Roose [EMAIL PROTECTED] writes:
Well, then of course you know I have to say: An OS does not run inside a
browser. There's a sentence I never thought I'd utter in my lifetime.
So that is an irrelevant example, since it obviously isn't a task scheduler
in the context of this thread.
Huh?
Martin MOKREJ¦ [EMAIL PROTECTED] writes:
I have sets.Set() objects having up to 20E20 items,
just imagine, you want to compare how many words are in English, German,
Czech, Polish disctionary. You collect words from every language and record
them in dict or Set, as you wish.
Once you
Mark Carter [EMAIL PROTECTED] writes:
Also, is there a good tool for writing database UIs?
Yes, quite a few.
Ah yes, but is there really? For example, I did a search of the TOC of
GTK+ Reference Manual:
Try looking on freshmeat or sourceforge instead.
--
=?windows-1252?Q?Martin_MOKREJ=8A?= [EMAIL PROTECTED] writes:
Yes, I'm. I still don't get what that acronym CLRS stands for ... :(
CLRS = the names of the authors, Cormen, Leiserson, Rivest, and Stein,
if I spelled those correctly. :)
--
http://mail.python.org/mailman/listinfo/python-list
I need to set up a wiki for a small group. I've played with MoinMoin
a little bit and it's reasonably straightforward to set up, but
limited in capabilities and uses BogusMarkupConventions. I want to
use it anyway because I need something running right away and I don't
want to spend a whole lot
Brion Vibber [EMAIL PROTECTED] writes:
MediaWiki should run with PHP configured in CGI handler mode, but
these days mod_php has got its claws just about everywhere anyway. If
you control your own server and don't have multi-user security
worries, mod_php is simple enough to install and will
Torsten Mohr [EMAIL PROTECTED] writes:
i'd like to pass a reference or a pointer to an object
to a function. The function should then change the
object and the changes should be visible in the calling
function.
Normally you would pass a class instance or boxed object, and let the
function
Steve Holden [EMAIL PROTECTED] writes:
Well I for one disagreed with many of your estimates of the zen's
applicability to macros, but I just couldn't be arsed saying so.
Well, I was being somewhat flip with them, as I felt Carl was being
snotty in referring me to the Zen list. The point there
Alexander Schremmer [EMAIL PROTECTED] writes:
I need to set up a wiki for a small group. I've played with MoinMoin
a little bit and it's reasonably straightforward to set up, but
limited in capabilities and uses BogusMarkupConventions.
At which point do you see limitations?
It doesn't
Richie Hindle [EMAIL PROTECTED] writes:
[MoinMoin] doesn't have [...] automatic update notification for
specific pages of your choice
Yes it does. See http://entrian.com/sbwiki for example - register there
and you'll see in your preferences Subscribed wiki pages (one regex per
Oh
kpp9c [EMAIL PROTECTED] writes:
These are analog tapes that were digitized (on to CD or a digital tape)
that have now been exported as individual files that are meant to be
part of an on-line audio archive. ...
I was hoping and
praying that some one here was feeling generous and show me the
Robin Becker [EMAIL PROTECTED] writes:
A few months ago I tried and failed to get squirrelmail/php to run
with Apache2 and freeBSD 4.9. It seems that php prefers the old style
apache 1.3 work flow. I got some help from the php guys, but not
enough. I suppose I could have run a separate
Alexander Schremmer [EMAIL PROTECTED] writes:
It doesn't have features that MW has, like user pages,
It does.
Oops, correct, however, they're not anything like MW's, which are
almost like an internal email system inside the wiki. You can sign
any comment with ~~~ or and it generates a
[EMAIL PROTECTED] writes:
2. One could proposed hygienic pattern-matching macros in Python,
similar to
Scheme syntax-rules macros. Again, it is not obvious how to
implement pattern-matching in Python in a non-butt-ugly way. Plus,
I feel hygienic macros quite limited and not worth the effort.
Case Nelson [EMAIL PROTECTED] writes:
Basically, the program needs to take in a random list of no more than
10 letters, and find all possible mutations that match a word in my
dictionary (80k words). However a wildcard letter '?' is also an
acceptable character which increases the worst case
[EMAIL PROTECTED] (David M. Cooke) writes:
lists of incoming links to wiki pages,
...
Most Wiki implementations (MoinMoin included) have this, by using a
search. Usually, following the original Wiki (http://c2.com/cgi/wiki)
model, you get at it by clicking on the title of the page.
[EMAIL PROTECTED] writes:
I can't imagine how it could be worse than the learning curve of
__metaclass__, which we already have.
To me, learning macros *and their subtilities* was much more difficult
than learning metaclasses.
I guess I've only used Lisp macros in pretty straightforward
Alexander Schremmer [EMAIL PROTECTED] writes:
How does it do that? It has to scan every page in the entire wiki?!
That's totally impractical for a large wiki.
So you want to say that c2 is not a large wiki? :-)
I don't know how big c2 is. My idea of a large wiki is Wikipedia.
My guess is
Paul Rubin http://[EMAIL PROTECTED] writes:
How does it do that? It has to scan every page in the entire wiki?!
That's totally impractical for a large wiki.
So you want to say that c2 is not a large wiki? :-)
I don't know how big c2 is. My idea of a large wiki is Wikipedia.
My
drs [EMAIL PROTECTED] writes:
Hi, I need to send secure data over an insecure network. To that end, I am
needing to encrypt serialized data and then decrypt it. Is there a builtin
way to do this in Python? MD5, SHA, etc encrypt, but I am not seeing a way
to get back my data.
No, Python
Ian Bicking [EMAIL PROTECTED] writes:
That sounds like you'd be implementing your own filesystem ;)
Yes, this shouldn't be any surprise. Implementing a special purpose
file system what every database essentially does.
If you are just trying to avoid too many files in a directory, another
Ian Bicking [EMAIL PROTECTED] writes:
If the data has to be somewhere, and you have to have relatively
random access to it (i.e., access any page; not necessarily a chunk of
a page), then the filesystem does that pretty well, with lots of good
features like caching and whatnot. I can't see a
Simon Wittber [EMAIL PROTECTED] writes:
Is there a legitimate use for classic classes that I am not aware of?
Yes, new-style classes don't work in older Python installations. Some
Python users prefer not to be on such a frequent upgrade treadmill, so
they continue to use old versions.
Simon Wittber [EMAIL PROTECTED] writes:
Is there a reason NOT to use them? If a classic class works fine, what
incentive is there to switch to new style classes?
Perhaps classic classes will eventually disappear?
It just means that the formerly classic syntax will define a
new-style
hanz [EMAIL PROTECTED] writes:
But wait if I do that, people will tell me how bad that it is,
because it will keep a reference to the value which will prevent
the garbage collector from harvesting this memory.
Nobody will tell you that it's bad. Python was never about super
performance,
Steven Bethard [EMAIL PROTECTED] writes:
Note that sorted is a builtin function, not a method of a list
object.
Oh, same difference. I thought it was a method because I'm not using
2.4 yet. The result is the same, other than that having it as a
function instead of a method is another
Terry Reedy [EMAIL PROTECTED] writes:
Well, it seems that Guido is wrong then. The documentation clearly
states that an expression is a statement.
no, it says that an expression statement is a statement. if you don't
understand the difference, please *plonk* yourself.
And what else
Venkat B [EMAIL PROTECTED] writes:
I'm looking build a CGI-capable SSL-enabled web-server around Python 2.4 on
Linux.
It is to handle ~25 hits possibly arriving at once. Content is non-static
and built by the execution of py cgi-scripts talking to a few backend
processes.
1) I was
Fredrik Lundh [EMAIL PROTECTED] writes:
Huh? Expressions are not statements except when they're expression
statements? What kind of expression is not an expression statement?
any expression that is used in a content that is not an expression statement,
of course.
Come on, that is
Open the file on windows for writing with wb mode, the b is for binary.
--
http://mail.python.org/mailman/listinfo/python-list
Nick Coghlan [EMAIL PROTECTED] writes:
So, precisely how should one go about cleanly embedding something that
cares about whitespace into a context which doesn't care in the
slightest?
Treat the macro like a function call whose arguments are thunks made
from the macro arguments, or something
Robin Becker [EMAIL PROTECTED] writes:
What exactly are/were the political reasons for rotor removal?
Some countries have laws about cryptography software (against some
combination of export, import, or use). The Python maintainers didn't
want to deal with imagined legal hassles that might
[EMAIL PROTECTED] [EMAIL PROTECTED] writes:
I was wondering whether anyone could recommend a good C++ book, with
good being defined from the perspective of a Python programmer. I
realize that there isn't a book titled C++ for Python Programmers,
but has anyone found one that they think goes
Scott David Daniels [EMAIL PROTECTED] writes:
I understand this to be true. Since I am trying to address encryption
in the zipfile module, and I know you actually follow a bit of the
encryption stuff, can you answer a question or two for me?
Sure, I can try, so go ahead. There's more crypto
Dfenestr8 [EMAIL PROTECTED] writes:
No glaring security holes that you noticed? Other than being able to hide
things in html tags?
Looks like you can also embed arbitrary javascript (I just tried it).
I haven't looked at the script itself yet.
--
Robin Becker [EMAIL PROTECTED] writes:
Presumably he is talking about crypo-export rules. In the past strong
cryptography has been treated as munitions, and as such exporting it
(especially from the USA) could have got you into very serious
trouble.
well since rotor is a german
Tim Peters [EMAIL PROTECTED] writes:
Python's basic list type is a flat vector instead of a
recursively-defined S-expression, and that there's no direct way to
break out of a containing loop from a nested loop.
Huh? [1,2,[3,4,5],[6,7]],8 is a perfectly valid Python list.
And you can
Tim Peters [EMAIL PROTECTED] writes:
Huh? [1,2,[3,4,5],[6,7]],8 is a perfectly valid Python list.
You're claiming not to know any relevant difference between Python
lists and Lisp lists? Heh.
Python doesn't provide syntactic sugar for [1,[2,[3,[4,[] if
that's what you mean.
[EMAIL PROTECTED] (Bengt Richter) writes:
Isn't the SSL dependent on OS or at least shared lib support?
Firefox has its own implementation. IE uses wininet which is built
Windows. I'm not aware of any no-crypto version of Windows but even
if there is one, the US version is running, like,
Robin Becker [EMAIL PROTECTED] writes:
Apparently factorization based crypto is on the way out anyhow (as an
article in Scientific American is reported to claim).
I haven't seen that SA article but I saw the Slashdot blurb. They
have confused quantum cryptography with quantum computation, when
Steve Holden [EMAIL PROTECTED] writes:
But how, in Lisp, would you transliterate the Python list [1, 2, 3, 4]?
With a vector.
Clearly the Python list *is* different, and the tradeoff was to
obtain speed of random access, presumably (I wasn't taking an interest
in Python in its early days)
Reinhold Birkenfeld [EMAIL PROTECTED] writes:
For those of you who don't know what YAML is: visit http://yaml.org/!
You will be amazed, and never think of XML again. Well, almost.
Oh please no, not another one of these. We really really don't need it.
--
andy [EMAIL PROTECTED] writes:
Anybody like to comment on which editor they use for python web app
development -
Emacs
For both discrete and mixed python and html code, and why?
There's no reason to use anything else.
--
http://mail.python.org/mailman/listinfo/python-list
neutrino [EMAIL PROTECTED] writes:
I have a binary file and wish to see the raw content of it. So I open
it in binary mode, and read one byte at a time to a variable, which
will be of the string type. Now the problem is how to print the binary
format of that charater to the standard output. It
Tim Peters [EMAIL PROTECTED] writes:
But at that time, Python didn't have lexical scoping, and it wasn't
clear that it ever would. So what's the bigger wart? Making
listcomps exactly equivalent to an easily-explained Python for-loop
nest, or introducing a notion of lexical scope unique to
Martin v. Löwis [EMAIL PROTECTED] writes:
I'm going by newsgroup messages from around the time that I was
proposing to put together a standard block cipher module for Python.
Ah, newsgroup messages. Anybody could respond, whether they have insight
or not.
Here's the message I had in
Dave Benjamin [EMAIL PROTECTED] writes:
Can we get a show of hands for all of those who have written or are
currently maintaining code that uses the leaky listcomp feature?
It's really irrelevant whether anyone is using a feature or not. If
the feature is documented as being available, it
[EMAIL PROTECTED] (Alex Martelli) writes:
If it changed the semantics of for-loops in general, that would be quite
inconvenient to me -- once in a while I do rely on Python's semantics
(maintaining the loop control variable after a break; I don't recall if
I ever used the fact that the
Nick Craig-Wood [EMAIL PROTECTED] writes:
No, unfortunately; the python-dev consensus was that encryption raised
export control issues, and the existing rotor module is now on its way to
being removed.
I'm sure thats wrong now-a-days. Here are some examples of open
source software with
Fredrik Lundh [EMAIL PROTECTED] writes:
Some languages let you say things like:
for (var x = 0; x 10; x++)
do_something(x);
and that limits the scope of x to the for loop.
depending on the compiler version, compiler switches, IDE settings, etc.
Huh? I'm not sure what you're
A.M. Kuchling [EMAIL PROTECTED] writes:
It was discussed in this thread:
http://mail.python.org/pipermail/python-dev/2003-April/034959.html
Guido and M.-A. Lemburg were leaning against including crypto; everyone else
was positive. But Guido's the BDFL, so I interpreted his vote as being the
Andrew Koenig [EMAIL PROTECTED] writes:
In this case, I think the right solution to the problem is two-fold:
1) from __future__ import lexical_comprehensions
2) If you don't import the feature, and you write a program that depends
on a list-comprehension variable remaining in
Andrew Koenig [EMAIL PROTECTED] writes:
Actually, I don't think so. If you intend for it to be impossible for z =
x to refer to the x in the list comprehension, you shouldn't mind putting
in from __future__ import lexical_comprehensions. If you don't intend for
it to be impossible, then
Fredrik Lundh [EMAIL PROTECTED] writes:
lack of understanding of how Python is used
wonderful. I'm going to make a poster of your post, and put it on my
office wall.
Excellent. I hope you will re-read it several times a day. Doing
that might improve your attitude.
--
Fredrik Lundh [EMAIL PROTECTED] writes:
Excellent. I hope you will re-read it several times a day. Doing
that might improve your attitude.
you really don't have a fucking clue about anything, do you?
You're not making any bloody sense. I explained to you why I wasn't
interested in
Daniel Bickett [EMAIL PROTECTED] writes:
In my (brief) experience with YAML, it seemed like there were several
different ways of doing things, and I saw this as one of it's failures
(since we're all comparing it to XML).
YAML looks to me to be completely insane, even compared to Python
lists.
[EMAIL PROTECTED] (Alex Martelli) writes:
I wonder, however, if, as an even toyer exercise, one might not
already do it easily -- by first checking each token (as generated by
tokenize.generate_tokens) to ensure it's safe, and THEN eval _iff_ no
unsafe tokens were found in the check.
I don't
[EMAIL PROTECTED] (John J. Lee) writes:
Building larger ones seems to
have complexity exponential in the number of bits, which is not too
Why?
The way I understand it, that 7-qubit computer was based on embedding
the qubits on atoms in a large molecule, then running the computation
A.M. Kuchling [EMAIL PROTECTED] writes:
It was discussed in this thread:
http://mail.python.org/pipermail/python-dev/2003-April/034959.html
In that thread, you wrote:
Rubin wanted to come up with a nice interface for the module, and
has posted some notes toward it. I have an existing
Brian van den Broek [EMAIL PROTECTED] writes:
no Python expert, just a hobbyist. But, I think I can take this one on:
Fredrik's contributed a lot to Python. The Standard Library book,
several well know tools, and, I'd wager a finger, a fair bit of code
in the standard lib. I don't think the
Stephen Waterbury [EMAIL PROTECTED] writes:
I should note that I have to deal with XML a lot, but always
kicking and screaming (though much less now because of Fredrik's
Elementtree package ;). Thanks, Fredrik and Peter, for the
references. ;)
I love this old rant about XML:
Alan Kennedy [EMAIL PROTECTED] writes:
However, I'm torn on whether to use ReST for textual content. On the
one hand, it's looks pretty comprehensive and solidly implemented.
It seemed both unnecessary and horrendously overcomplicated when I
looked at it. I'd stay away.
So, I'm hoping that
Ray Schumacher [EMAIL PROTECTED] writes:
I have a need for a time.clock() with 0.16 second (16us) accuracy.
The sleep() (on Python 2.3, Win32, at least) has a .001s limit.
Are they lower/better on other's platforms?
The alternative appears to be more C code...
C code is your best
Martin v. Löwis [EMAIL PROTECTED] writes:
I don't see why you can't make up your mind enough to issue simple
statements like the Python lib should have a module that does
so-and-so
I can say that assuming I know what so-and-so is. For the specific
case of AES, I would say I don't think
Francis Girard [EMAIL PROTECTED] writes:
Thank you Nick and Steven for the idea of a more generic imerge.
If you want to get fancy, the merge should use a priority queue (like
in the heapsort algorithm) instead of a linear scan through the
incoming iters, to find the next item to output. That
Martin v. Löwis [EMAIL PROTECTED] writes:
And I still stand by those blanket statements. Any new module (i.e.
specific code) should see real users for some time before it can
be incorporated into Python.
Let's see, the urandom module was recently released in 2.4, I think
initially at my
Duncan Booth [EMAIL PROTECTED] writes:
In other words, I'm intrigued how you managed to come up with something you
consider to be a security issue with Python since Python offers no
security. Perhaps, without revealing the actual issue in question, you
could give an example of some other
Duncan Booth [EMAIL PROTECTED] writes:
SF doesn't seem to know about any such bug any more.
Google finds me
http://mail.python.org/pipermail/python-bugs-list/2001-October/007669.html
which appears to be SF bug 467384, but it says nothing about security or
the Cookie module, just that you
Fuzzyman [EMAIL PROTECTED] writes:
The sourceforge bug tracker *is* the single right place to post such
issues. The py-dev mailing list would be a second *useful* place to
post such a comment, although not really the right place. The OP seemed
to want an individual with whom he could have a
Nick Craig-Wood [EMAIL PROTECTED] writes:
I understand the algorithm quite well but how to code the multiplication
stage most efficiently in python eludes me.
You might want to look at
http://gmpy.sourceforge.net/
It has very fast multiplication up to any size you like!
I think
Martin v. Löwis [EMAIL PROTECTED] writes:
Let's see, the urandom module was recently released in 2.4, I think
initially at my urging.
There is no urandom module in Python 2.4.
Oops, sorry, it's in the os module:
http://docs.python.org/lib/os-miscfunc.html
The difference is simply a
Nick Coghlan [EMAIL PROTECTED] writes:
After my original flippant reply, I've been thinking some more about
this, and whether CPython can really benefit from initial notification
of a security flaw going privately to the developers first.
And, due to CPython's release model, I really don't
Franco Fiorese [EMAIL PROTECTED] writes:
* Windows XP Pro: 16566.7 pystones/second
* Linux (kernel 2.6.9 NPTL): 12346.2 pystones/second
I have repeated the test, on Linux, also with other distributions and
kernel but a relevant difference still exists with Windows offering a
better
Nick Coghlan [EMAIL PROTECTED] writes:
Fair cop on the C thing, but that example otherwise illustrates my
point perfectly.
I'm not sure what point you mean.
Unpickling untrusted data is just as dangerous as evaluating or
executing untrusted data.
This is *still* dangerous, because there
[EMAIL PROTECTED] (Alex Martelli) writes:
...or (just as hypothetically) purchasing some commercial compiler might
help, under the assumption that the optimization and code generation of
the compiler are the issues here. I have nothing but hearsay to go on,
but IBM's compiler for PPC chips,
Martin v. Löwis [EMAIL PROTECTED] writes:
Indeed, if it was a single new function to an existing module, I would
not require that this be delivered to users first. It is entire new
libraries that I worry about.
Why is it different if a single new function is added to an existing
module, or if
Skip Montanaro [EMAIL PROTECTED] writes:
What's your point? That I have to download and perhaps install them to use
them? In that case, how are these two scenarios different:
* I have to download and build the MySQLdb package to talk to MySQL
servers from Python code
* I
Skip Montanaro [EMAIL PROTECTED] writes:
And one that deals with cryptography is likely to be even more complex.
No. The AES module would have about the same complexity as the SHA module.
--
http://mail.python.org/mailman/listinfo/python-list
Paul Rubin http://[EMAIL PROTECTED] writes:
actually: mxCrypto is the most capable of these packages and might be
the one with the most users, but it's completely unsuitable for the
core because of its size).
Oops, I should say, mxCrypto itself isn't that large; the issue is
that it needs
Martin v. Löwis [EMAIL PROTECTED] writes:
Apparently, people disagree on what precisely the API should be. E.g.
cryptkit has
obj = aes(key)
obj.encrypt(data)
I don't disagree about the API. The cryptkit way is better than ECB
example I gave, but the ECB example shows it's possible to do it
Martin v. Löwis [EMAIL PROTECTED] writes:
mxCrypto is primarily unsuitable for the core because Marc-Andre Lemburg
will never ever contribute it. He is very concerned about including
crypto code with the Python distribution, so he certainly won't
contribute his own.
Oh wait, I confused
Nick Craig-Wood [EMAIL PROTECTED] writes:
I would hate to see a module which only implemented ECB. Sure its the
only operation necessary to build the others out of, but its the least
secure mode of any block cipher.
It's intended as a building block for other modes. Most applications
Skip Montanaro [EMAIL PROTECTED] writes:
* Quixote
Paul Don't know what this is.
Web app framework.
I think Python should add a web app framework to its core, again since
it otherwise can't seriously begin to compete with PHP. However,
there are lots of approaches so this is an
Nick Craig-Wood [EMAIL PROTECTED] writes:
There is a PEP about this...
API for Block Encryption Algorithms v1.0
http://www.python.org/peps/pep-0272.html
Yes, I know about that and have been in contact with its author. He
and I are in agreement (or at least were in agreement some time
Jamey Cribbs [EMAIL PROTECTED] writes:
KirbyBase is a simple, plain-text, database management system written
in Python. It can be used either embedded in a python script or in a
client/server, multi-user mode. You use python code to express your
queries instead of having to use another
Martin v. Löwis [EMAIL PROTECTED] writes:
Oh, ok. Earlier you said you wanted user feedback before you could
conclude that there was reason to want an AES module at all.
I believe I never said that. I said that I wanted user feedback to
determine whether *this* AES module (where this is
Skip Montanaro [EMAIL PROTECTED] writes:
While it might be convenient to not have to distribute some third
party library in addition to Python, there is a fundamental problem
implementing a crypto algorithm from scratch for inclusion into
Python. There is always the problem that the new code
Philippe C. Martin [EMAIL PROTECTED] writes:
I am trying to figure out the traps/issues about sending data structures
through a TCP/IP socket under the following circumstances:
1) there could be a different O/S on both side of the socket
2) there could be a difference CPU architecure on both
jose isaias cabrera [EMAIL PROTECTED] writes:
I've looked through the internet (not long, though) but I have not
been able to find a python translation to
buffer[0] = (byte)Integer.parseInt(string,16);
Has anyone ported any java programs to python and has translated this?
I think the
[EMAIL PROTECTED] (kartik) writes:
Since the Decimal type can represent any given fractional number
exactly,
It can't. For example, it can't represent 1/3 exactly.
including all IEEE binary floating-point numbers, wouldn't it be
advisable to use Decimals for all floating point numbers
Philippe Fremy [EMAIL PROTECTED] writes:
I would like to develop a tool that goes one step further than
pychecker to ensure python program validity. The idea would be to get
close to what people get on ocaml: a static verification of all types
of the program, without any kind of variable
Tim Churches [EMAIL PROTECTED] writes:
The question is: does shipping a backend which imports a module that
links with GPL code make some or all of the library GPL.
We sought formal legal advice on this issue from a lawyer with
expertise in open source licensing ...
The answer was that the
Robey Holderith [EMAIL PROTECTED] writes:
Does anybody know of a tool that can tell me all possible exceptions that
might occur in each line of code? What I'm hoping to find is something
like the following:
That is impossible. The parameter to the raise statement is a class
object, which can
jrlen balane [EMAIL PROTECTED] writes:
ex. hexa = '0x87BE # what i want to do is:
a = 0x87, b = 0xBE# so that i could do this:
c = a + b#which should be equal to 0x145
Assuming you really want hexa to begin with the characters '0x', the
string slicing way is:
jrlen balane [EMAIL PROTECTED] writes:
would i be able to perform bitwise operation with the result?
say, i want to get the two's complement of the result, is this correct:
twos_complement = (~ hex(hi + lo)) + 1
You can do bit operations, but hex(n) is the hex string for n, which
is not what
Jeremy Bowers [EMAIL PROTECTED] writes:
Hmm, I'm not familiar with Nevow. Twisted is pretty neat, though
confusing. I don't see how to scale it to multiple servers though.
Same way you'd scale any webserver, load balancing in hardware, store all
user state in a database, and tell the
Dan Perl [EMAIL PROTECTED] writes:
The application is just something I'm playing with to learn a little bit on
web apps. It uses an HTML form to send an email. The form takes inputs
like the From:, To: and Subject: fields and a text field.
Be careful of exposing that script to the
M.E.Farmer [EMAIL PROTECTED] writes:
To emulate a table you use the div and span tag.
(really you can do just about anything with div and span)
Hmm, that's pretty interesting, I didn't realize you could specify
width's with CSS. Thanks. http://glish.com/css/9.asp shows a
2-column example.
I
aurora [EMAIL PROTECTED] writes:
I'm lost. So what do you compares against when you said LAMP is slow?
What is the reference point? Is it just a general observation that
slashdot is slower than we like it to be?
Yes, that's the basic observation, not specifically Slashdot but for
lots of
Dan Perl [EMAIL PROTECTED] writes:
Be careful of exposing that script to the internet. Spammers will
exploit it.
Do you mean publishing the script for other people to copy it or exposing
the web app so that other people may access it?
I mean installing the script on a server where
1 - 100 of 4752 matches
Mail list logo