Tutorials to .com

Tutorials to .com » Dotnet » Webservice » .Net WebService

.Net WebService Articles


241: How to create and use Web Service proxy class
How to create and use Web Service proxy class Web Service Agent is to support. Net programming language files, from. Net framework tools automatically generate the WSDL. Deputy category does not contain any application logic. Instead, he included o...

242: A modified configuration appSettings section in web.config function
XmlDocument to use this function to resolve the main web.config. And SelectSingleNode () method to locate the configuration section to be amended. It should be noted that the final procedure Save (), therefore, apsnet your account must have write pe...

243: The use of BizTalk Adatper for Web Service in the strategy and skills
In the use of BizTalk Adapter for Web Service of EAI solutions, different components have been separated from the completion of a unified integration of business logic. In solution, various components must work together very well. There are two key ...

244: Of and actual Web Service
A brief introduction of SOA and personal understanding of the WebService. On a specific project implementation process introduced a number of issues requiring attention Cited article: (1) http://webservices.xml.com/pub/a/ws/2003/09/30/soa.html (2...

245: zt: Consuming Webservices over HTTPS (SSL)
When Webservices are used, a common concern is security: SOAP messages are transferred in plain text over the network, so anyone with a sniffer could intercept the SOAP message and read it. In my opinion this could happen also to binary data, but pr...

246: . Net to remove data before the detection of foreign key conflicts
In the preparation of a database system in order to ensure consistency of data in the system and secure the most convenient way is in the DBMS to create foreign key constraints, but the primary key to delete data if a violation of foreign key constr...

247: The use of SOAP message encryption WSE (2)
After an encrypted SOAP message The following sample SOAP message there is a payment node, contains a number of sensitive customer information. OAP: Envelope SOAP: xmlsn = "http://www.w3.org/2002/12/SOAP-envelope"> <SOAP:Header>...

248: WSE use SOAP message encryption (3)
WSE support for encryption WSE support part of SOAP message encryption. Symmetric encryption using a shared key, support the use of asymmetric encryption x.509 certificates. When using WSE to encrypt SOAP messages, the entire contents of the node b...

249: The use of SOAP message encryption WSE (4)
Encryption of external messages sent Here, I briefly describe how to create a can return to have been encrypted Web services XML documents. The first step in using the first indicator used to add the necessary namespace, as follows: using System.W...

250: WSE encryption using SOAP messages (5)
Decrypt the message received Whether the client or the server side, WSE always achieve SecurityInputFilter decrypt messages, and as a result of the need for symmetric encryption public key derived from the encryption key, you need to create a Secur...

251: WSE encryption using SOAP messages (6
Encryption of external messages sent I have modified the GetXmlDocument previous methods, it can be used by WSE to achieve asymmetric cryptography based on X.509 technology. In response to message encryption, FindCertificateBySubjectString method c...

252: WSE use SOAP message encryption (7)
To decrypt the message received Upon receiving a certificate by the X.509 message encrypted after, SoapInputFilter will automatically try to use the user-key storage room for the private decryption key, of course, the need to tell the WSE runtime W...

253: WSE encryption using SOAP messages (8)
WSE is the following in the run-time serialization of the message after the result of encryption <? xml version = "1.0" encoding = "utf-8"?> <soap: Envelope xmlns: soap = "http://schemas.xmlsoap.org/soap/envelope/...

254: Meeting the Client / Server model of regression
In the PC before, people are using the thin client, and connected to the terminal on the mainframe without any processing power, is responsible only for display and input, all the actual work completed to the server, thin client which is of course y...

255: WEB application of the progress bar
WEB application of the progress bar Julien Cheyssial writing on 2003/10/01 Joise.LI translated and modified 2004-4-2 EDITORIAL: The original is what I need to use the progress bar at the time to find an article with examples to explain in detail...

256: vb.net Programming Practices (1)
Introduction: Kent Beck once said, "I just pay more attention to the procedural norms of programmers only" Contents: Preface Normative descriptive document Notes the process of normative Notes function norms Naming convention Design...

257: . net + oracle + crystalReports Development Study Notes web applications (a)
here to remind you of several problems A configuration. Net, debugging web applications If the installation disk is FAT32, must change the IIS settings, IIS-> default web site (right) -> All Tasks -> Configure Server Extensions If the in...

258: WalkThrough - SharePoint WebPart Getting Started Guide (a) (b)
Two WebPart write on the Getting Started Guide WalkThrough, would like to help in the development of SharePoint the WebPart rapid entry friends. Contains the following elements: The concept of WebPart; In VS.NET in "visualization" to cr...

259: WalkThrough - SharePoint WebPart Getting Started Guide (a) (b)
Two WebPart write on the Getting Started Guide WalkThrough, would like to help in the development of SharePoint the WebPart rapid entry friends. Contains the following elements: The concept of WebPart; In VS.NET in "visualization" to cr...

260: Encoding the information in the web.config
We all know web.config connection string can be saved, we are also in the process of doing so, web.config is XML, so it has a clear structure, we can easily read it, but it is also a We databases completely exposed to the views of the document, and ...


Page 13 of 14
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]   [9]   [10]   [11]   [12]   [13]   [14]