Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

, ,

Network Security Access Restrictions in Silverlight

Cross-domain service access in Silverlight Silverlight uses services as its primary source of retrieving data across domain boundaries. To prevent applications from launching malicious attacks on web sites, Silverlight uses opt-in cross-domain access. A web site needs to be allowed to receive and respond to requests being made from a particular domain. This safe-guarding role […]

, ,

Setup an audit mechanism

You can implement an auditing procedure for your data forms using the “After Update Post Url” property (Options tab). If you declare a web page in that property, a web post containing the action (preinsert, preupdate, predelete, postinsert, postupdate, postdelete) and a list of field name/field value pairs, will be made after each insert, update or […]

, ,

Network Security Access Restrictions in Silverlight

Cross-domain service access in Silverlight Silverlight uses services as its primary source of retrieving data across domain boundaries. To prevent applications from launching malicious attacks on web sites, Silverlight uses opt-in cross-domain access. A web site needs to be allowed to receive and respond to requests being made from a particular domain. This safe-guarding role […]

, ,

Setup an audit mechanism

You can implement an auditing procedure for your data forms using the “After Update Post Url” property (Options tab). If you declare a web page in that property, a web post containing the action (preinsert, preupdate, predelete, postinsert, postupdate, postdelete) and a list of field name/field value pairs, will be made after each insert, update or […]