Interactive CGI Tutorial - Code Example 7.3
http://www.cs.virginia.edu/~lab2q/lesson_7/
# Define function display_page.
def display_page(result, id, session_key = 0):
print HTML\n
print HEAD\n
print \tTITLEInfo Form/TITLE\n
print /HEAD\n
print BODY BGCOLOR = white\n
On 21 ago, 11:14, epsilon [EMAIL PROTECTED] wrote:
I'm having trouble with this script from a CGI lesson I'm working and
I can't seem to figure it out. I was wondering if someone could tell
me what is wrong. I've spent several hours trying to debug, but no
success. Any help would be
Gabriel,
Thanks a bunch for your time! That took care of it.
Christopher
Gabriel Genellina wrote:
On 21 ago, 11:14, epsilon [EMAIL PROTECTED] wrote:
I'm having trouble with this script from a CGI lesson I'm working and
I can't seem to figure it out. I was wondering if someone could
Gabriel Genellina wrote:
[...]working crystall balls are hard to find nowadays :)
Well, judging by the OP's response you appear to be in possession of a
pair :-)
regards
Steve
--
Steve Holden+1 571 484 6266 +1 800 494 3119
Holden Web LLC/Ltd http://www.holdenweb.com
On 21 ago, 20:10, Steve Holden [EMAIL PROTECTED] wrote:
Gabriel Genellina wrote:
[...]working crystall balls are hard to find nowadays :)
Well, judging by the OP's response you appear to be in possession of a
pair :-)
Great-grandmother's legacy, and not for sale!
--
Gabriel Genellina
--
Lawrence D'Oliveiro wrote:
In message [EMAIL PROTECTED], Steve
Holden wrote:
Credit card numbers should be encrypted in the database, of course, but
they rarely are (even by companies whose reputations imply they ought to
know better).
How would encryption help? They'd still have to be
In message [EMAIL PROTECTED], Steve
Holden wrote:
Lawrence D'Oliveiro wrote:
In message [EMAIL PROTECTED], Steve
Holden wrote:
Credit card numbers should be encrypted in the database, of course, but
they rarely are (even by companies whose reputations imply they ought to
know better).
Lawrence D'Oliveiro [EMAIL PROTECTED] writes:
lower. Just last week a police employee in my class told us of an
exploit where a major credit card copmany's web site had been hacked
using a SQL injection vulnerability. This is usually done with the
intent of gaining access to credit card
Lawrence D'Oliveiro wrote:
In message [EMAIL PROTECTED], Steve
Holden wrote:
Lawrence D'Oliveiro wrote:
In message [EMAIL PROTECTED], Steve
Holden wrote:
Credit card numbers should be encrypted in the database, of course, but
they rarely are (even by companies whose reputations imply
In message [EMAIL PROTECTED], Steve
Holden wrote:
Credit card numbers should be encrypted in the database, of course, but
they rarely are (even by companies whose reputations imply they ought to
know better).
How would encryption help? They'd still have to be decrypted to be used.
--
In message [EMAIL PROTECTED], Clodoaldo
Pinto Neto wrote:
2006/10/4, Tim Chase [EMAIL PROTECTED]:
The code is very dangerous...allowing any ol' schmoe to run
arbitrary code on your server. At the barest of minimums, I'd
plaster the code with warnings that this is a Very Dangerous
Thing(tm)
content is great, my comments are editorial.
I prefer PDF with bookmarks rather than HTML.
1. easy to print the whole thing and read offline.
2. easy to find a secion from bookmarks, rather that chasing links
3. easy to save on my local doc folder so I can be sure It will always be
there. (i.e.
On 10/5/06, Sells, Fred [EMAIL PROTECTED] wrote:
content is great, my comments are editorial.
wrt what document?
I prefer PDF with bookmarks rather than HTML.
1. easy to print the whole thing and read offline.
2. easy to find a secion from bookmarks, rather that chasing links
3. easy to
Sells, Fred wrote:
content is great, my comments are editorial.
I prefer PDF with bookmarks rather than HTML.
clip
If you choose to go the PDF route, I've found OpenOffice 2.0 pretty good at
generating PDF with bookmarks. Just don't get too complex or OO may hose
you.
Since you replied
[EMAIL PROTECTED] wrote:
Clodoaldo Pinto Neto wrote:
print 'pThe submited name was ' + name + '/p'
Bzzt! Script injection security hole. See cgi.escape and use it (or a
similar function) for *all* text - HTML output.
open('files/' + fileitem.filename, 'w')
BZZT. filesystem
Clodoaldo Pinto Neto schrieb:
http://webpython.codepoint.net
Great tutorial -- Thanks a lot!!!
:D
--
Gerold Penz - bcom - Programmierung
[EMAIL PROTECTED] | http://gerold.bcom.at | http://sw3.at
Ehrliche,
Clodoaldo Pinto Neto wrote:
print 'pThe submited name was ' + name + '/p'
Bzzt! Script injection security hole. See cgi.escape and use it (or a
similar function) for *all* text - HTML output.
open('files/' + fileitem.filename, 'w')
BZZT. filesystem overwriting security hole, possibly
[EMAIL PROTECTED] wrote:
Clodoaldo Pinto Neto wrote:
print 'pThe submited name was ' + name + '/p'
Bzzt! Script injection security hole. See cgi.escape and use it (or a
similar function) for *all* text - HTML output.
open('files/' + fileitem.filename, 'w')
BZZT. filesystem
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
Regards, Clodoaldo Pinto Neto
Perhaps you want to post this to the mod_python list as well:
http://mailman.modpython.org/mailman/listinfo/mod_python
--
http://mail.python.org
Clodoaldo Pinto Neto wrote:
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
I'm not an expert, but I have written a lot of these and I have a
couple of $0.02's.
* All code you put in your writing needs to be correct
On 5 Oct 2006 14:56:54 -0700, Jim [EMAIL PROTECTED] wrote:
* You need a DEBUG variable:
from defaults import DEBUG
:
if DEBUG:
..
WADR, there is a more formal way to do this:
http://docs.python.org/ref/assert.html
Use -O to remove the assert statements, essentially: -O
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
Regards, Clodoaldo Pinto Neto
--
http://mail.python.org/mailman/listinfo/python-list
I'm just building a Python CGI Tutorial and would appreciate
any feedback from the many experts in this list.
First item of feedback...post something on which to give
feedback, such as a link to the work in progress. :)
-tkc
--
http://mail.python.org/mailman/listinfo/python-list
Clodoaldo Pinto Neto wrote:
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
http://webpython.codepoint.net
--
http://mail.python.org/mailman/listinfo/python-list
Clodoaldo Pinto Neto wrote:
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
http://webpython.codepoint.net
--
http://mail.python.org/mailman/listinfo/python-list
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
http://webpython.codepoint.net
Thanks! :)
My first note would be regarding
http://webpython.codepoint.net/shell_commands
The code is very dangerous...allowing any ol' schmoe
2006/10/4, Tim Chase [EMAIL PROTECTED]:
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
http://webpython.codepoint.net
Thanks! :)
My first note would be regarding
http://webpython.codepoint.net/shell_commands
The code
Several times you improperly spell syntax sintax. Other than that
it appears to be an excellent tutorial.
Clodoaldo Pinto Neto wrote:
I'm just building a Python CGI Tutorial and would appreciate any
feedback from the many experts in this list.
Regards, Clodoaldo Pinto Neto
--
http
28 matches
Mail list logo