FSO, as exciting as the UFO, fascinating, of course, more people are happy to let people worry. You do not see a space service provider advertising: 100MB space as long as 60rmb/years, supporting the database, support what what ... A question does
Password login test after running test.htm ~!
-------------------------test.htm code is as follows:
marginheight= "1" border= "0" scrolling= "no" >
--------------------------test.asp code is as follows:
' This code is only for attack the
In the process of technological renewal, there are still some people who die clinging to something that is already too angry. There are some people who enter the new world, but still can not get rid of the old habits. I didn't use the word "bad
Can I include files dynamically?
April 23, 2001
What is dynamic include?
Answer
Let's start with one case:
' Get the province where the user is
Dim Province
Province = Request.Form ("province")
' The information in this province is shown below
%>
"--
With the development of Internet, web technology is changing with each passing day. After the Common Gateway Interface (CGI), "ASP" (Active Server Pages) as a typical server-side web design technology, is widely used in online banking, E-commerce,
ASP Simple Chat Room program two
var nothing;Response.AddHeader ("Cache-control", "No-cahce");if (! Session.Contents ("Chat_user")){Session.Contents ("chat_user") = "Guest";Session.Contents ("chat_time") = (new Date). GetTime ();}if
Do not change the original character display!such as select* replaced by & #115; elect*This will not damage the data, but also safe!Where I didn't think of it, please correct me.
Response.Write checkrequest ("str")
' ===============================
I made a website www.zydn.net, it is a personal homepage, although not in the name of the individual, but it is only me to do this thing, I stand a set of back-Office system, with ASP, the host with the million nets, but yesterday I surf the
I think it is safe to have the user password encrypted (relative), isn't it?
Here is the MD5 encryption algorithm!
Private Const Bits_to_a_byte = 8
Private Const Bytes_to_a_word = 4
Private Const Bits_to_a_word = 32
Private M_lonbits (30)
Private
There will always be many ways to expose the original ASP program, resulting in the database password path can easily be other people to get, so the implementation of the ASP program encryption processing is a good solution. Here's a tool to
Appendix C: Best Practices for network security
Steve riley,microsoft Communications Industry Solutions Group Consulting Practice
August 7, 2000
This essay discusses the best solution for network design and security. Although there are many ways to
This loophole is actually a lot of sites exist, especially the use of ASP to write chat rooms, BBS, etc. (Other languages I do not understand, but I think there will be in this respect
of the hole. )。
In general, when we verify that the user is
ASP authentication Code Source code
Call method, is b.htm page
Update
Let's save the following page as a 111cn.asp
Option ExplicitResponse.Expires = 0Response.AddHeader "Pragma", "No-cache"Response.AddHeader "Cache-ctrol",
'==================================================' Function name: GetArray' Function: Extract link address, separated by $array$' Parameter: Constr------Extract the original character of the address' Parameter: startstr------start string'
In the ASP encryption method has the corresponding decryption method is not much, and now according to the predecessor data in the ASP encryption and decryption function
Rsa.asp
REM Encryption and decryption in ASP, encryption method: according to
View system logsThe iis server cannot load the application '/lm/w3svc/1/root/test '. Error: 'No registered categoryMicrosoft windows xp [Version 5.1.2600](C) Copyright 1985-2001 microsoft corp.C: documents and settingsadministrator> cd % windir %
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.