However, some cases only need to pass a few files, and the file volume is not too large, in this case, the use of components is a bit of a nut to kill chicken feeling, through the HTML form can realize the required functions, the key is the
My site is now used. I've experimented with it, mostly.
This is the page to process the login information
The submitted form can be found on the front page of my site. http://www.chinaok.net
response.expires=-100
Response.ExpiresAbsolute = Now ()-10
' This is coded by nick@stilwell.ws
' Using the upload.asp example from asp101.com
"and combining it with the" mail object to allow
' You upload a pic of your PC and email to anyone anywhere
' At anytime maybe it should is called Martini
function Htmlencode2 (str)
Dim result
Dim l
If IsNULL (str) Then
Htmlencode2= ""
Exit function
End If
L=len (str)
Result= ""
Dim i
For i = 1 to L
Select Case Mid (str,i,1)
Case "result=result+ "Case ">"
result=result+ ">"
Case Chr
ASP tutorial filtering HTML-sensitive characters into HTML-encoded functions' This function is based on the user's incoming parameters and then traversing the HTML-sensitive characters into HTML-encoded form, which filters sensitive HTML.
How to use:
1. Save the following code as: Ring.vbs (file name can be customized)
2. Move Ring.vbs to the program Startup group, which can be started automatically with Windows (location: Start-Program-Start, XP Startup group location is:
File actions
Copy Code code as follows:
Set FSO = WScript.CreateObject ("Scripting.FileSystemObject") ' Creates file system objects to work with drives, folders, and files
Set WshShell = WScript.CreateObject ("Wscript.Shell") '
The code is as follows
Copy Code
Class Stringoperations ''**************************************************************************** "' @ Feature Description: Swap string for char-type array ' @ parameter Description:-str [string]
In fact, SQL injection vulnerability is not scary, know the principle + patience carefully, you can be completely defensive.
Here are 4 functions that are enough to withstand all SQL injection vulnerabilities. Read the code and you can digest it.
Here are 4 functions that are enough to withstand all SQL injection vulnerabilities! Read the code and you can digest it.
Be careful to filter all Request objects: including Request.cookie, request. ServerVariables and so on are easily overlooked
Baidu search engine rankings to check the source code.
Save the following as an ASP file and run a view with the following code:
BPN = Request ("BPN")if (BPN = "") ThenBPN = "0"End IfINTBPN = CInt (BPN)If Request ("action") = "1" ThenWord = Request
However, some cases only need to pass a few files, and the file volume is not too large, in this case, the use of components is a bit of a nut to kill chicken feeling, through the HTML form can realize the required functions, the key is the
pagination | function On Error Resume Next
' Paging program
function fy (scount,pgsize,pg,url)
' Scount Total Records
' Pgsize per surface record number
' PG Current Page
' URL to the address, after running this function will be followed by the
Dim id
Id=request.querystring ("id")
Dim Myfso
Set Myfso=createobject ("Scripting.FileSystemObject")
If Myfso. FileExists (Server.MapPath ("./news_content/" &id& "TXT")) Then
Myfso. DeleteFile (Server.MapPath ("./news_content/" &id& ". txt")) ' #####
Chat Room A Few good friends in the chat room chatting, there are always some topics are not want the same chat room other chat friends see, then chat room to support the private message will be what is necessary, to achieve a lot of whispering
' Program table
'/represented as root directory
'/default.asp Home program, like the homepage of this site
./new/index.asp more Announcements
./new/addarticle.asp Add Announcements
./new/articleconn.asp Database Links
./new/chklogin.asp
Class wyd_aspcodehighlight Private RegEx Public keyword,objectcommand,strings,vbcode Public Keywordcolor,objectcommandcolor,stringscolor,comment,codecolor Private Sub class_initialize () Set RegEx = New REGEXP Regex.ignorecase = True ' Sets
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.