The above would only display the message if you turned off buffering ($|=1;), and even then it's questionable whether or not that would work... It all depends on the rendering requirements of the particular user's browser. What it comes down to is that this is probably something that will just...
Here's one:
In your .shtml file, use the #include virtual directive instead of #exec.
<!--#include virtual="/cgi-bin/count.cgi"-->
And count.cgi can be something as simple as:
#!/usr/bin/perl
print "Content-type: text/html\r\n\r\n";
open(FH,"pet.db");
print...
There really isn't much system overhead if you only import the functions/sets of functions that you need instead of the entire module. eg.
#!/usr/bin/perl
use CGI qw/:cgi/;
or
use CGI qw/param header start_html end_html/;
brendanc@icehouse.net
http://www.witheredpipedream.com
I agree, but isn't it fun to use long complicated shell scripts?
Actually, there might be one use to the scripts above: verifying that the module isn't in some strange subdirectory... requiring that you call it with DBI::DBI.pm. Quite unlikely, but possible.
Anyway, goBoating's right; if you...
On a linux system, you can use the following command to search for the DBI module:
for x in `perl -e 'print join"\n",@INC'`; do find $x -iname DBI.pm; done
and see if it returns something. For anyone suffering this problem on Windows NT platform, the command would be:
for /f %%x in...
Quick note, the above sort routine may mix the order of each upper/lower case pair. For instance:
# Using these arrays:
@sort1 = qw/ a B c D e A b C d E /;
@sort2 = qw/ a b c d e A B C D E /;
# this sort:
print sort{uc($a) cmp uc($b)}@sort1,"\n";
print sort{uc($a) cmp...
I did notice the %Symbols thing, but there I agree with you -- a perfect use of a global var. I can see your point with $Unformat as well, so I'll retract that. Glad to be of help with the other items, though.
Take care,
brendanc@icehouse.net
http://www.witheredpipedream.com
Tracy,
Just caught this:
next if ( $file =~ /\.bak\Z/ );
# ignore .bak (backup) files
$file was defined with my in an earlier foreach loop and has since gone out of scope... so at this point, there is no $file. Easily rectified, though...
Another thing I saw was that in the FixFile()...
Ah. I see. I was under the impression that the code actually read in the proprietary MSWord .doc format and did a conversion. Was wondering how you got your hands on that algorithm. ;-) Ah well. Useful code, nonetheless.
Thanks.
brendanc@icehouse.net
http://www.witheredpipedream.com
CVS stands for "Concurrent Versions System" and can be found at http://www.cvshome.org . CVS does not require a unique platform/independent system; instead, it is simply a set of files that will run on pretty much anything -- win32, linux, unix, etc. (so you should be able to use your...
teser: You might consider looking into a CVS server. With that service, people are able to download documents from the main server, modify them and reupload them. The CVS server tracks the changes, when they were made, who made them, any comments the modifier had, etc. and creates continuous...
Well.. this gets a bit complicated, but the statement below will give you the results you're looking for. Well, almost. The ##a values come before the floating values. Perhaps someone can update the statement to change that? Basically, I'm left padding the numeric values with 0's, but there...
Haven't really taken a look at the code yet, but one thing catches my attention: the dbname, username and password data that you have in there isn't correct, is it? :-)
brendanc@icehouse.net
http://www.witheredpipedream.com
You're too kind, Tracy.
But regardless of the knowledge goBoating, myself or any other member has, you're the most active poster in this forum. Kudos to you.
brendanc@icehouse.net
http://www.witheredpipedream.com
That wouldn't matter because they could conduct the entire attack offline. All they would need to do is look at the encryption algorithm embedded in the webpage, sniff a few of the unencrypted random numbers and their respective ciphertexts... then they could just export that data to a textfile...
I took a leave of absence from Tek-Tips for a month or so... those lengthy messages that I'm notorious for writing started to affect my work. But, I recently felt the urge to drop on in and see what was up here... and now, well... this particular thread is just too much fun. :-)...
Actually, check that.
Assymetry would help quite a bit in this situation, but not as much as I thought 5 minutes ago. All the attacker would need to do is a dictionary attack on the encryptions and try to find a collision that yielded the ciphertext.
That's still REALLY hard, especially with...
...but not decrypted with it. Instead, the server might have .. say .. a 512 bit key for the user that decrypts the message. This would make it *really* difficult for someone to cryptanalyze, because instead of finding an 8 or so character key string (which could theoretically be done with a...
What Tsdragon uses is, indeed, pretty standard. That's essentially the foundation of what I propose above. The items that I think are necessary to consider more heavily though are:
1. Do you need to send the password over the wire at all?
2. Protect against spoofing. Keep in mind that...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.