One, Err object
The Err object does not need to create an instance when used, which means that you use it as a session.
The Set Conn=server.createobject ("ADODB") does not need to be used like a ADODB object. Connection ") to create an instance that returns an error code.However, Err!=err.number can be cleared with the clear method for the next use. It is mainly a description method, which returns a brief error description, here is a classic example
This article mainly introduces the ASP.net implementation of forms authentication based on the WebService application, example analysis of the use of forms for WebService identity authentication of the relevant skills and implementation methods, the need for friends can refer to the
In asp.net programs where security requirements are not very high, forms based authentication is a common way to use, and if you need to authenticate webservice, the most
excel|odbc| data flutter and 8/30/2001 4:52:49 PM add in Joy asp← return suites:
Example:
There is an Excel table book1.xsl in "C:\excel\book1.xls", and the table is structured as follows:
1 Ordinal name Amount
2 1 Sheets 3,100
3 2 Lee 4,200
4 3 King 5,300
The ordinal field is not empty
Note: The Excel start line is 1 instead of 0
Set xlapp = server. CreateObject ("Excel.Application")
strsource = "C:\ex
Function
Have you ever encountered the need to take a string of some values and not to start? Do you feel that reading or teaching material is confused with the writing of split ... If you have this question, please see below my explanation to the example, I believe you will have a certain understanding of this.Let me introduce the use of the split function:Array of return values = Split ("string", "separator")Suppose the variable strurl holds the URL
The cookie is present on the hard disk, ie the place where the cookie is stored is different from the place where Firefox stored the cookie. Different operating systems may not have the same place to store cookies. different browsers store cookies in their own separate spaces and do not interfere with each other . in my Windows7, IE8, for example, a cookie exists this: C:\Users\xiaoj\AppData\Local\Microsoft\Windows\Temporary Internet Files Note: Cache
In many Web applications, we encounter a lot of places where we need to dynamically insert multiple rows of records. For example, on the talent website, when we fill in the resume, we have to fill in our project experience, we can according to their actual situation dynamically add the number of, this is not a separate page to add, this dynamic add is on the same page dynamically added, and finally submitted to the server together to save to the datab
The method of using split to implement array operation under ASP
An example of Split function in ASP
Have you ever encountered the need to take a string of some values and not to start? Do you feel that reading or teaching material is confused with the writing of split ... If you have this question, please see below my explanation to the
use simple stored procedures. Let's look at a slightly more complex stored procedure to learn more about the application of the stored procedure.
third, the actual application of the stored procedure
User login in the ASP project is often used, I believe many friends have done similar systems, but the use of stored procedures to do the validation of friends may not be many, then we do it as an example,
The ASP shortname and ShortPath properties are those that take the short name or path of the file
The ShortPath property is used to return the file or folder specified by the short path (8.3 naming convention).
GrammarFileobject.shortpathFolderobject.shortpath
For example, a file object
Dim fs,fSet Fs=server.createobject ("Scripting.FileSystemObject")Set F=FS. GetFile ("C:asp_test_webhitcounterfile.txt"
ASP FSO IsRootFolder and Fiilesystemobject Drive properties Let's take a look at the FSO Dirve attribute usage.
The drive uses the property restitution drive in the specified file or folder.
GrammarFileobject.driveFolderobject.drive
For example, a file object
Dim fs,fSet Fs=server.createobject ("Scripting.FileSystemObject")Set F=FS. GetFile ("C:test.txt")Response.Write ("File resides on drive:")Response
In some cases of grasping and filtering, the advantage of regular expression regular expression is obvious.
For example, a string that resembles the following:
Copy Code code as follows:
Now you need to extract the URLs behind the href, [] within the date, and the linked text.
Here's how C #, ASP, and Javascript are implemented
implementation of C #
Copy Code code as follows:
fso| Skills
Next, the following example specifically covers the question of the open method, remember? Under normal circumstances, open the file is to use the FSO. OpenTextFile ("C:\testfile.txt", 1), and the function of parameter 1 is to open the file in read-only mode. This file cannot be written to. What if a file already exists and an append write is required? Simple, the parameter is 8.
What's the use? Oh, Amazon's network story solitaire is so:
ASP AppendToLog Example Tutorial
The AppendToLog method adds a string to the end of the server log entry for this request. You can call this method multiple times in a script. Whenever it is called a log entry that will append the specified string.Grammar
Response. AppendToLog String
Parameter descriptionString: Required. Text is attached to the log file (cannot contain any comma chara
JSON (Object notation) I think this name is not unfamiliar to everyone, it is a lightweight data interchange format, is directly generated by the service of the statement, the client is obtained directly with the Eval method to obtain this object, so you can save parsing XML Parsing brings performance issues and compatibility issues, and is very easy to use, you can easily traverse the array and access to object properties to obtain data, its readability is also good, basically have the nature o
Program | example | Thief program
Now online more popular thief program, there are news thieves, music thieves, download thieves, then they are how to do it, I would like to do a simple introduction, I hope to help you webmaster.
(i) principle
The thief program actually invokes pages on other Web sites through the XMLHTTP component in the XML. For example, the News thief program, many are called Sina's ne
system error.The reason for the error is that there is a conflict between the two different ways, to solve the problem, you need to add a constraint to Mappageroute, then use the Irouteconstraint interface, see the following code: Public class Mycustomconstraint:irouteconstraint { publicboolstring parametername, routevaluedictionary values, Routedirection routedirection) { return routedirection = = routedirection.incomingrequest; } }Then modify the statem
Whenever we want to build a database-driven personalized web site, we must protect the user's data. Although hackers can steal a person's password, the more serious problem is that someone can steal the entire database, and then immediately all the passwords.
Principle
It is a good practice not to store the actual passwords in the database, but to store their encrypted versions. When we need to authenticate the user, we simply encrypt the user's password and then compare it to the encrypted pa
on an article: ASP Development Example of WAP Simple mail system
3) Send mail
Figure Five
The implementation of the function of sending mail mainly uses the Jmail.message object to complete, about the object to use the relevant knowledge has been described in the previous, you can be the above functional introduction and source control to read, so as to help understand the entire mail delivery process,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.