Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations IamaSherpa on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. josver

    VBScript to Secure Copy files

    You'll have to do a binary read of the first bytes of the file, and check the contents for markers the format is supposed to have. For instance, a .gif starts with GIF, jpeg has TFIF in the first ten bytes etcetera. You'll have to find a list of file extensions and their marker end code that in...
  2. josver

    This Vbscript IS NOT Working and NO ERRORS

    I had the same message a while ago, coding something very similar and it turned out to be a firewall problem. The calling server could not reach the DC. I'm guessing line 18 is one of the following two: Set objDomain = getObject("LDAP://rootDse") DomainString = objDomain.Get("dnsHostName")...
  3. josver

    ASP APP Security - Hack Possible?

    You should read up on "SQL injection" and "cross server scripting" attacks. Both mean that an attacker tries to gain access to a database by filling in code in form fields, or sending code in the request.querystring object a parameter id is an ideal candidate, but hackers try anything. There...
  4. josver

    request.form checking and binaryread

    In case anyone has this problem, I found the solution in the request.servervariables("CONTENT-TYPE") variable: Private Function GetFormEncType() Dim sContType, hCutOff sContType = request.servervariables("CONTENT_TYPE") hCutOff = InStr(sContType, ";") If hCutOff > 0 Then...
  5. josver

    request.form checking and binaryread

    Hi, I have an ASP / VB6 web application, basically a CMS generating web sites with a lot of classic ASP pages and a VB6 COM component. Recently our servers (like everyone else's) are under so called cross site script attacks, meaning that the attacker tries to gain entry by passing malicious...

Part and Inventory Search

Back
Top