.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
 
Sign In
Register
 
Win Surprise Gifts!!!
Congratulations!!!


Top 5 Contributors of the Month
david stephan

Home >> Interview Question >> JavaScript/VBScript >> Post New Question Subscribe to Interview Questions

Regular Expression For Social Security Number.

Posted By :Ghanashyam Nayak     Posted Date :January 07, 2011    Points :15   Category :JavaScript/VBScript 
/^\d{3}\-?\d{2}\-?\d{4}$/

You can also find related Interview Question to Regular Expression For Social Security Number.  below: 

Date Regular Expression.

  
Date(mm/dd/yyyy) : /^\d{1,2}(\-|\/|\.)\d{1,2}\1\d{4}$/ (More...)

Regular Expression For US Zip Code.

  
/(^\d{5}$)|(^\d{5}-\d{4}$)/ (More...)

Regular Expression For Ip Address.

  
/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$/ (More...)

Minimum number of queues needed to implement the priority queue?

  
Two. One queue is used for actual storing of data and another for storing priorities. (More...)

Convert the expression ((A + B) * C - (D - E) ^ (F + G)) to equivalent Prefix and Postfix notations.

  
Prefix Notation:
^ - * +ABC - DE + FG

Postfix Notation:
AB + C * DE - - FG + ^ (More...)

ASP.NET Security Fundamental Operations

  
Security in the context of ASP.NET application involves 3 fundamental operations [1,4,5]:
. Authentication: the process of validating the identity of a user to allow or deny a request [4,9,10]. This involves accepting credentials (e.g. username and password) from the users and validating it against a designated authority. After the identity is verified and validated, the user is considered to be legal and the resource request is fulfilled. Future request from the same user ideally are not subject to the authentication process until the user logs out of the web application.
. Authorization: the process of ensuring that users with valid identity are allowed to access specific resources.
. Impersonation: this process enables an application to ensure the identity of the user, and in turn make request to the other resources. Access to resources will be granted or denied based on the identity that is being impersonated. In other words, impersonation enables a server process to run using the security credentials of the client [6,9]. Thus, the ASP.NET applications are capable to execute the identity of client on whose behalf they are operating.
Since there are a lot of ASP.NET security features to cover, this paper will only focus on authentication in ASP.NET.


Shashi Ray (More...)

Difference of ASP and ASP.NET Security Flow

  
The security flow for ASP.NET page request is different from the classic ASP security flow. In ASP, IIS impersonates the authenticated user by default, and in ASP.NET, the developer has more control over configuring security at different level [2].


Shasi Ray (More...)

What is Version Number in Assembly Manifest ?

  
A revision and build number in an assemblies is called Version Number.

There are Major and Minor Version number in an assembly. you can change this version number in assemblyinfo.cs file
usually version number looks like this in assemblyinfo.cs
1.0.*

The common language run time uses these numbers to enforce version policy. (More...)

What is CODE Access security?

  
CAS is part of .NET security model that determines whether or not a piece of code is allowed to run and what resources it can use while running. Example CAS will allow an application to read but not to write and delete a file or a resource from a folder. (More...)

How can I switch to Expression Blend from Visual Studio?

  
Expression blend provide great extensibility for XAML files.To switch to Expression Blend, right-click on the XAML file and select Open in Expression Blend. (More...)

How to get IP Number of a SYSTEM?

  
Request.UserHostAddress.ToString();
(or)
Request.UserHostName.ToString(); (More...)

What is CODE Access security?

  
Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions.

It performs following function
1. Defines permissions and permission sets that represent the right to access various system resources.
2. Enables administrators to configure security policy by associating sets of permissions with groups of code (code groups).
3. Enables code to request the permissions it requires in order to run, as well as the permissions that would be useful to have, and specifies which permissions the code must never have.
4. Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.
5. Enables code to demand that its callers have specific permissions.
6. Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
7. Enforces restrictions on code at run time by comparing the granted permissions of every caller on the call stack to the permissions that callers must have. (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

 
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.


Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend