restarting, the request is not processed. When the page is refreshed, the HTTP status code should disappear. If the HTTP status code refresh the page again, the virus software that may cause the problem is scanning the global. Asa file. If this problem persists, you may encounter a problem where the web application is blocked from restarting the web application correctly.
500.13-the Web server is too busy. Because the server is too busy to accept
FAQs about ASP Programming
Q: How can I protect my ASP source code from leakage?
A: Download Microsoft's Windows Script encoder to encrypt ASP scripts, client JavaScript, and VBScript scripts. After the client script is encrypted, only Versions later than ie5 can be executed. After the server script is encrypted, script engine 5 (with ie5 installed) can be interpreted and executed only on the server.
Q: Why does the global. Asa file always fail?
A:
encoder, which can be used for ASP scripts and client javas logs/vbs
... However, after the client is encrypted, only ie5 can be executed. After the server script is encrypted, only the server is installed with the S Engine
5 (when an Internet Explorer 5 is installed, it can be executed.
12. How can I transmit a query string from one ASP file to another?
A: Add the following statement to the former file:
Response. Redirect ("second. asp? " Request. servervariables (" QUERY_STRING "))
13. Does
is that connectstring is a session variable initialized in global. Asa, but global. asaBut not working properly. The solution is to check whether the assignment is correct: (Add the following code to your asp)
Another reason is that you add extra spaces to your connectstring, such
DSN = mydsn; database = pubs;Try to change it to the following:DSN = mydsn; database = pubs;
If global. ASA is not working, che
code?A: You can download a Microsoft Windows s cript encoder, which can encrypt ASP scripts and client javas scripts/vbs scripts... However, after the client is encrypted, only ie5 can be executed. After the server script is encrypted, only s runtime engine 5 (installed with ie5) can be executed.
12. How can I transmit a query string from one ASP file to another?A: response. Redirect ("second. asp? " Request. servervariables (" QUERY_STRING "))
13. Does the global.
? That's not so with Session Variables. They are private; Session Variables are to be accessed only by one user.
Session. Abandon ():
My bet is you cocould figure out Session. abandon () without any explanation. however, let me just state for the record that Session. abandon () ends the user's session and releases the Session Variables from memory.
Session Properties:
Let's briefly discuss two properties you are not likely to use. session. codePage lets you call for foreign character sets, lik
. Recordset ")Rstemp. open sqltemp, connectme, adOpenStatic, adLockOptimsticResponse. write rstemp. recordcount "records in Rstemp. closeSet rstemp = nothing%>7. Avoid defining objects in the global. asa file.Because the content in the global. asa file can be referenced by all files in the site, object definition in the global. asa file can save a lot of repetit
We know that IIS 6.0 is now a widely used Web platform, and creating a site based on IIS 6.0 is the first choice for many enterprises. However, IIS has higher hardware requirements than other Web platforms, and its performance is not satisfactory. Therefore, we need to learn how to optimize IIS and delete unnecessary IIS extension mappings.
By default, IIS supports ing between. asp,. cdx, and other eight types of IIS extensions, which are rarely used except. asp extensions. These unnecessary ex
1. No matter what station, no matter what language, I want to penetrate, the first thing is to sweep the directory, the best to sweep out an upload point, directly upload the shell, you do not laugh, sometimes you spend a long time to make a station, finally found that there is a ready upload point, and it is easy to guess, but this situation occurs in the ASP2.asp (ASPX) +mssql first consider injection, the general injection has Dbowner permissions can directly write the shell, if not write, or
Database download vulnerability attack technology [group chart] is the No. 1 killer of script vulnerabilities-database download vulnerability, which is now widely known to more and more people. In this era of rapid information technology updates, vulnerabilities are followed by various countermeasures, such as modifying database suffixes and database names. Many people think that if you do this, you can solve the problem, but the fact is often not as good as you wish. even if you do this, you ca
created with the AttributeCodePage is the code page used for symbol ING.LCID Field ID.SessionID returns the user's session verification.Time-out period of the application session status, in minutes.MethodAbandon this method destroys the Session object and releases its resources.EventScripts for declaring the following events in the global. asa file.Session_OnEndSession_OnStartFor more information about the above events and the global.
From: http://searchwebservices.techtarget.com.cn/tips/347/2136347_1.shtml
Probably, most people think we need to run asp.net or use soap toolkit to access webservice. But this is not necessary. We can also use the traditional asp page to access webservice using Microsoft's xml parser. I will show you the following!
I will use three files for my presentation.
Global. asa. When the program starts running, use the application variable
I _soapcall.asp is
by IIS, Apache, Nginx and other services to interpret the script file format and execute it in some cases.IIS 5.x/6.0 Parsing Vulnerabilityiis6.0 The following three main parsing vulnerabilities:1. Directory Parsing Vulnerability/xx.asp/xx.jpgCreate a folder under the site named. asp,. ASA, and any file extension within its directory is parsed and executed by IIS as an ASP file. So as long as an attacker can upload a picture horse directly through th
Turn from: Some tips for getting a shell1. Upload asp asa jsp cer PHP aspx format of the Trojan, do not add a space or use IIS6.0 Parsing vulnerability, common format: 1.asp;1.jpg or 1.asp;. JPG or 1.asp;jpg2. Sometimes upload the image format of the Trojan, incredibly by the program detection interception, right-click Notepad to open the Trojan, in the code at the front of the gif89a, and then back up the database backup into ASP format Trojan to win
It is well known that vmareworkstion is a powerful desktop-based virtualization software that compares Windows virtual machines, Linux virtual machines, and even network operating systems, such as Cisco ASA, Juniper SRX, and so on. And you can use VMware's own virtual network card host to establish different network segments to build a test platform. The following is a security testing platform that is built on VMware with Linux systems, Juniper SRX t
data name to ASP, so that directly with the FlashGet such as download tools can download the database, this way the correct approach:
Create a field in the database with the name random, the type is an OLE object, and the content is set to a single-byte type
After this code is run, a nodownload table is generated in the database, and the field in the table is Notdown. If a data table with the same name already exists in the database, change the nodownload within the code to the name of the da
The number one killer of the script vulnerability, the database download vulnerability, is now well known to more and more people. In the era of rapid updating of information technology, the loopholes are followed by various coping strategies, such as changing the suffix of the database, modifying the name of the database and so on. Many people think that as long as this can solve the problem, but the fact is often not as you wish, even if you do so will not escape the fate of the master attack.
directly.
Three, ASP type
This practice is more professional but also very safe and is now more popular practice, but now a lot of people just do half, just change the data name to ASP, so that directly with the FlashGet such as download tools can download the database, this way the correct approach is two steps:
The first step: Create a field within the database, with a random name, an OLE object, and a single byte type.
After this code is run, a nodownload table is generated in the databa
Internal error.
500.11 Server Error: The application on the WEB server is shutting down.
500.12 Server Error: The application on the WEB server is rebooting.
500.13 Server Error: The WEB server is too busy.
500.14 Server Error: Invalid application configuration on the server.
500.15 Server error: Direct request GLOBAL is not allowed. Asa.
500.16 Server Error: UNC authorization credentials are incorrect.
500.17 Server Error: URL authorization store co
';4. Query user and birth information
Statement:
--Query user and birth information Select ' ' as as from Employees e;
Query Result:
5. Implement5.1 Query the number of years for the current date, the current date, and the birthday interval.
Code:
Select ' ' as Name, e.birth_date as BirthDay, (year (today))-year(e.birth_date ) diff, as today from Employees E
Results:
5.2 Check The birthday
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.