Articles Written by Eric Smith

ASP.NET Tip: Sending Mail with ASP.NET 2.0

The new System.Net.Mail library in ASP.NET 2.0 introduces some useful features, but it also includes bugs. Find out how they come into play when you send mail.

ASP.NET Tip: Binding to Alternate Data Sources

Sure, you can bind database-related objects to grids and repeaters, but what about binding your own objects to grids and lists? Learn how to build a class that can be bound to a Repeater without involving any databases.

ASP.NET Tip: Creating a Composite Web Control

Although easy to create, user controls are harder to share between projects. As an alternative, you can create a composite control, which is harder to create, but much easier to share between applications.

ASP.NET Tip: Creating an Atom XML Feed

Atom, the replacement for RSS, is quickly being adopted by many blogging software makers. Learn how to produce an Atom XML feed using a database table.

.NET Tip: Creating a Password-Checking Function

Password security is an easy way to tighten access to any application. Use this function to check a password against a set of rules, as well as a set of previously used passwords.

ASP.NET Tip: Exporting Data to Excel

Enable your users to download data for use in Excel spreadsheets with a few easy tricks that leave all the hard formatting work to Excel.

Top White Papers and Webcasts

  • Employees must exchange sensitive emails with customers and partners. These emails might contain protected health information, protected financial information, or corporate information that should not be made public. Globalscape® Mail Express® allows you to encrypt the emails that it manages so that no one but the sender and recipient--not even the administrator--can view the contents of the email. "Secure the Transfer of Sensitive Emails" is the property of GlobalSCAPE

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date