, i need help on how to do it kindly
|
|
|
|
|
What have you tried?
Where are you stuck?
What help do you need?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Hello Patrick. That was nice an polite of you (I'm Pete by the way).
As you may have gathered from the response from OriginalGriff, you need to supply a lot more detail when you are asking a question. When you repost your question, make sure to tell us what code you have, what isn't working and what you have tried. That way, we will know what to focus our attention on.
This space for rent
|
|
|
|
|
|
How to do what, exactly? What part of this are you having a problem with?
So far, you have provided a vague title for a project, but have not defined, in precise terms, what this app is supposed to do, and the scope of the application. That's your first step.
Transactions? What transactions? Database transactions? Monetary transactions? Transactions between what and what? Or Who and what? Or Who and Who?
How are these parties going to enroll in your system? What authentication methods are going to be used, if any depending on scope? How are you acquiring credentials to identify the parties involved? Do you need a fingerprint verification on both sides of the transaction?
... The list goes on. If you don't define the problem you're trying to solve, you not going to solve the problem at all.
|
|
|
|
|
I tend to reject outright anyone that communicates at a kindergarten-level ... maybe you want to consider working on that before you "graduate".
|
|
|
|
|
Your question is so vague, it can cover about anything even remotely related to fingerprint.
Please refine the question.
Patrice
“Everything should be made as simple as possible, but no simpler.” Albert Einstein
|
|
|
|
|
Hi Team,
How can i call function from Forms through any of the controls?
Suppose i have function Validate() in FrmTest.cs under Global\Forms\
FrmTest.cs
private void Validate()
{
}
And control TestControl.cs under Global\Control\
TestControl.cs
For any drop down event changed,i need to invoke the function Validate() from FrmTest.cs.
Any suggestions will be great helpful
Thanks in advance
Manju
|
|
|
|
|
You need a reference to the class that contains the Validate method. But without some more details of your application it is difficult to be more specific.
|
|
|
|
|
You're doing this backwards. The control shouldn't know anything about the form it's on. It might not even be in the Controls collection of a Form. It may be a few levels deep in other control containers.
The control should validate it's own content, not the form.
|
|
|
|
|
Add a (public) "delegate" or Func<t1,...> instance to your target control that is automatically called by the event in question; the "default" response / behaviour of the delegate can be whatever you want (like a NotImplementedException).
Otherwise, you pass in a reference to "Validate()" and initialize the delegate with that reference when the target control(s) are created.
That's a generic way for attaching extra / new behavior to an object.
Depending on the development context (Windows Forms; WPF; MVVM; blah, blah), you would probably adopt some other technique (like "command binding"!).
|
|
|
|
|
how could i develop a wcf with multiple binding. say i would like to have one http binding and one tcp binding and now i want external user will use http binding and internal user will use tcp binding but if external use know tcp binding address then they will not be able to use it. this is the area i do not know how to handle. anyone give me some hint how to prevent external user to use my tcp binding ? thanks
tbhattacharjee
|
|
|
|
|
Allow the binding to be set up through config and don't allow access to the tcp binding through any external facing firewalls?
|
|
|
|
|
can we prevent tcp access by code? can we detect request is not coming from a specific domain ?
please guide. thanks
tbhattacharjee
|
|
|
|
|
Have you had a look at the authorisation options here? You could authorised some users to access via one protocol and others through another.
|
|
|
|
|
say suppose i have few files in folder and when any file content will be changed then i need to get change file name. how could i do it with hashing technique. i do not want to use file system watcher or directory watcher.
just by hashing technique how could i do it. thanks
tbhattacharjee
|
|
|
|
|
You would need to read each file at regular intervals, calculate its hash value and compare with the original. Not a difficult issue, but also not very efficient. A filesystem watcher is a much better choice.
|
|
|
|
|
protected void SendMail_GMAIL(string Name, string UserName, string email, string password, string sender, string senderPassword)
{
StringWriter stringWrite = new StringWriter();
System.Web.UI.HtmlTextWriter htmlWrite = new System.Web.UI.HtmlTextWriter(stringWrite);
string htmlStr = stringWrite.ToString();
using (MailMessage mm = new MailMessage(sender, email))
{
mm.ReplyToList.Add(new System.Net.Mail.MailAddress(sender, "azharmakandar522@gmail.com"));
mm.Subject = "Human Journals - Your Login Credentials";
htmlStr = "<table width='50%' border='1' style='border-color:Black;'>" +
"<tr>" +
"<td style='background-color:#428BCA;' align='center'><h2><font color='White'> Human Journals Alerts </font></h2></td>" +
"</tr>" +
"<tr>" +
"<td align='center'><table width='90%'><tr><td><br>Dear - " + Name + "" +
"</tr>" +
"<tr>" +
"<td>Thank You to Register with us.</td>" +
"</tr>" +
"<tr>" +
"<td>Your Registration Done Successfully.</td>" +
"</tr>" +
"<tr>" +
"<td>Your username : " + email + "</td>" +
"</tr>" +
"<tr>" +
"<td>Your Password : " + password + "<br/><br/></td>" +
"</tr>" +
"<tr>" +
"<td>Regards<br />Human Journals</td></tr></table></td>" +
"</tr>" +
"<tr>" +
"<td style='background-color:#428BCA;' align='center'><font color='White'>Copyright <a href="https:
"</tr>" +
"</table>";
mm.Body = htmlStr;
mm.IsBodyHtml = true;
SmtpClient smtp = new SmtpClient();
smtp.Host = "smtp.gmail.com";
smtp.EnableSsl = true;
NetworkCredential Networkcri = new NetworkCredential(sender, senderPassword);
smtp.UseDefaultCredentials = true;
smtp.Credentials = Networkcri;
smtp.Port = 587;
smtp.Send(mm);
}
}
please help me
|
|
|
|
|
You cannot prevent a message being treated as spam, except to not send "spam like" messages: it's the content that triggers the detectors as well as the source address.
If you send me spam that gets through, I tell the spam filter "it's spam" and it learns to treat you as junk mail in future.
You cannot prevent that. For registration completion emails, you need to remind us that if they not recieve it they should check the "junk mail" folder and add your address to the email Whitelist.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
|
No.
Because as you have been told before, we do not condone, support, or assist in the production of malicious code in any way, form, or manner. This is a professional site for professional developers.
If you want to know how to do such things, you need to visit a hacking site: but be sure to disable all firewalls and antivirus products first or they won't trust you enough to tell you.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
OriginalGriff wrote: be sure to disable all firewalls and antivirus products first or they won't trust you enough to tell you. Someday a lawsuit will be headed your way.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
He's Welsh. They'll never be able to find him - all the directions have consonants and no vowels.
This space for rent
|
|
|
|