by: TG |
last post by:
I have a validation form that must behave differently based on the results
of a PHP validation check. I have a post command at the top of my form that
calls itself. I don't leave the form when...
|
by: Herman Geldenhuys |
last post by:
Oops! Sorry guys, wrong list...
Apologies.
----- Original Message -----
From: Herman Geldenhuys
To: python-list@python.org
Sent: Wednesday, January 28, 2004 4:54 PM
Subject: Security...
|
by: iam247 |
last post by:
Hi
In my prototype asp page (with no javascript and no password
validation, I have a registration form with the following action:
<form name="form" method="post" action="RegDetails.asp">
...
|
by: honcho |
last post by:
My ASP.NET web application has a flaw that produces false security-violation
alarms.
There are several categories of users for this web site, e.g. Colonels,
Sergeants, Private_1s,
and...
|
by: John |
last post by:
I need to add some spammer security to my mailform. But all image-validation
scripts I've tried to include just won't work together with my form
processing script (a script wich works really good)....
|
by: OriginalBrownster |
last post by:
Hi there:
I just had a quick thought of something that might be useful to me when
creating my web app and I wanted some help on the idea; since this
group has been helpful in the past.
in my...
|
by: alf |
last post by:
Hi,
I use smtpd for the SMTP server in my app, but I need a little bit more
as far as immediate MAIL_FROM/RCPT_TO validation. Returning from
process_message is too late SMTP protocol-wise.
...
|
by: gagandeepgupta16 |
last post by:
Hi
I am working on an entry form using validation controls in ASP.NET.
I have two controls which requires custom validators, no issue in using plain custom validators.
But when i am using...
|
by: munkee |
last post by:
I opted not to use the built in security management within access 2003. I have created my own authentication this typically comprises of a userID and password with a user assigned to a group.
...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|