Monday, May 23, 2011

Date Function Formatting

As you can see in our last example there are tons of different formats that can be used in the date feature. Below is a summary of the variable used in date, and what each does. Remember they ARE CaSe sEnsItIVe:
d - day of the month 2 digits (01-31)
j - day of the month (1-31)
D - 3 letter day (Mon - Sun)
l - full name of day (Monday - Sunday)
N - 1=Monday, 2=Tuesday, etc (1-7)
S - suffix for date (st, nd, rd)
w - 0=Sunday, 1=Monday (0-6)
z - day of the year (1=365)
W - week of the year (1-52)
F - Full name of month (January - December)
m - 2 digit month number (01-12)
n - month number (1-12)
M - 3 letter month (Jan - Dec)
t - Days in the month (28-31)
L - leap year (0 no, 1 yes)
o - ISO-8601 year number (Ex. 1979, 2006)
Y - four digit year (Ex. 1979, 2006)
y - two digit year (Ex. 79, 06)
a - am or pm
A - AM or PM
B - Swatch Internet time (000 - 999)
g - 12 hour (1-12)
G - 24 hour c (0-23)
h - 2 digit 12 hour (01-12)
H - 2 digit 24 hour (00-23)
i - 2 digit minutes (00-59)
s 0 2 digit seconds (00-59)
OTHER e - timezone (Ex: GMT, CST)
I - daylight savings (1=yes, 0=no)
O - offset GMT (Ex: 0200)
Z - offset in seconds (-43200 - 43200)
r - full RFC 2822 formatted date

Tuesday, March 15, 2011

How to: Uninstall SQL Server Express 2005

In this topic, you will learn how to completely uninstall Microsoft SQL Server 2005 Express Edition (SQL Server Express). 

To uninstall SQL Server Express
  1. Click Start, and then click Control Panel.
  2. Open Add or Remove Programs.
  3. Select Microsoft SQL Server 2005, and then click Remove.
  4. The Component Selection page appears. By default, the Remove SQL Server 2005 instance components check box is selected. Select the instance that you want to remove.
  5. To remove the Workstation components, select the Workstation Components check box.
  6. The Confirmation page appears, listing the components that will be removed. Click Finish to complete the process of uninstalling SQL Server Express.
    You will see the System Configuration Check and Setup Progress pages as the uninstall process is completed.
  7. To remove SQL Native Client, click Start, click Control Panel, and then click Add or Remove Programs.
  8. Select Microsoft SQL Native Client, and then click Remove.
  9. You will see a dialog box confirming whether you want to remove SQL Native Client. Click Yes.
    SQL Native Client is removed from the list of Add or Remove Programs.

Thursday, February 24, 2011

Windows XP Pro SP3

Serial Keys:

    Security Products

    Folder Lock® - The Fastest Encryption on Earth!

    Folder Lock is a file encryption software that offers fastest way of encrypting and password protecting files and folders. You can either choose to encrypt important files from techies or lock your files, pictures and private data from casual users. Folder Lock comes with locking, encryption, shredding, stealth mode, hack attempt monitoring, portability, plug & play support, history cleaning, and more than 20 privacy features all tailored to special needs for people wanting privacy and security.

    USB Block® - Prevent theft of your data!

    USB Block is a data leak prevention tool that prevents leakage and copy of your data to USB Drives, External Drives, CDs/DVDs or other such portable devices. Once installed, USB Block lets you block all such drives and devices that do not belong to you. With USB Block, you can share your PC with anyone without fear of data theft. USB Block also lets you create a list of devices and drives you authorize with a password so that only your USB drives or CDs can be accessed on your computer.

    Download Here!

    USB Secure®- securing flash data!

    USB Secure can password protect USB and other flash drives. Protection is PC independent, doesn't require installation and doesn't require administrator rights at the other end. Never again worry about lost or stolen USB drives if you have protected it with USB Secure. USB Secure works with all types of portable media like USB Flash drives, Thumb drives, Memory sticks, External drives and Memory Cards.

    Download Here!
    Folder Protect - protect Files and Folders

    Folder Protect lets you password protect folders, files, drives & programs. It offers 'Data in Use' security and lets you choose whether you want to write protect, delete protect, access protect or hide your data. The program also offers Safe Mode locking, stealth mode and hotkeys, auto-protection and password prompt on access of protected item. Folder Protect offers features that set it apart from other password protection software.

    Download Here!

    The Ultimate Copy Protection for your Files!

    Copy Protect is a copy protection software program that lets you prevent illegal copying of your media files. The program supports most audio, video, document and picture file formats. Copy Protect works by converting your media files into executable applications that run only in the drive they are made for. A copy protected file is useless and won't run if copied and executed from another drive or computer, thus preventing illegal distribution

    Download Here!

    Currently, innumerable rumors about the next version of Windows are circulating and Windows 8 MOSH is one of them. Such rumors indicate the importance of Microsoft Corp. in the world of IT. This is so because Microsoft, the technology giant, is a center of hope for the trillions of people worldwide. Microsoft has a tradition of introducing new and progressive products every time. This is the reason that people have a lot of expectations from Microsoft.

    One more thing that is escalating the curiosity of people is which features of Windows 7 are going to be amended by Microsoft in the new version of Windows. So, this time it is being speculated that Microsoft is going to introduce a new graphical user interface that is code-named Mosh. Paul Brian Thurrott, a technology reporter and the news editor for Windows IT Pro magazine, is a real man from whom these speculations come. According to the Thurrott’s reporting, the new tile-based interface will be for devices like slates and tablets.

    You cannot get any idea about Windows 8 mosh unless you do not know the concept of a user interface. In the field of information technology, a program that allows the user to interact with the system is called a user interface. So in simple terms, a user interface controls a display for the user. The common examples of a user interface are light pen, computer desktop, mouse, light pen, and a keyboard, etc.

    In short, to check the validity of Windows 8 mosh, we have to wait for some time.

    Thursday, February 3, 2011

    Library System

    An SPC Library System usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most Library System separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:
    • acquisitions (ordering, receiving, and invoicing materials)
    • cataloging (classifying and indexing materials)
    • circulation (lending materials to patrons and receiving them back)
    • serials (tracking magazine and newspaper holdings)
    • the OPAC (public interface for users)

    Wednesday, February 2, 2011

    RGB - using JSrollbar

    This how to implement a RGB color in java. It combines the values of each JScrollbars namely: redScroll, greenScroll, blueScroll.

    Download this java implementation.