Web.Config Transformation Features in Visual Studio 2010

Introduction Web.config files typically include settings that have to be different depending on which environment the application is running in. For example, you might have to change a database connection string or disable debugging when you deploy a Web.config file. For Web application projects, ASP.NET provides tools that automate the process of changing (transforming) Web.config

Online QR Code Generator

QR Code A QR code (abbreviated from Quick Response code) is a type of matrix barcode (or two-dimensional code) first designed for the automotive industry. More recently, the system has become popular outside of the industry due to its fast readability and comparatively large storage capacity. The code consists of black modules arranged in a

Get Object Names Based on Parameter

If we now the parameter name and want to know the Objects using that parameter then in that case we can use the below stored procedure to retrive the Object Names /*********************************************************************** * Author : V.U.M.Sastry Sagi * Date   : 11/16/2011 * Purpose: Returns all Objects including SPs and Functions based on            given parameter

SP_Depends Wont Work

I had observed that sp_depends wont work properly in many scenarios. So i had wrote this code to fetch the dependent objects on a table. /*********************************************************************** * Author : V.U.M.Sastry Sagi * Date   : 11/11/2011 * Purpose: Returns all Objects Dependent on a table ***********************************************************************/ CREATE PROCEDURE spDepends     (       @TableName VARCHAR(100)     )

Cross Site Scripting update for ASP.Net 4.5

Introduction to XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out