Program name: ASP's Sky Thief
Program type: Thief, not too elegant ah, hehe ~
Latest Version: No version, because, I no longer update, there are problems to change their
Introduction to the program: This has nothing to say ~ everybody knows
Program author: Little Brother Fei (this ID, was sealed, hey, made a mistake)
Download Address: Now a lot of people have had ~ no need to find me!
The following is I wrote to a friend, about how to change the thief, will not play, see for yourself ~
Actually, it's easy to change another thief.
Oh ~
Description of the function used
====================================================================
Instr ()
function returns the position of the first occurrence of a character or string in another string.
Allow data type: Start is the starting value for the search, strtobesearched accept the search string strsearchfor the character to search for. Compare comparison method (see ASP constants in detail)
Absolute. The absolute value of a number is its positive value. The absolute value of an empty string (null), also an empty string. Uninitialized variable, which is absolutely 0
Replaces a partial word with a string. Find the original string to be replaced (find) and replace it with the new string (replacewith) if found.
Find: The original string to be looked for instead.
ReplaceWith: Replace the word after.
Start: Look for the substitution from the first few words, if not set, then start looking for a word.
Count: Number of replacements. If not set, all the found strings are replaced by the string.
Compare: Looking for the comparison method, compare=0 represents the binary comparison method, Compare=1 table text comparison method, compare =2 table According to the comparison data type, if omitted compare is the preset binary comparison method.
The program uses a process that is written well
Below is the source code
<%
' Sourcecode_0 is the total data obtained from the page
"Sourcecode_1 is the code that intercepts the starting position needed for the content."
"Sourcecode_2" is the generation of the end position needed to intercept the content?
' Sourcecode_3 is the extra content of the code needed to intercept the content
Function Getsourcecode (Sourcecode_0,sourcecode_1,sourcecode_2,sourcecode_3)
Between=instr (sourcecode_0,sourcecode_1)-instr (sourcecode_0,sourcecode_2)
First=instr (Sourcecode_0,sourcecode_1)
Getsourcecode = Mid (Sourcecode_0,first,abs (between))
Getsourcecode =replace (Getsourcecode,sourcecode_3, "")
End Function
%>
This way call
<%
Sourcecode= "1a2b3c4d5e6f7g8h9i1j0k1l1m1n2o1p3qr1s4t1u5v1wx6y1z7"
"Here is the definition of a string, to be used later, in the actual thief program, this variable is taken to the source of the Software page page
In addition, to write to the database after the data is obtained
Set Rs=server. CreateObject ("ADODB.") RecordSet ")
Rs.Open "SELECT * from Downtype", conn,3,2
Rs.addnew ' Write record must have this sentence
RS ("Tname") =softclass_1 ' rs ("Tname") this is a field in the table Downtype in the database, and the field name is Tname, which is the current place to write the content, softclass_1 this is a variable defined in the previous
RS ("TJ") =1
RS ("TN") =RSB ("id")
Rs.update ' Write record this is also required
Change into
<textarea name= "textarea" cols= "Rows=20><%response.write sourcecode%></textarea><br>"
This can be seen, the program from the Sky Software station, real-time access to some of the page information
Of course, here the text box output data, has been once intercepted, if you want to take is not the Sky software station data, then you should first modify the first, softwirte.asp from 91 lines start to 94 lines of code
That's it, and there's only three functions to use here, InStr mid Replace in front of all has been explained, are the most basic application, if you do not understand the program here, go to the front to see the description of these functions, to understand that the code here will understand
The role of this code is to take a part of the interception of the page information, delete a useless information
In addition, the information intercepted here is also used for the backstage program, for example, the name of a software is taken from the information that has been intercepted here to take the corresponding things out, write to the database
Of course, if you already have IIS on your computer, you can hit the program copy and you'll see the effect.
From the 131 line in the softwrite.asp is really the interception of software-related information, if you want to change to intercept other content, of course, here must be changed accordingly
Dim Softname,softsize,softlan
"The above sentence is to define some variables to facilitate the invocation of the
Softname=getsourcecode (SourceCode, "<b><font color= ' #004FC6 ' size= ' 3 ' >", "</font></b></ Td></tr> "," <b><font color= ' #004FC6 ' size= ' 3 ' > ")
"This is to intercept the name of the software, the use of the Getsourcecode () is the process, the preceding has been explained, do not understand again look at the previous instructions
...
From 131 lines to 159 lines, all software-related information is used to Getsourcecode ().
Finally, all the software information is intercepted, stored in the corresponding variable, the rest is to write the part of the database, if your application is only to steal people's download station software information to the cloud, the latter part of the need to change, you can use, of course, here to explain that all the previously defined variables can not be changed to other , if the change, the latter part of the corresponding change, you will not be wrong
About writing the part of the database, the content is too much I can not say, at the very beginning I have simply explained, you can go to change some books, so, learn ASP will be faster
On these, the other if you do not understand, we again QQ contact, fast New Year, here together, I wish you a happy year! Oh ~
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.