by: Fotios |
last post by:
Hi guys,
I have put together a flexible client-side user agent detector (written in
js). I thought that some of you may find it useful. Code is here:
http://fotios.cc/software/ua_detect.htm
...
|
by: Scott M. |
last post by:
How can I disable the cross-site scripting check for one particular page of
a site?
|
by: Buddy Ackerman |
last post by:
I have a form into which users will enter text. I want the user to be able to enter "some" HTML however I would like to prevent "bad" HTML. The "bad" HTML would be things like <SCRIPT>, <OBJECT>,...
|
by: hoz |
last post by:
Hi ,
i have a web from contains textbox and insert to db button .When i write
html tags inside text , the code is blocked , how can i enter information
like ?
<p> Hi </p>
thanks
|
by: phal |
last post by:
Hi
I think there are many different browsers to browse to the Internet,
how can I write the javascript to identify different browser and
display according to the users. Some browser disable the...
|
by: abcd |
last post by:
I have a web application mainly written in ASP. How can I prevent my pages
like login.asp and other important pages from Cross-site scripting malicious
attacks. What precautions should I take. ?
...
|
by: Jonathan Wood |
last post by:
Okay, I have a site that displays information based on user input, a couple
of the items are plain strings that the user entered.
I understand the risk here is that they could insert javascript...
|
by: RobG |
last post by:
Seems developers of mobile applications are pretty much devoted to UA
sniffing:
<URL: http://wurfl.sourceforge.net/vodafonerant/index.htm >
--
Rob
|
by: Petyr David |
last post by:
I've seen a few ideas - figured I'd run it up the flagpole and see if
anyone saluted
Thanks in advance
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|