An asp-based application consists's a virtual directory on a WEB server and all folders and files within that virtual Directory. For more information about virtual directories, refer to your Microsoft Web Server online documentation.
An application
After the drive is finished, the folder is then manipulated. These include extracting folder information, creating folders, deleting folders, copying folders, moving folders, and so on. Here's a concrete look.
First, FSO. GetFolder
A look is clear,
4. File Default.asp
id = Request ("id")
If ID = "" Then
ID = 30
End If
Title = "Polls (Create your own poll)"
%>
asp polls
another joint product from tipped Cow development and adrenalin labs
The Web page lets the user enter text in a TextBox, then stores it in the database, and then reads it out of the database and displays it on the page. It's often a problem to do this, because the textbox is actually a Windows component, and Web page
Sqlultimate.asp--part C
BuildSQL
If request ("CreateTable") <> "Create Table" Then
Response.Write ("" & vbCrLf)
End If
If request ("createtable") = "Create Table" Then
Call CreateTable ()
ElseIf strserver = "" or Request ("showconnectdb") =
If IIS is later installed, you need to first. NET executes the aspnet_regiis-i in the command tool, installs the ASP. NETFramework
Then check the configuration below:
If IIS is not installed later, check the following configuration directly:
1.
/**
@ Description: The way to get all the contents of a form in an ASP program
@ Author: Ci Qin Qiang
@Email: cqq1978@Gmail.com Http://blog.111cn.net/cqq
*/
Just now in the forum to see someone ask this question, is in the ASP how to get all the
3 code.asp file will leak ASP code
Problem Description:
For a very simple example, there is an. asp file in the Microsoft ASP1.0 routines, designed to view the source code for other. asp files, which is
Aspsamp/samples/code.asp. If someone uploads
iis4.0/iis5.0 Ultra Long file name request has a vulnerability
Vulnerability Description:
Affected version:
Microsoft IIS 5.0
+ Microsoft Windows NT 2000
Microsoft IIS 4.0
+ Microsoft Windows NT 4.0
+ Microsoft BackOffice 4.5
-Microsoft Windows NT 4.
19, ASP home page. inc File Leak problem
Vulnerability Description:
Affected version: Any system that provides ASP services
Remote: Yes/Local: Yes
Content Summary:
When an ASP's home page is being made and not finished debugging, it can be added as
6. ASP Program Password verification loophole
Vulnerability Description:
Many web sites put passwords into the database and use the following SQL for login verification (for example, ASP)
Sql= "SELECT * from user where username= '" &username& "' and
1. How to solve the problem of browsing ASP page, read only in local buffer!
Response.expire =0
2. The authentication number of the login is generated?
For:
respectively output hour (logtime), Minute (LogTime), Second (LogTime) (they do not need to
Using System;
Using System.IO;
Using System.Text;
Namespace superdata.asp
{
ASP Crack Program
Function:
1. Encrypt a file: encodefile (source file, target file), Encodefile (source directory, target directory, filename)
2. Decrypt a file:
1. The entire page has no submit button, there is no related script, only The first question is the basic knowledge of HTML, the default action of the image element is submit.
2. The file size can be displayed on the page after adding the attachment,
##############################################
This article all code copyright belongs to [rain wave], reprint please declare
##############################################
ASP is not the most vulnerable technology, but to prevent hacker attacks
And
ways to not refresh page queries
function Loadinsel ()
{
var employeeid,employeelastname; Store employee ID and employee name separately
Root=document.all.xmlemployees.childnodes.item (0); Returns the first element--employee
for
Whether you believe it or not, through the ASP, it may be easy to invade the Web server, the theft of files on the server, capture the Web database, such as the user password, or even malicious delete files on the server until the system damage,
What is the most effective way to reference a field value in a recordset?
So far, I have used names to refer to the values of the fields in the recordset. This can be a very inefficient approach because each call requires a lookup domain. To prove
Xi. is it a good way to collect output with a temporary string?
This question comes from the suggestion of my latest article. The core of the problem is the use of buffering, and the use of temporary strings to collect Response.Write output, so that
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.