You can also use the Excel COM object and interact with the Excel program directly to insert your data. This does require that you have Excel installed on the server that is running the script, though.
Here is some code that I wrote when learning VBScript, then modified to work with PHP...
Thanks for the advice.
That was relatively painless for both of us; especially since I needed more work done and could place an order at the same time as refusing the quote.
I have only recently been in a position of enough authority to request, approve, and decline quotes for services. Since I've never actually done this before, then, I'm in a bit of a pickle.
It's easy to accept a quote, but how do I go about declining one, especially when I need to continue...
I'll back up feherke here. We use FPDF to dynamically generate setup documentation for our clients depending on their client id number, location, and service center. It has saved us a lot of time and effort, not to mention printing costs.
Cell phone transmissions are only more secure because they are more difficult to intercept. If you want to read all the data on a wireless lan and attempt to decrypt it, there are lots of tools that you can use to do that with relatively cheap hardware. If you want to do the same to, say, DECT...
http://technet.microsoft.com/en-us/library/cc787567%28WS.10%29.aspx
There is the list of all the types of logon events that can be logged into the Security log. If you are looking for local access, you want 528 events, if you want network access they're 540 events.
If you are interested in seeing how this works, read the Wikipedia article on SMTP. In the example you will see where the "From" address is submitted and how easy it is to spoof it.
In case anyone doesn't know, Stretch over at PacketLife has finished migrating to his new site and has made his CCNP notes available. These are a great resource for anyone studying to pass that exam.
http://packetlife.net/library/notes/
Just FYI, on Windows XP (and Server 2003, Server 2008, Vista, etc) you can use the command "netstat -nao" to get a list of all the ports open and the PID of the process that is using it. You then match up the PID with what's reported in Task Manager to see what program it is.
I have two SonicWall Pro 3060s that I'm trying to create a site-to-site VPN tunnel between. One (192.168.b.1) is running SonicOS Enhanced and the other (192.168.c.1) is running standard. The VPN is up and passing traffic and it seems to be very stable, but the logs are filling up with the...
I've read the Microsoft guides on best practice and I know how to do it, but those are for an ideal circumstance. Has anyone here actually done this across an entire network, and if so, are you willing to share your story so I can go in with my eyes a bit more open? Thanks in advance.
I found a blog entry about compiling an extension using Visual Studios C++ as well: http://blog.slickedit.com/?p=128. Of course, when I tried it I had errors because some header files were missing. Off to get that fixed, too.
@ingresman - Thanks for looking, and glad to hand out some info while looking for help.
@jpadie - I can't seem to find fink for windows. Google gave me pdb.finkproject.org, and they seem to only work with Mac OS X.
I've looked around, but I can't seem to find a reputable place to get a .dll of the gpgme extension for PHP on Windows. I don't have the tools or knowledge to build it myself. Anyone have a suggestion on how to enable these functions on Windows?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.