Data | Database This article introduces a new method of using ASP technology to realize database query in Flash, which not only hides the client completely. asp programs, and Flash's ease of use, graphics make your Web page unique.
Basic principle
Objective:
This example is very simple, and the main purpose of this example is to familiarize you with the creation of a SQL-complex CRL function.
In the Web page to pass variables, usually first encoded, and then decoded. In. NET implementation
Asp.net | overview | file name | Chinese 假设要下载一个“中华.doc. This name is from within the database read.
The following to ASP as an example to explain.
The key is the file name of the Chinese part of conversion
Href = ". /files/
Ile.
The Server.URLEncode function in asp.net is not the same as the value returned by the Server.URLEncode function in ASP.
Test code:asp.net: Response.Write (Server.URLEncode ("Assembly")); return:%e6%b1%87%e7%bc%96ASP: Response.Write Server.URLEncode
/* Google translation PHP interface
* Official Written 2009-03-28
* http://blog.csdn.net/aprin/
* Note: If the translated text is UTF-8 encoding, delete the mb_convert_encoding function
*/
Class Google_api_translator {
Public $url =
Program sometimes you may encounter a problem, that is, a description of the program is too long, written in the same line seems to give him very difficult and ugly, so want to change the narrative line to continue writing.
People familiar with
Data | database
first, the introduction
In the Dynamic Web page design, ASP and Flash technology have been widely used. ASP has a powerful database processing functions, Flash can realize interactive vector animation, flash and ASP to achieve the
Error | Tips when error coding in ASP it ' s not as rich a environment as other environments. I really only reports
That is there was a error with some Numbers and descriptions. There is only a few way ' I ' ve found to
This is the end user of the
Passwords are often saved with MD5, and many times are in the 16-bit binary format of the md5,php inside MD5 ($STR, true) can be easily obtained. More often MD5 result is a set of 32 characters of a string, in fact, the conversion is very simpleThe
Through the first nine of the theory and practice, I believe that we have a systematic understanding of ASP, although so far, we have only learned the ASP's 4 built-in objects, but has been able to write a number of practical small programs. Today,
Because it has been not believed that Java can not mix to display a number of languages of the bug, this weekend to study the servlet, JSP in the multinational language display problem, that is, the servlet's multiple character set problem, because
Download
The shadowing of the download path is done by passing the ID in one database and then reading the path in the database by passing the ID on another page.
1, C # Implementation of the method (only need. ASPX. CS code is OK)
String sel_sql=
In general, we can direct the user to download files by directly having the URL point to a file located under document root.
However, in doing so, there is no way to do some statistics, permission checks, etc. work. So, a lot of times, we use to
asp.net| Thumbnail | page | show
There may be many pictures on the website, such as product pictures, and they may be different sizes, width and height are not necessarily the same, some very large some very small. If you put it on a Web page, may
Two-dimensional barcode/Two-D code can be divided into stacked/row-type two-dimensional barcode and matrix two-dimensional barcode. Stacked/row-type two-dimensional barcode form is a multiple-line short section of one-dimensional bar code stacked;
Do user login, I always use form to verify the way. Sometimes, in order to save time, users want the user name input box to remember the user name, so that the next time to re-enter. This is not a good time to use form validation, because form
Cross-station script attack (III)
Part two: Anti-crime of cross-station script attack
First, how to prevent the server from cross-station script attack
Thankfully, the technology to prevent a Cross-site script attack is becoming perfect. There
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.