Ewebeditor and fckeditork,90% sites are using these two editors as product or content of the description part of the editing window, recently, a customer's foreign trade site is almost finished, because of customer product classification, so that
A robust and practical Ajax two-level linkage menu (with demo and source package download)
Some days in the background of the time to use the two-level linkage of the menu, to the Internet to find a half-day also did not find satisfaction,
Ewebeditor and fckeditor,90% sites are using these two editors as product or content of the description part of the editing window, recently, a customer's foreign trade site is almost finished, because of customer product classification, so that
A strong and practical Ajax level-2 linkage menu (with demo and source attached)ProgramPackage and download)
I used the level-2 linkage menu when I was working on the background the other day. I was not satisfied after I went online for a long
Mainly to prevent several areas of asp:First, the address bar parameter injection, is to use Request.QueryString to get the value of thisSecond, the form parameter injects, is uses the Request.Form to obtain the value theThird, cookiesIn fact, can
HTML to UBB and UBB to HTML
Function Pattern (STR)
{
//
STR = Str. Replace (/(\ r \ n | \ r)/ig ,'');
STR = Str. Replace (/] *>/ig, '\ n ');
STR = Str. Replace (/ \/] * \/>/ig, '\ n ');
STR = Str. Replace (/\ [Code \] (. + ?) \ [\/Code \]
By Link
{Hazard. The problem will cause hackers to construct malicious statement injection to indirectly obtain webshell}
Many files use the che function to filter post or get variables.
Is the che function safe. Let's take a look. :
Function che
http://shashoutian2005.blog.163.com/blog/static/168541520093211750982/
http://apps.hi.baidu.com/share/detail/7168280
This is very practical:
private static Regex regnumber = new Regex ("^[0-9]+$"); private static Regex regnumbersign = new
Security | data | database | display
For example have styledesc this field, the data request is 50 bits, char shape, can limit him only 50 bits, other not limit, enter any character to be possible. As long as it's char, it's OK as long as the
Security | data | database | display | security
For example, there is a styledesc this field, the data requires 50-bit, char, can only limit his 50-bit, other unrestricted,You can enter any character. As long as it's char, it's OK as long as the
'================================================' Function name: Findmatch' function: Interception of matched content' Return value: After the intercepted string'================================================Public Function Findmatch (ByVal str,
A good UBB coding function implemented in JavaScript: function JsUBB (str)
{
Var re = // [I/] (. [^/[] *)/[// I/]/gi;
Str = str. replace (re ,"
$1"); // Italics
Re = // [B/] (. [^/[] *)/[// B/]/gi;
Str = str. replace (re ,"
$1"); // Bold
Re = // [u/]
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.