Using CGIDEV2 Examples. Web Resources Partner 400 Scott Klement

Slides:



Advertisements
Similar presentations
Aptillon, Inc. – Director and Founding Partner – SharePoint MVP since January 2008 Blog:
Advertisements

PHP and CSS to control web apps styles. CSS is used to style today’s web applications.
Cookies, Sessions. Server Side Includes You can insert the content of one file into another file before the server executes it, with the require() function.
Lecture 6/2/12. Forms and PHP The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input When dealing with HTML forms.
Chapter 10 Managing State Information Using Sessions.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Client State Management & Application Security  Client State Management  Concept  ASP Examples  Application Security  Database Based Approach 
Tutorial 8 Sharing, Integrating and Analyzing Data
Session Management A290/A590, Fall /25/2014.
Troubleshooting Federation, AD FS 2.0, and More…
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
By Daniel Siassi.  XHTML  For Structure  CSS  For Stylization of Structure  SQL Database  Store Customer, Calendar, and Order Data  PHP  Server-side.
© 2011 Delmar, Cengage Learning Chapter 9 Collecting Data with Forms.
27 Little Things that Make a Big Difference Karen Kral WebCT 3.7.
JavaScript, Fourth Edition
Standalone Java Application vs. Java Web Application
Embedding CenterView and Hosting External Content.
Creating a Firstgiving Page for The Andréa Rizzo Memorial Foundation.
Creating a User ID (1) User makes any HTTP request
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Why Do Helpdesks Need A Remote Access Tool?. Today’s business environment has proved to be a difficult task to support. With many companies using different.
Identity on Force.com & Benefits of SSO Nick Simha.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Maintaining State MacDonald Ch. 9 MIS 324 MIS 324 Professor Sandvig Professor Sandvig.
JavaScript Shopping Cart Yong Choi CSU Bakersfield.
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
Web Application Security Raymond Camden
Go to log in page at Enter your User ID Password.
Liang, Introduction to Java Programming, Seventh Edition, (c) 2009 Pearson Education, Inc. All rights reserved Chapter 41 JavaServer Face.
 Enhancing User Experience  Why it is important?  Discussing user experience one-by-one.
10 1 Hidden Fields and CGI/Perl Programming By Diane Zak.
WikiPlus Configurations Configure WikiPlus elements to your needs.
Blackboard Learn 9.1 © 2010 Blackboard Inc. All rights reserved.
Interaction Design Chapter 1. Good design? Bad design?
Unit 2, Lesson 7 Creating Web Pages and Web Documents.
Esri UC 2014 | Demo Theater | Batch Geocoding Online Bruce
PHP File Manipulation. File Upload and php.ini ;;;;;;;;;;;;;;; ; File Uploads ; ;;;;;;;;;;;;;;;; ; Whether to allow HTTP file uploads. file_uploads =
Web Technologies Lecture 6 State preservation. Motivation How to keep user data while navigating on a website? – Authenticate only once – Store wish list.
Invitation to Computer Science 6 th Edition Chapter 10 The Tower of Babel.
Document Object Model Nasrullah. DOM When a page is loaded,browser creates a Document Object Model of the Page.
Computer-made Cookies Presented by Helal Lutfi. What is a Computer Cookie?  A small text file which contains a unique ID tag.  Placed on your computer.
Source Page US:official&tbm=isch&tbnid=Mli6kxZ3HfiCRM:&imgrefurl=
MSc Publishing on the Web Week 4 Image Maps. Aims and Objectives Discover what are image maps To understand the different types of image map To understand.
Database Form Processing Made Easy Chad Killingsworth Web Projects Coordinator.
Cookies and Sessions in PHP. Arguments for the setcookie() Function There are several arguments you can use i.e. setcookie(‘name’, ‘value’, expiration,
Unit-6 Handling Sessions and Cookies. Concept of Session Session values are store in server side not in user’s machine. A session is available as long.
Persistence Maintaining state: Queries. State is the Problem What is state? facebook status logins (which user are you?) conversations talking about what?
Module 1: Designing IIS Web Farms Changes in a Nutshell shell-shared-hosting-improvements-on-iis7.aspx.
WINDOWS AZURE STORE Björn Eriksen, Technical
What is a Wiki? A wiki is an online database that can be edited by anyone with access to it. “ Wiki ” is Hawaiian meaning ‘ fast ’ or ‘ quick ’
COOKIES AND SESSIONS.
1 Chapter 22 World Wide Web (HTTP) Chapter 22 World Wide Web (HTTP) Mi-Jung Choi Dept. of Computer Science and Engineering
ASP.NET WEB Applications. ASP.NET  Web application framework developed by Microsoft  Build dynamic data driven web applications and web services  Subset.
Introduction to Server-Side Web Development Introduction to Server-Side Web Development Introduction to Server-Side Web JavaBeans; basic concepts and syntax.
Путешествуй со мной и узнаешь, где я сегодня побывал.
Y.-H. Chen International College Ming-Chuan University Fall, 2004
Programming by a Sample: Rapidly Creating Web Applications with d.mix
Page 1. Page 2 Page 3 Page 4 Page 5 Page 6 Page 7.
MIS Professor Sandvig MIS 324 Professor Sandvig
Cross-Site Request Forgery (CSRF) Attack Lab
Session Hijacking Tarun Lall.
What is a CMS. CMS is content management system CMS is a software that stores content.
Session Tracking Techniques
For use on your feedback page
STORE MANAGER RESPONSIBILITIES.
Magazine Layouts.
Cookies A cookie is often used to identify a user. A cookie is a small file that the server embeds on the user's computer. Each time the same computer.
Intermediate Documents Session 2
Presentation transcript:

Using CGIDEV2 Examples

Web Resources Partner Scott Klement /#RPGWEB Scott Klement Antoon Van Os marymount.fr/pdffiles/ %20WebProgramming%20ILERPG %20ppt%20(2).pdfhttp:// marymount.fr/pdffiles/ %20WebProgramming%20ILERPG %20ppt%20(2).pdf

Templates

Tags in CGIDEV2 /$ /%myfield%/

Hidden fields Pros Easy way to determine state. Can edit the source of the web page to see the values Cons Can edit the source of the web page to see the values. (Spoofing potential)

Cookies Can be temporary for just the session Can store on the user’s PC Cam contain a session ID Can be encrypted. Good way to maintain basic signon information about the user. Can be used in conjunction with data and hidden fields Examples given in the CGIDEV2 source