I use TTS only when i cannot predict text; for all other options i use Natural Neural TTS (NTTS) system predicted text. Obviously enable the end user to select Audio Feedback Off, Minimal & Full so they have a choice...
There are dedicated tools that can achieve what your IT department are trying to do! I query their competency if they are trying to achieve this using MS access even though it can be done..
Never bothered with Graphs/Charts in MS Access because irrespective of all the time invested trying to making them look attractive they look shit*.. My alternative was using Excel to represent data but never liked that approach. jsChart is a breath of fresh air and looks to be well worth...
Yes; your quite correct...
Just toggled the Read Only Property within the file and toggles the result from 32 (Read/Write) to 33 (Read Only)
Thanks for your quick response - i can work with this now and continue my project...
Found this as well; no reference to 33 though?
Let- Bit
ter masks Description and notes
--- -------- ---------------------------------------------------------------
R 0x1 Read-only
H 0x2 Hidden
S 0x4 System
(V) 0x8 Volume label (obsolete in NTFS and must not...
Just updating my project and wish to simply pull in some basic common file properties from video files and works as expected however I'm also pulling in ".attributes" and sometimes I'm getting a return code of 33?
I'm using Windows 10.....
Below is the list of expected results and their...
What finder print reader are you using out of curiosity; been working heavily on this recently supporting alternative manufacturers and won't be surprised if we have a solution already for the fingerprint reader to communicate directly with your database.
Been making some real progress with everyone's help. Just a quick demo i made to test the function.
Minimum 10 characters, minimum 2 Upper, 2 Lower, 1 Special Character, No Sequencing or Repeat within 4 block, no commonly used passwords. My progress bar works... Now need to tidy the code up and...
Yes, them figures are a little conservative to be fair. Many projects I have worked on with reference to RE identifies in most instances that the method of protection can be considered secure however time and time again the implementation of the method is so poor and misunderstood it may as well...
Yes , absolutely spot-on.. I think by me posting requirements for a password check it's assumed that the requirement I needed is what I would consider secure. This is not the case; I was interested to see how it would be accomplished using VBA which could then be charged as necessary. Please...
It takes less than that for someone who knows what they are doing however the password in my project is not stored without encryption. If your saying AES even 128bit can be RE in 39 seconds then their dreaming.
I've been reverse engineering hardware and software professionally for over 35 years for Government, Public and Private Sector. Knowing you can never be completely secure does not mean we should not try implement good security policy. Its a legal requirement in many sectors to be seen to do just...