Delete Duplicate Rows from DataTable

October 29, 2012

This post explains how to Remove/Delete Duplicate Rows Records From Datatable using C# or VB.NET in Asp.Net. My table in database contains duplicate records as shown in image and I want to remove those duplicate records temporarily before displaying them in gridview. For this purpose I’m filling records in DataTable and deleting duplicates. I have placed […]

0

WCF Configuration from Novice to Ninja Series Part 1

September 27, 2012

I had observed hard time for developers in playing with the WCF Configurations. So I had decided to provide the WCF Configurations in detail for each kind of Bindings. In this article I would like to cover basicHttpBinding Configuration settings. <basicHttpBinding> <!– Binding Section Starting Point –> <binding allowCookies=”Boolean” bypassProxyOnLocal=”Boolean” closeTimeout=”TimeSpan” envelopeVersion=”None/Soap11/Soap12″ hostNameComparisonMode=”StrongWildCard/Exact/WeakWildcard” maxBufferPoolSize=”Integer” maxBufferSize=”Integer” […]

0

Merge GridView Cells

September 25, 2012

In this example i am going to describe how to Merge GridView Cells Or Columns In Gridview Rows Using C# and VB.NET in ASP.NET Containing Same Data or content. For this i m using DataBound Event of gridview, counting total rows and then checking each cells value against value of same cell in previous row and then […]

0

Web.Config Transformation Features in Visual Studio 2010

December 17, 2011

Introduction Web.config files typically include settings that have to be different depending on which environment the application is running in. For example, you might have to change a database connection string or disable debugging when you deploy a Web.config file. For Web application projects, ASP.NET provides tools that automate the process of changing (transforming) Web.config […]

0

Cross Site Scripting update for ASP.Net 4.5

September 17, 2011

Introduction to XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out […]

0