Viewing 5 posts - 1 through 5 (of 5 total)
Also take the time to consider how you plan to organize the source files themselves. Personally I've had excellent experiences with the combination of TFS and Visual Studio database projects.
March 16, 2012 at 6:31 am
Hmm ... not sure if I can help with that. The code I gave was literally what I used for the decryption.
Here's where I would start:
http://www.gnupg.org/documentation/manuals/gnupg/Invoking-GPG.html
September 4, 2008 at 6:49 am
This is GPG, right?
I don't think you need to specify the key name to use it. It's stored in the "keyring" for you and GPG just determines whether any of...
September 3, 2008 at 6:28 am
I've handed off all the original code to other developers by now (that was three clients ago) but I still remember the gist of it (plus, now I think I...
September 2, 2008 at 6:34 am
I had to do very nearly the exact same thing for a client a few months ago. The problem I had was not with permissions or SSIS or Agent, but...
December 21, 2007 at 8:27 am
Viewing 5 posts - 1 through 5 (of 5 total)