首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
主要介绍了应用ODBC技术进行数据库开发的基本方法,并结合OR ACLE数据库和VC++讨论了长数据类型存储的关键技术问题。  相似文献   

2.
本文介绍了在C Builder编程环境下配置开放式数据库互连(Open Database Connectivity,ODBC)数据源的基本原理,以及ODBC数据源和Windows注册表之间的关系,并给出了实现ODBC数据源自动配置的C 源代码。  相似文献   

3.
在局域网中传输文件,配置一台FTP服务器是非常方便的,例如利用专业的FTP服务器端软件Serv-U来配置。但普通设置的用户登录时是明文传输的,在网络中利用简单的嗅探软件就可以很容易地获得每个用户的登录密码、他所下载的文件等重要信息,显然是不符合安全规定的。  相似文献   

4.
张江  刘旭  陈贵云 《信息技术》2002,(12):66-67
介绍了在PB中利用登录窗口动态生成数据库连接代码,然后再连接数据库,来提高多用户的大型数据库信息管理系统的安全性。从而实现数据库操作权限因用户有所不同,完成用户的确认与权限管理。  相似文献   

5.
地理信息系统在海口市电信局的应用   总被引:1,自引:0,他引:1  
徐磊 《电信科学》1999,15(12):39-40
本文首先介绍了海口市电信局开发的通信网络地理信息集成系统的结构,组成该系统的各个子系统的功能,最后介绍了地理集成系统在电信管理中的应用。  相似文献   

6.
本文针对实际应用,将数据库加密技术与一个基于Web的应用系统相结合,实现了数字电视用户远程缴费加密系统,并对该系统进行了安全性测试。最后通过对系统的特点进行分析,表明系统已满足预期设计的的目标,满足了安全性的要求。  相似文献   

7.
某单位配置了一台文件服务器,为网络中提供共享文件夹服务,采用域用户登录到计算机。在准备将用户加入到域时,发现单位的大多数计算机都是Windows XP HOME操作系统,不能加入到域。没有加入域的计算机,如何修改自己的域用户密码呢?  相似文献   

8.
简要介绍了如何利用计算机与交换机结合的方法,批量得到 M S I S D N 号和 I M S I号。  相似文献   

9.
针对当前行业信息化过程中普遍存在的各系统彼此孤立、用户信息维护分散等核心问题,提出了统一用户环境下的集成门户应用模型。模型以统一用户管理为核心,对各异构子系统进行集成改造并实现单点登录,降低了用户系统资源的维护成本,提升了整体办公效率。  相似文献   

10.
首先分析了批量开通用户GPRS功能所带来的问题,然后提出了通过监控GPRS用户的行为并根据用户行为有针对性地采取措施来引导用户的网络优化新思路,最后详细介绍了重庆移动GPRS用户行为监控系统的实现以及应用效果。  相似文献   

11.
介绍了ADS与ODBC(开放式数据库互连)在AutoCAD R14.0计算机辅助设计软件二次开发中的运用,并通过此设计方式架起了工程数据库与关系数据库间的桥梁,为实现以数据库技术为核心的产品数据共享目标提供了坚实的基础。  相似文献   

12.
Delphi 5数据库应用中ODBC数据源的自动管理   总被引:2,自引:0,他引:2  
分析了ODBC数据源设置的原理以及ODBC数据源和Delphi数据库别名的关系。并在此基础上,介绍了在Delphi5数据库应用程序安装、运行中,如何编程实现ODBC数据源和Delphi数据库别名的设置。在应用于杭州市交警支队违章数据中心管理系统时,收到了良好效果。  相似文献   

13.
介绍了以AutoCAD2000为平台,以Visual C^ 6.0为开发工具,用Access2000建立数据库,运用ODBC数据库访问技术,实现ObjectARX程序与数据库的连接。  相似文献   

14.
麦苗  罗辞勇 《信息技术》2003,27(3):75-76
介绍了VC++数据库开发中的MFC ODBC技术,并讨论了如何使用MFC ODBC类访问数据库的编程。  相似文献   

15.
周熠 《信息技术》2003,27(8):70-72
ASP技术由于其方便 ,灵活及可扩充性等特点和简明、高效的技术优势 ,在Web数据库的开发中获得了广泛的应用。简述了开发Web数据库的重要性 ,介绍了ASP技术的特点及其数据库访问原理 ,ADO对象。实例介绍了ASP实现医院门诊在线查询的方法  相似文献   

16.
In the authentication scheme, it is important to ensure that the user's identity changed dynamically with the different sessions, which can protect the user's privacy information from being tracked. Recently, Chang et al. proposed an untraceable dynamic identity‐based remote user authentication scheme with verifiable password update. However, our analysis show that the property of untraceability can easily be broken by the legal user of the system. Besides, we find the scheme of Chang et al. vulnerable to offline password guessing attack, impersonation attack, stolen smart card attack, and insider attack. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

17.
A dynamic user authentication scheme allows a user and a remote server to authenticate each other without leaking the user's identity. In 2011, Wen and Li proposed an improved dynamic ID‐based remote user authentication with key agreement scheme for mobile and home networks. They claimed that their scheme was more secure than the scheme of Wang et al. However, we demonstrate that their scheme is vulnerable to the privileged insider, off‐line password guessing, impersonation, and server spoofing attacks. At the same time, it does not provide any user anonymity and forward secrecy property. Thus, it is not feasible for real‐life implementation.Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

18.
Recently, Chang et al. [Chang Y, Tai W, Chang H. Untraceable dynamic identity‐based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2013; doi:10.1002/dac.2552] proposed a dynamic identity‐based remote user authentication scheme with verifiable password update. They also proved that their scheme could withstand various attacks. Unfortunately, by proposing concrete attacks, we show that their scheme is vulnerable to three kinds of attacks. We also point out that their scheme cannot provide untraceability. The analysis shows that the scheme of Chang et al. is not suitable for practical applications. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

19.
Information technology is transforming different areas, such as rehabilitation, in such a way that serious games are finding a use as an alternative in hearing therapies for children with cochlear implants, creating a motivating experience in children. As a result, the design of products oriented to children depends on the skills they have to interact, because if they have a better user experience they may have a better learning experience. Most existing methods of assessment are aimed at adults, although some have been adapted for children with special needs, including children with cochlear implants. This article presents a methodology for User Experience Assessment (UXA), that provides support for following the necessary guidelines and choosing techniques adapted to the characteristics of the child with cochlear implant. The methodology has been applied in a case study with 23 children with cochlear implants in the Institute for Blind and Deaf Children in Colombia, where different methods have been used and adapted to assess the user experience.  相似文献   

20.
Three‐party password‐authenticated key exchange (3PAKE) protocols allow two clients to agree on a secret session key through a server via a public channel. 3PAKE protocols have been designed using different arithmetic aspects including chaotic maps. Recently, Lee et al. proposed a 3PAKE protocol using Chebyshev chaotic maps and claimed that their protocol has low computation and communication cost and can also resist against numerous attacks. However, this paper shows that in spite of the computation and communication efficiency of the Lee et al. protocol, it is not secure against the modification attack. To conquer this security weakness, we propose a simple countermeasure, which maintains the computation and communication efficiency of the Lee et al. protocol. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号