I am having a problem with roles. A user called tomcat is in a role called
admin, but should not be. I can login okay with the tomcat user but, the
tomcat user can do everything an admin can do, which is not what I want. I
then tried to programmatically see if tomcat user is an admin and he was.
(A
You might want to look into my JiBX (http://www.jibx.org) project for
the XML part, too. JiBX is a higher-level solution than Betwixt and
Digester, which I think you'd find easier to set up while also
delivering better performance. It's not as automatic as the bean
serialization in JDK 1.4, but
Group of people to join me for dinner over at el corral or pinnacle
peak. (Don't have to pay for my meal, just give me an excuse to go and
speak "propeller" ;)
FYI I am a native Tucsonian (like to keep my eye out on what is going
on in the old pueblo.)
-Todd
__
Say Todd -
After you get that preso ready for the PHX JUG, what kind of bribe
might it take to convince you to take the presentation on a roadshow
down to the Old Pueblo for a TJUG meeting?
Cheers,
Tim
-
To unsubscribe, e-mail
Rolled our own Tx Management (pretty simple transaction queue).
As for the XML thing. the problem can be solved by handling the
serialization manually and overriding the serial ID's etc... to pick
up when an "old form" of the object is being read in.
The xml thing would have given us a fill i
I have looked at the Prevayler site in the past and it looks very interesting.
If you have time, I'd like some more details on your experiences:
Todd Ellermann wrote:
Downsides:
Had to manage our own transactions.
How did you address this? Did you use some 3rd party transaction management
solut
Not to diverge too far from the topic, but...
Even with encryption you have to careful, as the WEP (Wired Equivalent
Privacy, part of the 802.11 spec) folks found out the hard way. I don't
recall what the relevant data were, but some part of WEP involved
sending some bytes and a crc-32 checksu
Hey I apologize to everyone down there. I was half asleep last
monday when I responded to the Tucson Jug about the phoenix meeting
last week.
Hope my contribution here makes up for the confusion.
We just recently completed a stand alone point of sale system for our
regional sales managers t
Embedding encrypted info about things like the domain, ip address, and
user credentials in the cookie as well as a timeout for the cookie can
make it very difficult to spoof though.
Ollie
On Thu, 2004-02-19 at 23:46, Nicholas Lesiecki wrote:
> I second Andy.
>
> BTW, It is possible to spoof som
Yea we did and 'neat' is the word. Didn't Nick write something about
it?
Ollie
On Thu, 2004-02-19 at 23:54, Tim Colson wrote:
> Say - has anybody tried this out? I read about it 'bout a year ago...
> neat sounding.
>
> http://www.prevayler.org/wiki.jsp
>
> Cheers,
> Timo
>
>
> --
10 matches
Mail list logo