Attack | Design run test.htm after password login test ~!
-------------------------test.htm code is as follows:
marginheight= "1" border= "0" scrolling= "no" >
--------------------------test.asp code is as follows:
' This code is only for
If you have an ASP space and you want to place multiple sites, this code can help you
First one
If Request.ServerVariables ("SERVER_NAME") =www.webjx.com ThenResponse.Redirect "williamlong/"ElseResponse.Redirect "I.htm"End If%>
A second
Select Case
Random | show
'----------------------------------------------------------------------------------------
' When forwarding, please keep this declaration information, this statement does not affect your display speed!
' *************************
You have just released the latest huge ASP application to the Web. Files are uploaded correctly to the server, and the link to the application is also
Work well. Before celebrating victory, you want to run some stats on the performance of your
The essence of pure coding to achieve Access database establishment or compression
' ###### #以下是一个类文件, the following annotation is the method of calling the class ################################################
' # Note: If the system does not
----------------------------------------------------------------------------------------
Random Picture Display ****************************
Use instance: img.asp?list= Picture Storage Directory
Use Note: The picture catalogue is placed in the same
Upload | Upload on the internet to see an article, modified and combined with XML, to achieve picture text synchronization upload!
Total 3 files: upload.htm,uploadtext.asp,uploadimg.asp
Create an Access database called Text.mdb, the table called
Dynamic | Web page
Some anti-virus software will be normal ASP files mistaken for ASP Trojan file, and automatic deletion, affect the normal use.
The following methods may be effective to avoid being deleted by antivirus software
Put
Dim
Access
This is previously written in ASP, I would like to change into asp.net to everyone, and then think we can read the algorithm on the line. The key of IP alignment is the linearization of IP address, the following is the code.
' Access to
Security | Security of database in ASP is a serious problem. Many code writers are aware of this type of problem and are careful to remedy what they think is problematic, but the common scenario is either not to exhaust all suspicious locations, or
Beginner 1. Get system time:
2. Access to the IP:
3. Access to the system, browser version:
4. Remove IE Mixing strips:
5. Go to the website and jump out of the advertisement:
6. Random Number:
N is a number that can be changed
7. Move Up
Source: fhod
When you encounter a CC attack, put the following code into conn. asp. You can study the principle on your own.
Dim fsoObjectDim tsObjectDim fileIf Request. ServerVariables ("HTTP_X_FORWARDED_FOR") = "" thenResponse. write "in system
welcome to the script special effect center of the script home page. Click "run" to demonstrate the special effect: webpage special effect code | JsCode. CN | --- Select and copy all content in the form. Hello, welcome to the exclusive
I saw a piece of code on the Internet: (I will explain the key part later)Id1 = replace (request ("id"), "", "") 'the replace function does not work in simple filtering.If id1 <> "" then': determines whether id1 is null.Set rs = server. createobject
1. How to use ASP to determine the virtual physical path of your website
A: Use the mappath method.
P
Align
= "Center"
>
Font
Size
= "4"
Face
= "Arial"
>
B
>
The physical path to this virtual website is:
/B
CopyCodeThe Code is as follows: to prevent normal collection and thief reading, add it to the top. Similarly, it can be transformed into a JS script.
Dim appealnum, appealcount
Appealnum = 10' the same ip60 s request limit is 10 times
Appealcount
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.