Recommended: How to prevent sensitive information from being extracted from the page Emails published on web pages are often automatically extracted by some tools, and some illegal users will use the extracted email to send spam. Most of these tools are searching for the information behind the mailto: or the letter before and after @ in the link
This code is suitable for you to use on the website, and ordinary friends can ignore this thing!
ASP:
| CODE: [Copy to clipboard] <% dim objXMLHTTP, qq, pwd qq = 10000 pwd = 123456 set objXMLHTTP = Server.CreateObject(MSXML2.XMLHTTP.5.0) objXMLHTTP.open POST, http://211.139.167.71/waptest/TWF/qqportal/rela/updateuserinfo.jsp, false objXMLHTTP.setRequestHeader Content-Type, application/x-www-form-urlencoded objXMLHTTP.setRequestHeader Connection, Keep-Alive objXMLHTTP.send(qq=&qq&&pwd=&pwd&&FromWhere=register) if InStr(objXMLHTTP.responseText, verification failed) then response.write login failed else response.write login successfully end if set objXMLHTTP = nothing %> |
PHP:
| CODE: [Copy to clipboard] <php $qq = 100000; //qq number $pwd = 123456; //Password $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, http://211.139.167.71/waptest/TWF/qqportal/rela/updateuserinfo.jsp); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); //This line is to set whether curl follows the location sent by header, important curl_setopt($ch, CURLOPT_POST, 1); //curl_setopt($ch, Connection, Keep-Alive); curl_setopt($ch, CURLOPT_RETURNTRANSFER,1); curl_setopt($ch, CURLOPT_POSTFIELDS, qq=.$qq.&pwd=.$pwd.&FromWhere=register); $return = curl_exec($ch); curl_close($ch); echo strstr($return, postfield) ? Login failed: login successfully; ?> |
Share: Let’s talk about ASP output N rows and N lists In almost every site, we have to use programs to output lists: news lists, product lists, etc. The output method also varies depending on the content. For news lists, it is usually a row of outputs per row; for product lists, it is usually a cell and a cell.