Welcome![Sign In][Sign Up]
Location:
Search - server.createobject

Search list

[Web ServerEncryptSimple

Description: 可逆加密组件 ====================== 使用方法 ============================================ Dim objEncrypt Set objEncrypt = Server.CreateObject(\"myEncrypt.clsEncrypt\") Dim strReturn 加密后文本 Dim strValue 加密前文本 加密开始 设置密钥(此行可以省略) objEncrypt.KeyCode=\"1111\" 开始加密 strReturn = objEncrypt.Encrypt(strValue) 解密 设置密钥(如果加密时没有设置,此行可以省略) objEncrypt.KeyCode=\"1111\" 开始解密 strReturn = objEncrypt.UnEncrypt(strValue) 注意: strReturn可能返回以下值 -3 : 密钥长度超过10 -2 : 表示文本设置了密钥,但是解密时没有指定密钥 -1 : 表示文本设置了密钥,但是解密时指定的密钥与原先设置的密钥不一样 注意:密钥需要小于10个字符且必须为键盘上的字符,否则可能导致无法正确解密-reversible encryption components use ==== ====================== ======================================== Dim objEncrypt Set objEncrypt = Server.Create Object ( "myEncrypt.clsEncrypt") Dim strRetu rn encrypted text Dim strValue encrypted text before start providing encryption key (this trip can be omitted) o bjEncrypt.KeyCode = "1111" began encryption strReturn = ob jEncrypt.Encrypt (strValue) decryption keys set (if no encryption settings this trip can be omitted) objEncrypt.KeyCode = "1111" began declassified strR eturn = objEncrypt.UnEncrypt (strValue) Note : strReturn may return the following values -3 : Key length exceeding 10 -2 : To set up a key text, But when no specific decryption key -1 : To set up a key text, However, when the decryption keys with t
Platform: | Size: 20631 | Author: 张峰 | Hits:

[WEB Codefg9

Description: 本程序主要演示server对象的CreateObject方法的使用,由server.createobject创建的对象具有页作用域,当前asp页处理完成后,服务器自动清除这些对象。-major demonstration of the process server object CreateObject method of use, server.createobject created by the target page with Scope, current asp page treatment is completed, the server automatically remove these objects.
Platform: | Size: 809 | Author: 杨洋 | Hits:

[Exploitvnx4

Description: vnc本地口令破解C源代码 默认情况下VNC服务端的密码是放在注册表中的,本工具只针对这种情况。首先用ASP读出注册表中的加密密码,然后用破解工具破解。我给出大家一个读取VNC密码的ASP脚本,默认情况下VNC密码存放在HKCU\\Software\\ORL\\WinVNC3\\Password Set WshShell = server.CreateObject(\"WScript.Shell\") bkey=WSHShell.RegRead(\"HKCU\\Software\\ORL\\WinVNC3\\Password\") for each str in bkey response.write hex(str) next 读取出来后结果类似 49 40 15 F9 A3 5E 8B 22这种十六进制,这是VNC加密的密码。我们可以用vncx4 破解它,vncx4使用很简单,只要在命令行下输入 c:\\>vncx4 -W 然后顺序输入上面的每一个十六进制数据,每输完一个回车一次就行了。-vnc local crack password C source code default under VNC server password is placed on the registry. The tools only address this situation. First ASP registry read out the encryption password, and then use the tool to break the resolve. I have given you a password to read VNC ASP script, By default under the VNC password stored in HKCU \\ Software \\ ORL \\ WinVNC3 \\ P assword Set WshShell = server.CreateObject ( " WScript.Shell ") bkey = WSHShell.RegRead (" HK CU \\ Software \\ ORL \\ WinVNC3 \\ Password ") for eac h str in bkey response.write hex (str) next read out After similar results F9 49 40 15 22 A3 5E 8B this hexadecimal, it is encrypted VNC password. Vncx4 we can resolve it, vncx4 simple to use, as long as the command line input c : \\
Platform: | Size: 4104 | Author: 小李 | Hits:

[ASPProductSearch133

Description: <%@ LANGUAGE=\"VBSCRIPT\" %> <!--#include file=\"conn.asp\" --> <% ProductClass_2=request(\"ProductClass_2\") set rs=server.createobject(\"adodb.recordset\") sqltext=\"select * from Product\" if request(\"Product_Name\")<>\"\" then sqltext=sqltext &\" where Product_Name like %\"& request(\"Product_Name\") &\"% \" else sqltext=sqltext &\" where Product_Name like %\"& \"\" &\"% \" end if if request(\"Product_Class\")<>\"\" then sqltext=sqltext &\" and Class_1 like %\"& request(\"Product_Class\") &\"% \" end if
Platform: | Size: 3531 | Author: 金立犇 | Hits:

[ASPReg_User_22

Description: <%@ LANGUAGE=\"VBSCRIPT\" %> <!--#include file=\"conn.asp\"--> <% set rs=server.createobject(\"adodb.recordset\") sqltext=\"select * from RegUser where UserId= \" & request.form(\"uid\") & \" \" rs.open sqltext,co
Platform: | Size: 6078 | Author: 金立犇 | Hits:

[Other resourceAspJpeg

Description: 一个浏览缩小图的组件,专为像创建在线相册薄等以网络为基础的应用程序开发服务。 name:www.chinaz.com sn:48958-77556-02411 name:chinaz sn:71316-48529-38722 安装的时候 填入name:后面的用户名 例如 www.chinaz.com 然后在程序写 Set jpg = Server.CreateObject(\"Persits.Jpeg\") jpg.RegKey = \"48958-77556-02411\"
Platform: | Size: 1401166 | Author: wqf | Hits:

[Web ServerEncryptSimple

Description: 可逆加密组件 ====================== 使用方法 ============================================ Dim objEncrypt Set objEncrypt = Server.CreateObject("myEncrypt.clsEncrypt") Dim strReturn 加密后文本 Dim strValue 加密前文本 加密开始 设置密钥(此行可以省略) objEncrypt.KeyCode="1111" 开始加密 strReturn = objEncrypt.Encrypt(strValue) 解密 设置密钥(如果加密时没有设置,此行可以省略) objEncrypt.KeyCode="1111" 开始解密 strReturn = objEncrypt.UnEncrypt(strValue) 注意: strReturn可能返回以下值 -3 : 密钥长度超过10 -2 : 表示文本设置了密钥,但是解密时没有指定密钥 -1 : 表示文本设置了密钥,但是解密时指定的密钥与原先设置的密钥不一样 注意:密钥需要小于10个字符且必须为键盘上的字符,否则可能导致无法正确解密-reversible encryption components use ==== ====================== ======================================== Dim objEncrypt Set objEncrypt = Server.Create Object ( "myEncrypt.clsEncrypt") Dim strRetu rn encrypted text Dim strValue encrypted text before start providing encryption key (this trip can be omitted) o bjEncrypt.KeyCode = "1111" began encryption strReturn = ob jEncrypt.Encrypt (strValue) decryption keys set (if no encryption settings this trip can be omitted) objEncrypt.KeyCode = "1111" began declassified strR eturn = objEncrypt.UnEncrypt (strValue) Note : strReturn may return the following values-3 : Key length exceeding 10-2 : To set up a key text, But when no specific decryption key-1 : To set up a key text, However, when the decryption keys with t
Platform: | Size: 20480 | Author: 张峰 | Hits:

[WEB Codefg9

Description: 本程序主要演示server对象的CreateObject方法的使用,由server.createobject创建的对象具有页作用域,当前asp页处理完成后,服务器自动清除这些对象。-major demonstration of the process server object CreateObject method of use, server.createobject created by the target page with Scope, current asp page treatment is completed, the server automatically remove these objects.
Platform: | Size: 1024 | Author: 杨洋 | Hits:

[Crack Hackvnx4

Description: vnc本地口令破解C源代码 默认情况下VNC服务端的密码是放在注册表中的,本工具只针对这种情况。首先用ASP读出注册表中的加密密码,然后用破解工具破解。我给出大家一个读取VNC密码的ASP脚本,默认情况下VNC密码存放在HKCU\Software\ORL\WinVNC3\Password Set WshShell = server.CreateObject("WScript.Shell") bkey=WSHShell.RegRead("HKCU\Software\ORL\WinVNC3\Password") for each str in bkey response.write hex(str) next 读取出来后结果类似 49 40 15 F9 A3 5E 8B 22这种十六进制,这是VNC加密的密码。我们可以用vncx4 破解它,vncx4使用很简单,只要在命令行下输入 c:\>vncx4 -W 然后顺序输入上面的每一个十六进制数据,每输完一个回车一次就行了。-vnc local crack password C source code default under VNC server password is placed on the registry. The tools only address this situation. First ASP registry read out the encryption password, and then use the tool to break the resolve. I have given you a password to read VNC ASP script, By default under the VNC password stored in HKCU \ Software \ ORL \ WinVNC3 \ P assword Set WshShell = server.CreateObject ( " WScript.Shell ") bkey = WSHShell.RegRead (" HK CU \ Software \ ORL \ WinVNC3 \ Password ") for eac h str in bkey response.write hex (str) next read out After similar results F9 49 40 15 22 A3 5E 8B this hexadecimal, it is encrypted VNC password. Vncx4 we can resolve it, vncx4 simple to use, as long as the command line input c : \
Platform: | Size: 4096 | Author: 小李 | Hits:

[SCSI-ASPIProductSearch133

Description: <%@ LANGUAGE="VBSCRIPT" %> <!--#include file="conn.asp" --> <% ProductClass_2=request("ProductClass_2") set rs=server.createobject("adodb.recordset") sqltext="select * from Product" if request("Product_Name")<>"" then sqltext=sqltext &" where Product_Name like %"& request("Product_Name") &"% " else sqltext=sqltext &" where Product_Name like %"& "" &"% " end if if request("Product_Class")<>"" then sqltext=sqltext &" and Class_1 like %"& request("Product_Class") &"% " end if-< @ LANGUAGE = VBSCRIPT ><!--# Include file = conn.asp -->< ProductClass_2 = request ( ProductClass_2 ) set rs = server.createobject ( adodb.recordset ) sqltext = select* from Product if request ( Product_Name )<> then sqltext = sqltext
Platform: | Size: 3072 | Author: 金立犇 | Hits:

[SCSI-ASPIReg_User_22

Description: <%@ LANGUAGE="VBSCRIPT" %> <!--#include file="conn.asp"--> <% set rs=server.createobject("adodb.recordset") sqltext="select * from RegUser where UserId= " & request.form("uid") & " " rs.open sqltext,co-< @ LANGUAGE = VBSCRIPT ><!--# Include file = conn.asp -->< set rs = server.createobject ( adodb.recordset ) sqltext = select* from RegUser where UserId =
Platform: | Size: 6144 | Author: 金立犇 | Hits:

[source in ebookAspJpeg

Description: 一个浏览缩小图的组件,专为像创建在线相册薄等以网络为基础的应用程序开发服务。 name:www.chinaz.com sn:48958-77556-02411 name:chinaz sn:71316-48529-38722 安装的时候 填入name:后面的用户名 例如 www.chinaz.com 然后在程序写 Set jpg = Server.CreateObject("Persits.Jpeg") jpg.RegKey = "48958-77556-02411" -A browser to narrow the chart components, designed to create online albums, like thin, such as web-based application development services. name: www.chinaz.comsn:48958-77556-02411name:chinazsn:71316-48529-38722 time to fill in the installation of name: after the user name and then in the process such as www.chinaz.com write Set jpg = Server.CreateObject (Persits . Jpeg) jpg.RegKey = 48958-77556-02411
Platform: | Size: 1400832 | Author: | Hits:

[Crack HackBase64Com

Description: BASE64编码和解码COM组件 Set Obj=Server.CreateObject("DBstep.Base64") 创建对象 x=Obj.EncodeBase64("要加密的字符串") y=Obj.DecodeBase64("要解密的字符串") Set Obj=nothing 释放对象 -BASE64 encoding and decoding COM components Set Obj=Server.CreateObject("DBstep.Base64") x=Obj.EncodeBase64(string) y=Obj.DecodeBase64("string") Set Obj=nothing
Platform: | Size: 78848 | Author: nclyj | Hits:

[Internet-NetworkJSCalls

Description: 能够从VC程序中调用网页中的JS代码,从而扩展你程序和网页的功能-VC program can call the page from the JS code to extend the functionality of your application and web pages
Platform: | Size: 3949568 | Author: wangyu | Hits:

[WEB CodeAsp_sql100w_dll

Description: 在ASP中使用组件 set cls=Server.CreateObject("MyDLL.MsSql") cls.ConnStr="driver={sql server} server=www.pc456.cn uid=pc456sss pwd=1 database=www.pc456.cn" 给组件设置数据源信息 添加,修改,删除数据: cls.execute(sql) 无分页读取数据: Set Rs=cls.execute(sql) do while not rs.eof rs.movenext loop 有分页列表数据: cls.tblName="Tablename" 表名 cls.fldName="Id" 排序关键字段 cls.PageIndex=Request("P")*1 当前页码 cls.PageSize=20 每页列数 cls.OrderType=1 排序方式,0 、1 cls.strWhere=StrW 查询条件,不带Where cls.ListUrl="?Y="&Y&"&M="&M&"&D="&D&"&Sn="&Sn&"&P=" 分页URL Set Rs=cls.Result do while not rs.eof rs.movenext loop 分页数据 cls.page 具体使用看实例 dim Sql_Server,Sql_User,Sql_Pass,Sql_Data Sql_Server = "192.168.3.172" 数据库服务器地址 Sql_User = "sa" 数据库登录名 Sql_Pass = "123456" 数据库密码 Sql_Data = "CRM_Data" 数据库名 -Asp data manipulation components (one million pages) installation process: 1, run " up MyDll.bat" , up for class 2 operation, the SQL Query Analyzer to perform " GetList.sql" , create a stored procedure
Platform: | Size: 19456 | Author: qianzhi | Hits:

[Windows Developmail

Description: 用法示意如下: < @LANGUAGE="VBSCRIPT" > < option explicit dim DbConn,connstr,db Email配置信息 dim SmtpHost, AdminName, AdminEmail, NeedAuth, EmailAccount, EmailPW SmtpHost="smtp.263.net" AdminEmail="XXX@263.net" NeedAuth=true 是否需要认证 EmailAccount="hubdog" EmailPW="XXXX" AdminName="管理员" 发送email function SendMail(Email, Subject, Body) set MailSender=Server.CreateObject("IndyMail.MailSender") MailSender.SetBody Body MailSender.SetFrom """"+AdminName+""" <"+AdminEmail+">" MailSender.SetHost SmtpHost MailSender.SetAuth NeedAuth MailSender.SetSenderName EmailAccount MailSender.SetSenderPW EmailPW MailSender.SetSubject Subject MailSender.SetTo Email SendMail=MailSender.Send end function >-Use to indicate the following: < @ LANGUAGE = " VBSCRIPT" > < ' option explicit dim DbConn, connstr, db' Email Configuration Information dim SmtpHost, AdminName, AdminEmail, NeedAuth, EmailAccount, EmailPW SmtpHost = " smtp.263.net" AdminEmail = " XXX@263.net" NeedAuth = true ' the need for certification EmailAccount = " hubdog" EmailPW = " XXXX" AdminName = " administrator" ' Send email function SendMail (Email, Subject, Body) set MailSender = Server.CreateObject (" IndyMail.MailSender" ) MailSender.SetBody Body MailSender.SetFrom " " " " + AdminName+ " " " < " + AdminEmail+ " > " MailSender.SetHost SmtpHost MailSender.SetAuth NeedAuth MailSender.SetSenderName EmailAccount MailSender.SetSenderPW EmailPW MailSender.SetSubject Subject MailSender.SetTo Email SendMail = MailSender.Send end function >
Platform: | Size: 113664 | Author: 黄凡 | Hits:

[WEB Codeasp

Description: 这是简单例子,连接同一文件夹下 Access 数据库 MyFile.mdb,显示其中数据表 MyTable 的字段 MyField 的第一个记录数据: -Set cn = Server.CreateObject("ADODB.Connection") cn.Open "provider=microsoft.jet.oledb.4.0 data source=" & server.MapPath("MyFile.mdb") Set rs = Server.CreateObject("ADODB.Recordset") rs.Open "Select* From MyTable", cn Response.Write rs.Fields("MyField") rs.Close cn.Close Set cn = Nothing
Platform: | Size: 2048 | Author: midefeng | Hits:

[WEB Codeweb

Description: 一.源码说明 本源码是一款功能十分强大的分类信息整站。是我在网上搜集而来,本地已测试N遍完整,已集成了论坛,所有功能全部可用。源码内附带了ASP本地调试工具,打开后即可本地调试。 此源码暂时没有演示地址,请看首页演示截图。 二.安装说明: 解压后将web文件夹里的所有文件上传至空间根目录,即可运行。 后台地址http://localhost/lovepiao/ 管理员帐号和密码:admin 三.用户注册和修改密码说明: 用户注册最后一步如果出现以下错误的解决方法: Microsoft VBScript 运行时错误 800a01ad ActiveX 部件不能创建对象: Server.CreateObject \regchkok.asp, line 162 把补丁文件夹里的regchkok.asp和u_editzl.asp(这个是用户修改密码)复制到根目录并覆盖 出错的原因是空间不支持jmail组件。-I. Source Description The source is a very strong function of the classified information the entire station. I gather from the Internet, the local has been tested over the complete N, has integrated the forum, all the features of all available. Source attached to a local ASP debugging tool that opens to local debugging. No demonstration of this source address, see page demo screenshot. Two. Installation Instructions: Web folder after extracting all the files uploaded to the root directory space, you can run. Address http://localhost/lovepiao/ background Administrator account and password: admin Three. User registration and change the password instructions: Register the following error if the last step solution: Microsoft VBScript runtime error 800a01ad ActiveX component can not create object: Server.CreateObject \ regchkok.asp, line 162 The patch folder in the regchkok.asp and u_editzl.asp (this is the user change the password) to the root directory and overwri
Platform: | Size: 10907648 | Author: 张天明 | Hits:

[WEB Codeyantaiyl

Description: !--#include file="conn.aspx"--> < set rs1=Server.CreateObject("Adodb.Recordset") sql1="select * from webconfig " rs1.open sql1,conn,1,1 website=trim(rs1("website")) rs1.close set rs1=nothing > <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html charset=utf-8" /> <script type="text/javascript" src="/js/jquery.js"></script> <script language="JavaScript" src="/js/artDialog/artDialog.js?skin=default"></script> <script src="/js/login.js" type="text/javascript"></script> <link type="text/css" rel="stylesheet" href="themes/block/main.css" /> <title>< =website ></title> </head> <body class="loginBg"> <div class="login"> <form name="form1" onSubmit="return login() ">-!--#include file="conn.aspx"--> < set rs1=Server.CreateObject("Adodb.Recordset") sql1="select * from webconfig " rs1.open sql1,conn,1,1 website=trim(rs1("website")) rs1.close set rs1=nothing > <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html charset=utf-8" /> <script type="text/javascript" src="/js/jquery.js"></script> <script language="JavaScript" src="/js/artDialog/artDialog.js?skin=default"></script> <script src="/js/login.js" type="text/javascript"></script> <link type="text/css" rel="stylesheet" href="themes/block/main.css" /> <title>< =website ></title> </head> <body class="loginBg"> <div class="login"> <form name="form1" onSubmit="return login() ">
Platform: | Size: 5368832 | Author: 宋伟 | Hits:

[OtherWEB编程开发常用的代码 .txt

Description: asp连接数据库 2. ASP与SQL数据库连接: dim conn set conn=server.createobject("ADODB.connection") con.open "PROVIDER=SQLOLEDB;DATA SOURCE=SQL服务器名称或IP地址;UID=sa;PWD=数据库密码;DATABASE=数据库名称;" 建立记录集对象: set rs=server.createobject("adodb.recordset") rs.open SQL语句,conn,3,2 SQL常用命令使用方法:(WEB programming code commonly used 1. ASP connect to the Access database)
Platform: | Size: 3072 | Author: 老夫子008 | Hits:

CodeBus www.codebus.net