in reply to Re^3: Removing malicious HTML entities (now with more questions!)
in thread Removing malicious HTML entities (now with more questions!)
Huh? Let me elaborate.
Suppose I do the suggested, my code is as follows
# let this file be located at http://website.com/user/me/cgi-bin/file. +cgi open(PASS, '<../password.txt'); # read variables and assign close PASS;
The user then sees where the password file is located, and constructs the appropriate url (in the case given, it would be http://website.com/user/me/pasword.txt), right?
I'm so adjective, I verb nouns!
chomp; # nom nom nom
|
---|
Replies are listed 'Best First'. | |
---|---|
Re^5: Removing malicious HTML entities (now with more questions!)
by sasdrtx (Friar) on Aug 16, 2008 at 15:51 UTC | |
Re^5: Removing malicious HTML entities (now with more questions!)
by Perlbotics (Archbishop) on Aug 16, 2008 at 18:15 UTC | |
Re^5: Removing malicious HTML entities (now with more questions!)
by ikegami (Patriarch) on Aug 22, 2008 at 04:31 UTC |