473,401 Members | 2,146 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,401 software developers and data experts.

Creating a Security Graphical Verification system

underscore
hello to all TSD.

can you help me how to create a SECURITY GRAPHICAL VERIFICATION using PHP?


thnx....
Sep 14 '07 #1
5 1347
pbmods
5,821 Expert 4TB
Heya, Underscore.

You mean like re-Captcha?
Sep 14 '07 #2
reCaptcha is cool, but if you want something local, I use the stuff I've posted about at [link removed] (hope the admins don't get ****ed for me posting the link). I took the code that individual posted and modified it as indicated in that post to be a bit more difficult.

If you want something a bit more simple and yet effective, you could always add in javascript to create the form. Most crawlers can't parse javascript and so can't detect your form. Just depends on what you want to do and if you want to require javascript to be run by the visitor.
Sep 15 '07 #3
pbmods
5,821 Expert 4TB
Not ***ed, but I did have to remove the link.

You are welcome to post your code as an attachment or in your post text.
Sep 15 '07 #4
kovik
1,044 Expert 1GB
Using the GD library in combination with custom fonts and image alteration algorithms should do the trick. Just be aware that CAPTCHAs are becoming less and less effective and web developers are beginning to move on to more foolproof methods such as asking logical questions to the user that must be answered.
Sep 16 '07 #5
thanks for all information.. i try to research what u have advise
Sep 17 '07 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: The Eeediot | last post by:
Hello, ASP.NET gurus! I have read many pages on setting up a login screen to access a number of web pages using Forms Authentication and I am still trying to wrap my brain around the whole thing. ...
9
by: Niels Jensen | last post by:
Hi All, I'm desperately looking for help regarding the following: I need to make a hexmap in it's own scrollable window on a form, when I say hex map I mean a graphical hexagon surrounded by...
0
by: Mesut KoÅŸucu | last post by:
hi all i need help about web services security. i have 2 server and 1 client. one of servers include verification web services and verification database , the other server includes database,...
15
by: David Thielen | last post by:
Hi; My ASP.NET app (C# calling J# under .net 2.0) creates a png file in a subdirectory to display as part of the created page. However, the bitmap will not display due to a security violation. ...
6
by: google | last post by:
I have a few general questions. I am working on a new database to be used within my company. I would like to give a couple of people, particularly HR, the ability to add and delete Access users,...
0
by: pwilliams | last post by:
NCOALink Change of Address Verification Each year over 40 million Americans change their mailing addresses. This change is equivalent to every person in California deciding to change addresses...
0
by: ronscottlangham | last post by:
I am working on a custom WCF EndpoingBehavior that will modify the messages coming in and out of my Service. I am having an error related to the modification of the message in the...
7
by: PW | last post by:
Any suggestions, knowledge base articles, books? We are not going to go field level but now we have a couple clients that would like to limit what employees can see of our application (forms and...
1
by: aditi kauts | last post by:
Hi I am implementing security on Contact base smart card which follows scosta template. In card structure ef is directly under DF and DF is directly under MF. According to the template i am...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.