by: Craig Bailey |
last post by:
I've been using this pattern to verify email addresses:
^(+)(+)@(+)\.(+)
But I've recently discovered that addresses with a dash in them won't
pass this test.
Seems to me they should pass....
|
by: Dynamo |
last post by:
Hi
The following script was taken from John Coggeshall's (PHP consultant) in his
article on Zends site at http://www.zend.com/zend/spotlight/ev12apr.php
// Get the email address to validate...
|
by: Abhishek Shrivastava |
last post by:
Hi,
I have Windows 2000 Server with all updates, installed VisualStudio.NET 2003
Enterprise Developer Edition.
It installed OK but if I try to add New Item with Data Form Wizard for a
windows...
|
by: Larry R. Baker |
last post by:
What is the best way to pull a pc's Mac Address from a web page?
Larry
|
by: M |
last post by:
Hi,
it's possible to append a custom action
to a client-side verification of a validation control ?
I have a validator summary control that shows
(automatically) a message box if the validation...
|
by: cemcat |
last post by:
Hello,
We have an ASP.NET 2.0 (C#) web form that contains a textbox for users to
enter multiple e-mail addresses separated by semicolons. We need to
validate that each individual e-mail address...
|
by: comp.lang.php |
last post by:
I wrote a method that should check if an email address is valid. In
another method I've already checked to see if $_POST exists
and is well-formed, so those checks are not necessary in this scope....
|
by: Mike |
last post by:
Hi all,
In my recent ASP.NET 2.0 appl, I need to verify that the supplied email address is valid or not. So, here's my situation:
- In my <profilearea, I created <isVerifiedproperty.
- Suppose a...
|
by: Paulo |
last post by:
Hi, I have a webform wich already has some validation controls, some
required fields, etc, and I have a external .js file wich does crc
verification on 1 field, and I would like to put that file...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|