Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

Asp.netÒ³ÃæÖ®¼ä´«µÝ²ÎÊýµÄ¼¸ÖÖ·½·¨

Asp.netÒ³ÃæÖ®¼ä´«µÝ²ÎÊýµÄ¼¸ÖÖ·½·¨
µÚÒ»ÖÖ·½·¨£ºITPUB¸öÈ˿ռäR:s`4eP
ͨ¹ýURLÁ´½ÓµØÖ·´«µÝRequest.QueryStringITPUB¸öÈ˿ռä/G3Z;zZs'| `
send.aspx:ITPUB¸öÈ˿ռä@ V.X@k7P ^L'B
   protected void Button1_Click(object sender, EventArgs e)
Zv!cSZ]6hB ?0     {
q g1bT&o1K G d*v2X0         Request.Redirect("Default2.aspx?username=honge");
&H(u%{/y)@$m4fm0     }ITPUB¸öÈ˿ռä|bI?-V"]
 
r\SuxP:K0receive.aspx:
0u$w'L6e#[kP0string username = Request.QueryString["username"];ÕâÑù¿ÉÒԵõ½²ÎÊýÖµ¡£
µÚ¶þÖÖ·½·¨£º
&Gs6Y;|Vd$f:_D0ͨ¹ýpost·½Ê½Request¡£
-{2D]:WN&[H*G |8R0send.aspxITPUB¸öÈ˿ռä-s4p!q)V-iG5K
<form. id="form1" runat="server" action="receive.aspx" method=post>ITPUB¸öÈ˿ռä SCS tZ~g
     <div>
H*?.Yw$x0  <asp:TextBox ID="username" runat="server"></asp:TextBox>
nTm&|*]\2F#o]G0  //<input type="text" name="username" />ITPUB¸öÈ˿ռä}&F3_cUZ
        <asp:Button ID="Button1" runat="server" nClick="Button1_Click" Text="Button" />ITPUB¸öÈ˿ռä&b Srv"G*iQ+|
 </div>
)x([T0D@0</form>
~(v ^ U6V6G{0 
]:`$c2o(Q1F%{e0receive.aspx
(kl)@"ha!@0string username = Ruquest.Form["receive"];//string username = Ruquest["username"];
µÚÈýÖÖ·½·¨£ºITPUB¸öÈ˿ռäQ v{*pZ_w(A@x
ͨ¹ýsession
-a0?Q)R K@lzR,}D0send.aspx:
5w:Q,Lk5H?W L3n0   protected void Button1_Click(object sender, EventArgs e)
LjK4A N5DN7p;L|0     {
0vr:YkZ4S]8Y0         Session["username"] = "honge";
9S.VxU&DvRF0         Request.Redirect("Default2.aspx");
$F9p(I1rq;k0     }
"VVLAU0 ITPUB¸öÈ˿ռä1f7tRu;c,v~xr"H
receive.aspx:
+n+l


Ïà¹ØÎĵµ£º

ASP.NET AJAX ½Ìѧ±Ê¼Ç(Èý) 2

3.4Àí½â¼Ì³Ð
Ò»£®»ùÓÚÔ­Ð͵ļ̳Уº  
²½Ö裺
(1)ÔÚ×ÓÀ๹Ô캯ÊýÖе÷ÓûùÀ๹Ô캯Êý£¬´Ó¶ø¼Ì³Ð»ùÀàµÄÊôÐÔ¡£
(2)½«»ùÀàµÄÒ»¸öÐÂʵÀý¸³¸ø×ÓÀ࣬´Ó¶ø¼Ì³Ð»ùÀàµÄ·½·¨¡£
 Samples.Cat=function() 
  {
     Samples.Pet.call(this);
   }
   Sample ......

asp.net¸÷ÖÖÈÕÆÚ²Ù×÷


±¾ÎÄÎÒÃǽ«ÌÖÂÛµÄÊÇASP.NETÒ³Ãæ¼äÊý¾Ý´«µÝµÄ¼¸ÖÖ·½·¨£¬¶Ô´ËÏ£ÍûÄܰïÖú´ó¼ÒÕýÈ·µÄÀí½âASP.NETÒ³Ãæ¼äÊý¾Ý´«µÝµÄÓô¦ÒÔ¼°±ãÀûÐÔ¡£
0¡¢ÒýÑÔ
WebÒ³ÃæÊÇÎÞ״̬µÄ£¬ ·þÎñÆ÷¶Ôÿһ´ÎÇëÇó¶¼ÈÏΪÀ´×Ô²»Í¬Óû§£¬Òò´Ë£¬±äÁ¿µÄ״̬ÔÚÁ¬Ðø¶ÔÍ¬Ò»Ò³ÃæµÄ¶à´ÎÇëÇóÖ®¼ä»òÔÚÒ³ÃæÌø×ªÊ±²»»á±»±£Áô¡£ÔÚÓÃASP.NET Éè¼Æ¿ª·¢Ò»¸öWebϵͳʱ£¬ Óöµ ......

ASP.NET±íµ¥ÑéÖ¤Ö®ValidationSummary¿Ø¼þ


 ValidationSummary:¸Ã¿Õ¼äµÄ×÷ÓÃÊǰÑËùÓÐÑéÖ¤´íÎóµÄÁбíÏÔʾÔÚÒ³ÃæµÄͬһ¸öµØ·½¡£
ÊôÐÔ£ºDisplayMode:ÏÔʾ´íÎóÐÅÏ¢µÄ·½Ê½£ºBulletList·ÅÔÚ<ul><li></li></ul>ÀList·ÅÔÚ<div>´íÎó1<br/>´íÎó2</div>ÖУ¬²»Í¬ÐÅϢʹÓÃ<br/>¸ô¿ª£»SingleParagraph·ÅÔÚ<div>& ......

asp.netÒ³ÃæÊµÏֻسµµã»÷°´Å¥JavaScriptʵÏÖ

»Ø³µµã»÷°´Å¥
Ö»ÐèÔÚ.aspxÒ³Ãæ´úÂëÖмÓÈëÒ»¶ÎJavaScript¼´¿É£º
<script type="text/javascript" language="javascript">  
      document.onkeydown   =   Check;  
      function   Check(){ &n ......

asp.net viewstat Tampering Vulnerabilities

Trustwave's SpiderLabs Security Advisory TWSL2010-001:
Multiplatform View State Tampering Vulnerabilities
Published: 2010-02-08 Version: 1.1
SpiderLabs has documented view state tampering
vulnerabilities in three products from separate vendors.
View states are used by some web application frame ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ