Solved

Beginner needs help installing a program

Posted on 2004-09-20
3
275 Views
Last Modified: 2012-08-14
http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=786&lngWId=10

How do I install this and use it ?

I have a windows 2000 server box
with IiS.

-Jon Colby
0
Comment
Question by:joncolby
3 Comments
 
LVL 6

Expert Comment

by:casstd
ID: 12108194
Hi,

        The the source code is in a zip file. So you have to extaract the information from this zip file.

1. You have to have the zip software in your computer look at here www.winzip.com/
2. After you download from the planet-source-code, double click on the zip file.
3. if you have winzip it will open in winzip and show the wizard to extract file from the zip file.

Hope this would be helpful to you.
0
 

Author Comment

by:joncolby
ID: 12108408
..Yea, thanks,,,, I know how to open a zip file.
I dont know how to use the things that are in this particular zip file though.
it is source code.... I was hoping to get an answer that was taylored towareds working with this sourcecode for this particular application.

-Sincerely,
Jon C.
0
 
LVL 6

Accepted Solution

by:
viola123 earned 500 total points
ID: 12109048
hi,

what you need to do is to extract this zip file, then you get a folder named 'BronzeMonkey.GeneralTaskList'. after that, you may follow this guideline:

1. copy this 'BronzeMonkey.GeneralTaskList' folder to c:\inetpub\wwwroot

2. configure the virtual directory of this folder in IIS

3. use all sql script file to create database, stored procedures and functions

4. use visual studio.net to open the project solution file: ' BronzeMonkey.GeneralTaskList.sln ' from folder ''BronzeMonkey.GeneralTaskList''

5. set the default.aspx in 'BronzeMonkey.GeneralTaskList' as the start page

6. check web.config file to sort out all settings such as database connection string

7. build the whole application

wish it helpful

viola
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Have you ever needed to get an ASP script to wait for a while? I have, just to let something else happen. Or in my case, to allow other stuff to happen while I was murdering my MySQL database with an update. The Original Issue This was written…
This demonstration started out as a follow up to some recently posted questions on the subject of logging in: http://www.experts-exchange.com/Programming/Languages/Scripting/JavaScript/Q_28634665.html and http://www.experts-exchange.com/Programming/…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now