1. XML DOM
How good is the XMLDOM at keeping data integrity when faced with concurrent requests?
With the unreliability of Access I am using XML more and more, but do not really know how good it is in this situation. Is using Application.Lock() good enough to make sure there is no corruption when multiple users are making changes to the same document?
If it is, then I can use XML in place of Access - when SQL Server is out of the price range of my client.
2. Secure logins
One of my hosts tells me .htaccess is a unix only concept - even though one of my other hosts provides this on IIS/4.0!
So what is going on? Either IIS is beng run on a linux server, or the guy is not telling the truth.
Can .htaccess be run on an NT Server?
If not, then what is the best way to produce secure admin log-ins for example. Is the only option a secure connection, or is ASPEncrypt reliable enough?
I am aware that this is done quite often with no protection for the submission - is this just a statistical thing?
Like there is so little chance that someone would intercept that it is not worth taking any securoty measures?
What is your usual aproach to this problem?
Kind Regards,
Ben.
How good is the XMLDOM at keeping data integrity when faced with concurrent requests?
With the unreliability of Access I am using XML more and more, but do not really know how good it is in this situation. Is using Application.Lock() good enough to make sure there is no corruption when multiple users are making changes to the same document?
If it is, then I can use XML in place of Access - when SQL Server is out of the price range of my client.
2. Secure logins
One of my hosts tells me .htaccess is a unix only concept - even though one of my other hosts provides this on IIS/4.0!
So what is going on? Either IIS is beng run on a linux server, or the guy is not telling the truth.
Can .htaccess be run on an NT Server?
If not, then what is the best way to produce secure admin log-ins for example. Is the only option a secure connection, or is ASPEncrypt reliable enough?
I am aware that this is done quite often with no protection for the submission - is this just a statistical thing?
Like there is so little chance that someone would intercept that it is not worth taking any securoty measures?
What is your usual aproach to this problem?
Kind Regards,
Ben.