Search Results

Search found 5772 results on 231 pages for 'authorized keys'.

Page 115/231 | < Previous Page | 111 112 113 114 115 116 117 118 119 120 121 122  | Next Page >

  • How do you manage web navigation info in your application?

    - by Dave
    I’m building an application where different users will have different menu items available to them depending on what they’ve paid for. There will also be multiple levels to the menu hierarchy. What’s the best approach to this problem? I’m assuming I need a database table that represents the menu hierarchy, including the parent-child relationships of the nodes in the navigation as well as the sorting of the items. Then another table which I use to manage whether a user is authorized to access a particular item in that table. When I render the view, I’d reference the menus, and the access rights of the user to output the menu, and I’d also need a function to check that same authorization from each controller in case a user manually types in a URL of a controller they’re not supposed to have access to. Is this the right approach? Any suggestions for caching this to prevent the constant look-ups of this type of info? I’m open to any suggestions on how you may have approached this type of requirement.

    Read the article

  • Can a table be both Fact and Dimension

    - by PatFromCanada
    Ok, I am a newbie and don't really think "dimensionally" yet, I have most of my initial schema roughed out but I keep flipping back and forth on one table. I have a Contract table and it has a quantity column (tonnes), and a net price column, which need to be summed up a bunch of different ways, and the contract has lots of foreign keys (producer, commodity, futures month etc.) and dates so it appears to be a fact table. Also the contract is never updated, if that makes a difference. However, we create cash tickets which we use to pay out part or all of the contract and they have a contract ID on them so then the contract looks like a dimension in the cash ticket's star schema. Is this a problem? Any ideas on the process to resolve this, because people don't seem to like the idea of joining two fact tables. Should I put producerId and commodityId on the cash ticket? It would seem really weird not to have a contractID on it.

    Read the article

  • Winforms Release History : Q1 2010 SP2 (version 2010.1.10.504)

    Telerik Presentation Framework ADDED: VS2010 support for the examples ADDED: Base line support FIXED: A memory leak in some controls which support UI virtualization.Visual Style Builder ADDED: Association for *.tssp files, which are now automatically loaded in the VSB when double-clicked. ADDED: Drag-and-drop support in VSB for *.tssp files. ADDED: All dialogs support default buttons, that is, they can be closed with the Escape or Enter keys. ADDED: States and repository items can be removed with...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Does anyone know of a good script to force file downloads and yet protect download links on a PHP se

    - by racl101
    I tried using a free script that I found on the Internet but it is giving me problems with Windows users (even though they are using IE 8, so it's not an option for me to ask them to upgrade their browsers.) Here's the requirements: I have a bunch of Microsoft Word and pdf files that need to be protected so that only authorized users can download them. I have already created the login system and the current script I have works fine for non-IE browsers. However, I keep getting recurring problems with Windows users who keep complaining that their files download corrupt and yet everyone else either using Mac or Linux or any other browser gets on just fine. The script must allow me to store files in a directory but force download of the file upon the function call. Must work well with most major browsers, especially I.E. If you have any practice suggestions or know of any great scripts (even if they are paid, I'm sick of this problem and would probably pay for a paid script) it would be greatly appreciated in advance.

    Read the article

  • Out of range on shut down, Log Out, Restart and Suspend

    - by user52889
    I have looked extensively on the help forums but haven't found a similar problem. Whether I want to Shut Down, Restart, Log Out or Suspend, as soon as I select my desired option the screen goes black with a message (Out of Range displayed in the middle of the screen. No combination of keys frees the screen and I have to manually hold the power button on my PC to shut it down. There is no problem on start up. My computer is a dual boot with Windows 7.

    Read the article

  • How do I stack Plack authentication handlers?

    - by Schwern
    I would like to have my Plack app try several different means of authorizing the user. Specifically, check if the user is already authorized via a session cookie, then check for Digest authentication and then fall back to Basic. I figured I could just enable a bunch of Auth handlers in the order I wanted them to be checked (Session, Digest, Basic). Unfortunately, the way that Plack::Middleware::Auth::Digest and Plack::Middleware::Auth::Basic are written they both return 401 if digest or basic auth doesn't exist, respectively. How is this normally dealt with in Plack?

    Read the article

  • How to Tweet from multiple acounts with twitter Gem in Rails?

    - by Jmlevick
    I have an application wich has Oauth access using Twitter as provider. I also have the ability to ask the logged user permisson to Read and Write in his/her account and once a user authorized the app, I can send tweets as the user with something like: u = User.find(id) u.twitter.update("Some-Status-Here") in the rails console... What I want to do is to Tweet as all the users in one command, but if I try something like: u = User.all u.twitter.update("Some-Status-Here") I get this error: undefined method `twitter' for #<Array:0x00000002e2f188> How can I tweet as all the users in one command? What am I doing wrong? I feel it is a very basic thing I'm missing... Can someone help me? Thank You.

    Read the article

  • Regex to find a word, then extract a line containing the first occurence of a different word immedia

    - by Hinchy
    World's most convuluted title I know, an example should explain it better. I have a large txt file in the below format, though details and amount of lines will change everytime: Username: john_joe Owner: John Joe Account: CLI: Default: LGICMD: Flags: Primary days: Secondary days: No access restrictions Expiration: Pwdlifetime: Last Login: Maxjobs: Maxacctjobs: Maxdetach: Prclm: Prio: Queprio: CPU: Authorized Privileges: BYPASS Default Privileges: SYSPRV This sequence is repeated a couple of thousand times for different users. I need to find every user (ideally the entire first line of the above) that has SYSPRV under "Default Permissions". I know I could write an application to do this, I was just hoping their might be a nice regex I could use. Cheers

    Read the article

  • What is a valid and reasonable alternative to a massive storage approach?

    - by Backo
    I am using Ruby on Rails 3.2.2 and MySQL. After my previous question on "how to handle massive storage of records in database for user authorization purposes", since related answers (on how to solve the issue or how to accomplish to that I am looking for) aren't sufficiently detailed or require to much resources (at least for me), I would like to know what are valid and reasonable alternatives to that approach. In few words, this question could be phrase as: how to handle "complex" (at level of SQL querying) user authorizations when you have to fetch "authorized" records? That is, for example, how to retrieve records when you would use code like the following (the following code would be used mostly in index controller actions): Article.readable_by_user(@current_user) # => Returns all articles readable by the current user.

    Read the article

  • Weird keyboard problem

    - by Sebastian
    I just installed Ubuntu on an Acer Extensa 5620 laptop. The keyboard works fine except when I want to type things that require me to use Ctrl+Alt+(any key). I can't use Ctrl+Alt+(any key) shortcuts in any program, but I can open terminal with Ctrl+Alt+T. Ctrl+(any key) and Alt+(any key) shortcuts seems to work though. Also I just installed the game Heroes of Newerth and neither Alt or Ctrl keys seem to work in the game. Any answer would be appreciated!

    Read the article

  • Can't boot into 12.04, grub menu won't show

    - by Marcus
    I downloaded the Ubuntu 12.04 64bit and installed it on a 115GB partition next to a 15GB swap alongside Windows 7. I'm using a asus g73s. I have 2 drives: one with only Windows (500GB) and another with a partition for (250GB) Windows and (115GBb) the Ubuntu and (15GB) swap partitions. But after the installation, I can't find out how to run Ubuntu. It just run windows. I read that it should show a grub menu. I tried: Holding both Shift keys at boot up. Running the Ubuntu Live CD and edit the grub file. Also pressing the Esc and some function button during boot. Nothing seems to work. I solved my problem. I pressed Esc during boot and a boot menu opened and there i choosed option: P2 and than the grub menu showed.

    Read the article

  • Is It Possible for My Router to Wear Out?

    - by Jason Fitzpatrick
    Day after day your humble and hard working router holds your home network together and links it to the greater internet. Is it possible to work it to death? Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. HTG Explains: How Antivirus Software Works HTG Explains: Why Deleted Files Can Be Recovered and How You Can Prevent It HTG Explains: What Are the Sys Rq, Scroll Lock, and Pause/Break Keys on My Keyboard?

    Read the article

  • System76 Galago UltraPro keyboard?

    - by user54609
    I'm not sure whether this is the correct place to ask this question, but here it is. I am currently using the previous version of the "Gazelle Professional" laptop from System76. The keyboard does get a bit getting used to, but now I really like it, and in fact find all other keyboards puny. I find many reviews of the new Galago UltraPro criticize its keyboard, saying it is very hard to press, but from the photos, it seems to use the same kind of keys, at least with the same markings, as the GazP. Will the keyboard be any "worse" than that of the GazP? Some reviews criticize the GazP keyboard too, and certain brands (Apple) do have shockingly soft chiclet keyboards, so I'm not so sure. I certainly don't want to shell out a lot of cash and end up with a keyboard I can't type properly on.

    Read the article

  • Should I try to write simple key-value storage by myself?

    - by shabunc
    I need a key-value storage in a simplest form we can think of. Keys should be some fixed-length strings, values should be some texts. This key-value storage should have an HTTP-backed API. That's basically it. As you can see, there is no big difference between such storage and some web application with some upload functionality. The thing is - it'll take few hours (including tests and coffee drinking) to write something like this. "Something like this" will be fully under my control and can be tuned on demand. Should I, in this specific case, not try to reinvent bicycles? Is it better to use some of existing NoSQL solutions. If yes, which one exactly? If, say, I'd needed something SQL-like, I won't ask and won't try to write something by myself. But with NoSQL I just don't know what is adequate and what is not.

    Read the article

  • Can't boot into ubuntu 12.04, grub menu wont show

    - by Marcus
    Today i downloaded the ubunto 12.04 64bit and installed it on a 115gb partition next to a 15 gb swap alongside windows 7. (I have 2 drives. One with only windows (500gb) and another with a partition for (250gb) windows and (115gb) the ubunto and (15gb) swap partitions.) But after the installation i can't find out how to run ubuntu. It just run windows. I read that it should show a grub menu. i tried: Holding both shift keys at boot up. Running the cd-ubundu and edit the grub file. Also pressing the esc and some funtion button during boot. Nothing seems to work.

    Read the article

  • What reference point/ tutorial could I use to help me make a "Ball rolling" game in flash?

    - by user1798964
    I am a complete newbie to programming, only took high school Computer science so I kind of know what im doing, I just want to know how I can make a ball rolling game that I want to make, could anyone show me an example of a good "ball rolling game" that has good physics and everything, I have tried to use Box2D for the physics portion of the game, but I found that using that is just code and I can't figure out how to make the graphics and details of the world I want to make in my game, all I would like to do would have a game that has the collision detection and physics of box2d only apply to one ball in it and use the left and right keys to move it. sorry if I am too unclear, if anyone could show a tutorial or something to me on how to make a proper "Ball rolling" game that has good physics that would be appreciated, thank you for taking the time to read this

    Read the article

  • asp.net mvc - limit access to web pages

    - by niao
    Greetings, in my asp.net mvc application what i would like to do is to enable access to some pages only after user was successfully authorized. I have already created custom membership provider and that works fine. How can I, in web config create such rule - for instance for all pages in ~Admin/ folder? I don't want to create on every controller's action the validation code. For now i have in my web.config the following statement: <location path="~/Admin"> <system.web> <authorization> <deny users="?"/> </authorization> </system.web> but it doesn't work.

    Read the article

  • The Path to Best-In-Class Service Business Performance

    - by Charles Knapp
    What would it matter to offer your customers best-in-class service and support experiences? According to a new study, best-in-class companies enjoy margins that are nearly double the average, retain almost all of their customers each year, deliver annual revenue growth that is six greater than average, and realize cost decreases rather than increases! What does it take to become best in class? Some of the keys are: Engage customers effectively and consistently across all channels Focus on mobility to improve reactive service performance Continue to transition from primarily reactive to proactive and predictive service performance Build the support structure for new services and service contracts Construct an engaged service delivery team Join the Aberdeen Group, Oracle, Infosys, and Hyundai Capital as we highlight the key stages in the service transformation journey and reveal how Best-in-Class organizations are equipping themselves to thrive in this new era of service. Please join us for "Service Excellence and the Path to Business Transformation" -- this Thursday, October 25, 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT | 4:00 PM BST.

    Read the article

  • Move sprite in the direction it is facing?

    - by rphello101
    I'm using Java/Slick 2D. I'm trying to use the mouse to rotate the sprite and the arrow keys to move the sprite. I can get the sprite to rotate no problem, but I cannot get it to move in the direction it is supposed to. When I hit "forwards", the sprite doesn't necessarily move towards the mouse. I'm sure there has to be some standard code for this since many games use this style of motion. Can anyone help me out with what the trig is supposed to be? Thanks

    Read the article

  • Authorization/Licensing of Webservice

    - by Burhan
    I have developed a web service which accepts the login credentials from the XML message passed to it. I have concerns over this method as the developer who consumes the service can easily share the login credentials and my service can be called from some other application that uses the same credentials. Is there any way that I can issue a 'license' to some specific applications? So that, even if credentials are shared among the consuming apps, only authorized ones can successfully consume the service. P.S: I thought about implementing IP restrictions but that doesn't serve the purpose as we may have different applications installed on a same server (we do have such a scenario implemented).

    Read the article

  • Key Handling mechanics

    - by Max
    I am new to game development and am working on my first game using OpenGL and C++. I have a game class which handles everything necessary in an update() function. Now i want to handle keyboard inputs. I use GLFW which supports key callbacks. However i wonder how to deal with inputs. Should i record the keys pressed and poll on it the next time my game updates or should the callback immediately perform the necessary actions? And why? Thanks :)

    Read the article

  • Intuitive "Take Screenshot" key mapping used by games?

    - by Hatoru Hansou
    I recently had a problem testing my game on Linux Ubuntu. The Print key is intercepted by the desktop environment and It never reaches the game. Rather than fighting this, I will simply use any other key or key combination to trigger the screen capture functionality. Now, using the PRINT key is very intuitive because people already expect this behavior. What other keys are a good idea to use to take screenshots? And if possible elaborate why, have other apps/games used that key?

    Read the article

  • Can't use method return value in write context; Not sure where to go from here

    - by Morgan Green
    This is my source for the variable. <?php if ($admin->get_permissions()=3) echo 'Welcome to the Admin Panel'; else echo 'Sorry, You do not have access to this page'; ?> And the code that I'm actually trying to call with the if statement is: public function get_permissions() { $username = $_SESSION['admin_login']; global $db; $info = $db->get_row("SELECT `permissions` FROM `user` WHERE `username` = '" . $db->escape($username) . "'"); if(is_object($info)) return $info->permissions; else return ''; } This should be a simple way to call my pages that the user is authorized for by using an else if statement. Or So I thought

    Read the article

  • Integrate existing Spring based web application with a CMS

    - by anne_developer
    We have stable spring based (spring 2.x) web application. We have a new requirement which is our data entry operators should be able to login to some kind of an admin module and simply change the text in the web pages, change the color etc. I have seen PHP based CMS’s that allows authorized user to change the content in WYSIWYG manner. If anyone of you knows such open source Java CMS or third party application, which can facilitate such thing, please let me know. Please note: we cannot write our application from scratch. We are looking for pluggable component.

    Read the article

  • How do I get my Mac to boot from an Ubuntu USB key?

    - by user11621
    If you select "USB" and "Mac" on this download page, it gives a series of command line instructions to make a USB key which the MacBook will boot into Ubuntu from. I've followed them to the letter two or three times on different USB keys, and it doesn't work. There's a very great deal of technical discussion about EFI etc. but this set of instructions seems to suggest it should just work, but it doesn't. Help? I'm increasingly unhappy with the more locked-down approach Apple is taking, and I'd quite like to start using Linux with a view to transitioning over to using it as my main operating system, but booting from the CD takes forever, runs slowly and I'm really hoping to get it moving off USB. Can anybody help me?

    Read the article

< Previous Page | 111 112 113 114 115 116 117 118 119 120 121 122  | Next Page >