- read the "keysize" section
http://help.adobe.com/en_US/ColdFusion/9.0/CFMLRef/WSc3ff6d0ea77859461172e0811cbec22c24-6e72.html
JCE policy files for Java 7
http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html
JCE policy files for Java 6
http://www.oracle.com/technetwork/java/javase/down
rds, etc, etc.
> In large applications the problem is not with Access, the problem is with the
> designer who chose the wrong solution.
If you're building a web application and you choose Access, you chose
the wrong solution. It may not be the end of the world, but it's not
the b
aimed properly when the records are
deleted.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction
CF 11 makes it a lot easier.
>
> Interesting. Can you provide an example where that'd be useful?
Building ready-to-run zip files with sample apps, deploying on
developer workstations without admin rights.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://tra
ou can just unzip CF into a directory - no admin
rights needed - and run it as an application. You could do that before
with a little bit of tinkering, but CF 11 makes it a lot easier.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Soft
sure whether John's using this in an element
or an attribute.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
)
> VALUES
> (
> ,
>value="#qry_emailToPK.emailaddress#">
> );
>
>
> SELECT IDENT_CURRENT('#request.sqlobjectprefix#
> TblEmailRecovery') as mynewidentity;
>
> go
>
Are you sure this table even has an identit
but will try to put
something together later today.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at ou
estly, I'd also recommend any of these approaches over CF's
script protect, which is very weak.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides t
iables I want to allow as an
> exception?
You could probably do this by adding conditional logic in
Application.cfc that turns the feature off for a specific list of
pages. Otherwise, you could put the problematic pages in a separate
directory and give them their own Application.cfc.
Dave Watt
l that generated code and had to maintain it and wished someone had
told him what a mistake that would turn out to be. Lots of us wish we
could go back in time and tell our younger selves not to do things
that seemed perfectly reasonable at the time, but turned out to be
huge mistakes.
Dave Watts
> Would I need two CF server licenses for this...?
No, just one Enterprise license.
> Also, this is CF Standard we're talking about. Does Standard do multi-server?
No.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf
nces,
dedicate one instance to each site, and control the resources
available to each instance.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest cali
s suggesting earlier... an enormous security risk.
By default, you can't even do that in a static HTML page. The only way
to solve this problem is with a combination of client-side code and
browser configuration to allow this clearly unsafe code to run.
Dave Watts, CTO, Fig Le
off to a customer etc.
>
> It seems that cfexecute will spawn on the ColdFusion server... but how to
> do this on the users desktop?
ColdFusion can't do this, for obvious security reasons. Client-side
executables, like Java, ActiveX etc can do this, but the user would
have to exp
> Thanks for explaining that.
You're welcome!
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instructio
tup as J2EE which is what most people did for CF9, as I
> believe.
I don't think most people did that, actually. But maybe they should have!
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small
the requested WSDL document to ensure it
> is correct.
Have you tried using a web browser from the server running CF 10 as
suggested? It could be a networking problem unrelated to CF.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf
er CF9.
It turns out you only get this if you install on a 32-bit OS. You
might find this useful:
http://forums.adobe.com/thread/1225802?tstart=0
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small
> I'm still unable to get past that error "The ColdFusion ODBC Server service
> is not running or has not been
> installed.
Is the service running?
> You may also use the "MS Access with Unicode" driver to connect to MS Access
> datasources."
Have yo
direct.dll which I think is right.
>
> BTW, this is IIS 7.5
You might also need to check the various IIS config files:
applicationHost.config, system.config, web.config.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a
ou send questions to it, people can
answer those questions however they like. I think that this is still a
useful suggestion, especially if you're not that familiar with IIS.
You are, of course, free to disregard that suggestion, but you can't
stop people from making it in the first place.
Dave
uilt-in web server as it would with IIS. And if you mean something
else, you could use IIS to test that something else and use the
built-in web server to test CF.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Ow
ment anyway? Why not just use
the built-in web server? This will save you a lot of trouble with
setup, etc.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provid
license - if
you're using developer, trial or enterprise you're ok here. If you're
using standard, you can remove the license key to get it to become a
trial version.
4. Uninstall CF 10 entirely - you could probably get around this, but
why bother at this point.
5. Uninstall or dis
u the number they
contain. But custom apps can invoke the barcode scanner app, read the
number, and do something with it, like Google Shopper does.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Busines
used to create the
variable name. You can build literal strings from CF expressions:
That's what Bobby did in his example.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) o
> Right. Usually, it runs serially just fine. With this production URL, it
> behaves in the way I described.
I would then assume that this production URL is taking much longer to complete.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figle
nd CF gets a completed response, the loop won't go to the next one.
You can avoid this by using CFTHREAD, although that may cause other
problems if you're not careful - I'm not sure I'd want to use 90
threads in a production environment.
Dave Watts, CTO, Fig Leaf Software
1-2
end that you don't just plug these in - read a
bit about them first. Oracle has a bunch of docs about heap sizing,
etc. You might actually want to profile your JVM too, to see what's
actually going on.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.f
the young and perm generations? If not, you
might want to set them.
All that said, you might also want to switch to SAX parsing if you're
working with extremely large XML files. SAX parsing is (in my opinion)
a lot more programming work, but it's designed to let you solve this
sort of
le website vs an app. In a native app I am sure it's
> possible, the mobile site I am still unsure.
If you're building a native app on Android, you can certainly do this
with the ZXing library:
https://github.com/zxing/zxing
I don't think you'll be able to do that with a m
> > QR codes can launch a specific URL in the mobile browser. Is that what
> > you're trying to do?
>
> Thanks Dave.not exactly, but that does spark another idea. Any idea
> if the URL can specify URL params as well (I assume so...just have not
> really use
ecific URL in the mobile browser. Is that what
you're trying to do?
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vend
ether it was needed.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers
ever is available if it needs to
use it, but heap size is completely controlled by the JVM.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest
asic
Authentication instead of Integrated Windows Authentication (Kerberos,
NTLM).
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest calibe
ses, or
has some other issue with the downloaded JAR file.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruc
this
URL?
http://your_server/CFIDE/classes/cfapplets.jar
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instr
ou think vulnerabilities don't exist for other products, through
"widely published methods well known by the hacker community", I don't
know what to tell you. If you install any application that will be
exposed to untrusted networks, you are expected to apply basic due
s have better things
> to do with their time.
The long list of security measures is a list rather than an automated
script because not everything in that list applies to every install.
If your job is to administer a given system, you do not have anything
better to do with your time than to learn
tus codes. So it is useful to have some additional
logic to deal with soft 404s if you're testing against unfamiliar
servers.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GS
I run into this quite a bit working with the Google Search Appliance.
The GSA relies on status codes by default to identify which pages to
index. While it's possible to give it a way to identify soft 404s
(http://en.wikipedia.org/wiki/HTTP_404#Soft_404), it's much easier
just to have real 4
if you leave the windows open.
I think we might be in agreement! But maybe for different reasons.
Setting up application servers to be secure is hard. Ensuring that
application code doesn't contain vulnerabilities is hard. And you're
not going to be able to solve security problems with an inst
> Dave, I am curious. Have you ever, even once, changed your mind because of
> what someone has told you?
Since you ask, sure, all the time. I respond to evidence and logic. I
just don't think those two things support your position as strongly as
you think they do.
Dave Watts, CT
> files to be uploaded, which could then be executed as they had cfexecute
> and cfregistry enabled.
So what you're saying is that, despite the fact that the environment
was (more) secure by default, developers accidentally wrote
exploitable code?
I have the feeling there's some
ult install state on an untrusted network - that IS the sysadmins'
fault. How is a sysadmin going to make sure that the developers'
applications are secured properly, if he doesn't know enough to secure
the one web application that's packaged with the product?
Dav
omer in the top 10k Netcraft ranking doing
exactly that, using IIS and CF internally, and exposing them to public
access only through reverse proxies.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Sma
out that way. The fact that things worked by default gave
Windows market share.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vend
. And I think Microsoft server products got quite a bit of
market share for "just working" out of the box. I don't know how
successful they'd have been if they'd originally been more like Unix
servers.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.co
cess easier, but I think those things might also have unintended
consequences - breaking existing applications, etc. In the end,
security is going to rely on the knowledge of the administrator and
developers.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.
es Windows web servers. After
all, that's how Unix web servers always worked, pretty much. You had
to know what you were doing to get them working. I can see now why
Windows never got any market share.
(note: this is not an endorsement of one or the other, just an observation)
Dave Watts, CTO,
#x27;re not exposed to untrusted networks. And it's not as if this is
a binary thing: locked vs unlocked. There are different levels of
"locked" that are appropriate for different use-cases and
environments.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
h
at install time.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers, o
cess to a
web application.
I'm not sure I see much difference there. Either way, someone needs to
know how web application security works. If you're in the business of
building web applications, this is a fundamental part of your job.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
#x27;s up to you to
understand how web servers and web applications work, and set it up
properly after it's installed.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule,
idea of what locked down means than I do.
Adobe is responsible for vulnerabilities in the CF Administrator, but
you are responsible for ensuring that the CF Administrator isn't
exposed to untrusted networks. It's a web application, just like any
other.
Dave Watts, CTO, Fig Leaf Software
1-202
h. And it's easy to
go back and install additional items later.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-autho
's nothing
stopping you from installing in on a personal machine, then just
zipping up the files and copying them to another machine. You may need
to set a JAVA_HOME environment variable - you can do this using a
batch file when you start your Java and/or Groovy programs.
Dave Watts, CTO, Fig
applications in the new environment, and move old
applications to the new environment when they need significant changes
that would be expensive to implement even in CF.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Vete
ables do require CFID and CFTOKEN.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training c
your server should
only be using one or the other, but if you have multiple CF servers in
the same domain, it's possible that one is using J2EE sessions while
the other isn't.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Lea
#x27;re using J2EE sessions, you shouldn't have
cookies for CFID and CFTOKEN.
> We have also started to use trusted cache more extensively recently, but my
> sense is that is not involved here.
Your sense is correct - all this does is prevent CF from checking to
see if files
carefully.
Most of these security guidelines are fairly vague, and are not really
that testable as a result.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and prov
CKEND_DSN.
I don't think there's a hard-and-fast rule here, but it seems to me
like you'd be ok if you simply handled queries that perform
admin-specific tasks with a separate datasource. Queries that are used
by both administrators and users could be handled by either
datasource.
D
S, etc.
You don't have to have different database user accounts to comply with
the DoD STIGs, but you should separate administrative access from
regular user access wherever possible according to the STIGs, and
using different user accounts (and therefore datasources) is a good
thing to do to ma
log
in again if you're using J2EE sessions even if the session would not
have expired otherwise.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provid
es that I've found
legacy code that worked well in one version of CF, but no longer works
well in another version.
In summary, I recommend you just choose the simplest approach - in
this case, the first one - because it will be easy to understand and
will work adequately well
/);
- go back to the restricted area:
-> browser sends both cookies.
The best solution, in my opinion, is to switch to J2EE sessions,
assuming you can invest the time and effort to do that.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig
> Dave, this is an interesting idea which we haven't pursued yet. I don't
> have a clear sense of how the server configuration would work here. Would
> you have two separate db servers (one for authored content and one for
> published content) that would sync up? Or would
> I'm very interested in your feedback on best practices when 1) trying to
> mitigate risk of XSS and other hacks while 2) providing CMS functionality
> that includes a web editor that clients use to publish web pages.
> For example, there are many tags like
rum. Fortunately, it's easy to create a Google account
corresponding to any given email address, whether you're using Gmail
or not. You'd have to provide instructions to your users on how to do
that, but it's very simple - just choose "I prefer to use my current
email addre
uot;one long document" with no page
breaks. PDF is intended to simulate an actual piece of paper, so you
have to set a specific page size.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (
> However, there is now a restriction on the extension for the log file. It can
> only be .txt or .log, for so called secirity reason (?).
This is also true in CF 9.0.2 and may be true in the latest CHF for 9.0.1.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com
recommend you spend
more time trying to figure out what the problem is - if there's a
problem at all - before you start looking for solutions to the problem
you've not yet defined. Right now, your problem definition is "it's
slower than I think it should be". You ne
.
And, as Russ mentioned, ping and HTTP times aren't connected in any useful way.
Dave Watts, CTO, Fig Leaf Software
1-202-527-9569
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber ve
ded Flash Media Server
functionality if you're not using it. I'm not sure how to do this
offhand, and I don't have a copy of CF handy.
I don't think you can upgrade the embedded version of Flash Media Server.
If all else fails, you could just block access to the ports used by
F
mmendation to use mixed mode authentication
instead - it's generally just a lot easier. But if you absolutely,
positively have to use Windows authentication, follow the steps
described here:
http://www.cfuser.com/windows-authentication-sql-server-and-coldfusion/
Dave Watts, CTO, Fig Leaf Software
1-
e calls to either java or cf components
While you can load a jar file from within CF, that's not the same as a
J2EE application. A J2EE application is a war or ear file deployed
within a J2EE server. But once you install CF on a J2EE server, you
can use CF just like you would any other J2E
;s going to be a separate application.
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers, o
Cool!
Now, how about brackets for a single elimination tournament beginning with
the sweet sixteen? (Or has this already been posted?)
Dave
-Original Message-
From: Chad Gray [mailto:cg...@careyweb.com]
Sent: Tuesday, February 4, 2014 3:30 PM
To: cf-talk
Subject: RE: setting up team
Using Macromedia Homesite+
I have no idea why but the snippets tab at the bottom of my resource window
suddenly disappeared. Under "View", "Resource Windows" all choices are
grayed out. Can anyone tell me what might have happened?
Anyone know how to create a PDF document in grayscale? We have a web page that
we give the user the ability to create a PDF of the page. The client doesn't
want any of the color that we have in our table columns to print in color.
I did a quick search on google, doesn't seem to be way to te
> I tried that, and it did not make a difference. I still get the
> informational message with option on or off.
What happens if you call it with CFSTOREDPROC, and specify two
different recordsets?
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com
red procedure with the hard coded SQL statement, so the problem is
> definitely how CF is handling the returned
> result from the DB server.
You can disable this functionality on SQL Server:
http://technet.microsoft.com/en-us/library/ms187914.aspx
Dave Watts, CTO, Fig Leaf Software
http://ww
ults to a file, then open
the file and see what's in it.
Also, I'd make sure that CF is actually sending UTF-8 output. What do
you see in your HTTP response headers?
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veter
> So far, I've gotten recommendations for:
>
> Hostek
> Viviotech
> CrystalTech
> http://www.kickassvps.com/
Edge Web Hosting - we've worked with them for many years, and they
handle a wide range of customer needs and know what they're doing.
Dave W
t;
> But I stll can't connect to localhost:8501
If it's listening on TCP/80, as it appears to be on your computer,
that typically means it won't be listening on TCP/8501 or any other
non-standard port. If, during install, you choose to connect CF to IIS
or Apache, CF's built
certificate
chain installed. That has nothing to do with CF needing the
certificate(s) installed. I recommend you install the entire
certificate chain there too, just to avoid potential problems.
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Softwa
> That's only necessary if the certificate from the LDAP server isn't
> signed by a known CA. (e.g. it's self-signed.)
... or signed by a root CA that's not in the keystore - this happens
fairly commonly in my experience.
Dave Watts, CTO, Fig Leaf Software
ht
ded by quite a bit.
But yes, you can probably fix this by allocating more memory to the
JVM. Nowadays, if you're running a 64-bit version of CF, you can throw
a lot of memory at it and avoid these types of problems most of the
time.
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http:
> Is there any way to ensure the CFTOKEN and CFID cookies include the "secure"
> attribute when sending over https?
>
> I see no way to do this on CF9.
You need to disable CF's automatic setting of those cookies, then set
them yourself with CFCOOKIE.
Dave Watts,
e of issue. Please advise?
It's not clear to me whether you're having the problem only after a
restart, or whether you were never able to connect to the database via
TLS/SSL at all. If it's the latter, have you added the SQL Server's
certificate chain to the CF keystore?
Dave Watts
x27;re building a site that's
all (or perhaps mostly) content, use a CMS. But many sites are not
content - they're applications that let the user do something. Those
are not a good fit for CMSs.
Frameworks let you build applications. Those applications might be
CMSs, or something else -
loop so that you check hasNext()
within the body of the loop and exit the loop if there's no next?
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest c
an be automated via scripts, CF, etc.
More to the point: I've successfully run 32-bit COM objects from
32-bit CF with a 32-bit IIS application pool on a 64-bit Windows
server.
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Vetera
, CF, etc.
Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
http://training.figleaf.com/
Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
GSA Schedule, and provides the highest caliber vendor-authorized
instruction at our training centers, online,
cts on a 64-bit OS. Otherwise, my 32-bit
copy of MS Office would not work on my 64-bit desktop.
As long as you've configured your IIS application pool to support
32-bit applications, and you're running the 32-bit version of CF, you
should be able to use 32-bit COM objects from CF.
Dave Watts,
Wow, you folks really come through every time! It's going to take a bit to
go through all this but it sure gets me off the ground.
Thanks so much to you all.
Dave
---
This email is free from viruses and malware because avast! Antivirus protection
is active.
http://www.avas
Well, you folks really come through every time! It's going to take a bit to
go through all this but it sure gets me off the ground.
Thanks so much to you all.
Dave
-Original Message-
From: Jon Clausen [mailto:jon_clau...@silowebworks.com]
Sent: Tuesday, December 3, 2013 4:49 PM
T
101 - 200 of 19271 matches
Mail list logo