by ellie

2008-8-13 22:53
The 2008 Beijing Olympic Games are in full swing. Add these two widgets to your blog, and you'll be the first to get all kinds of Olympic information. 1. Olymp......
2008-8-13 22:31
With the popularization of computers, more and more people begin to complain: sore wrists, numb shoulders, inflexible finger joints... In fact, these "killers"......
To transform the URL from `show.asp?id=26` to the form `show/?26`, you can share the following code snippet. This example assumes you're working within a web development context, such as using ASP or another server-side technology. Here's an approach to achieve this: ### Using ASP (Active Server Pages): You can modify the logic in your `show.asp` file to handle the new URL format. ```asp <% ' Retrieve the query string value directly Dim id id = Request.ServerVariables("QUERY_STRING") ' Validate and sanitize the input (basic check for digits) If IsNumeric(id) Then ' Proceed with your logic using the id variable Response.Write "The ID is: " & id Else ' Handle invalid input Response.Write "Invalid ID provided." End If %> ``` ### Explanation: 1. **Retrieve the Query String**: In the new format (`show/?26`), the query string itself becomes the value after the question mark (`?`). You can access it using `Request.ServerVariables("QUERY_STRING")`. 2. **Validation**: Always validate and sanitize inputs to ensure security and correctness. 3. **Processing**: Once validated, you can proceed with your application logic. ### Rewriting URLs (Optional - For Cleaner URLs): If you want to enforce the `show/?26` format consistently across your application, consider implementing URL rewriting rules. For example, in IIS (Internet Information Services), you can use the URL Rewrite Module. #### Example of URL Rewrite Rule for IIS: ```xml ``` This rule rewrites URLs like `show/?26` internally to `show.asp?id=26` while keeping the cleaner format visible to users. Let me know if you need further clarification!
2008-8-13 11:37
The format like http://www.xxx.com/show.asp?id=26 can be simplified to http://www.xxx.com/show/?26, which looks cleaner. Of course, for spaces that support pse......
2008-8-13 1:0
(1) User changes security level: Create a key named "Security_options_edit" under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Interne......
2008-8-13 0:24
From the above example, we can actually see the trajectory of our work: in our twenties and thirties, the pressure of life is still relatively small, our bodie......
2008-8-13 0:11
The network neighborhood can see another computer, but when you double-click, it prompts "Unable to access. You may not have permission to use the network reso......
2008-8-12 23:57
1) Open "My Computer" -- Tools -- Folder Options -- Select "Show all files and folders" under the Hidden Files and Folders section, then click OK. 2) Open th......
2008-8-12 23:53
Maybe you don't know, when replying to a post, just input the following characters, and you can immediately tell if your computer is infected with a virus. If ......
2008-8-12 23:50
Does everyone often encounter the issue of "Cannot stop the 'general volume' device now. Please stop the device later."? This useless prompt often appears when......
2008-8-12 23:30
Recently, IBM has collaborated with Linux distributors such as Red Hat, Novell, and Ubuntu to launch a Microsoft-Free (not using Microsoft software) initiative......
2008-8-12 23:4
Today, I encountered an issue while working on a website: ActiveX content could not auto-load. ^_^ The error message in my code settings was "This text is repl......
2008-8-12 19:30
Behavior analysis: The virus spreads through MSN, disguised as a photo archive sent to contacts on MSN, enticing the contact to receive and open the virus. The......
2008-8-12 16:40
Nowadays, various universal Ghost installation CDs and files for the Windows XP system are popular on the market and online. They are indeed convenient to use;......
2008-8-12 15:33
A Trojan horse dubbed "Zlob" (also known as dnschanger) has been discovered, according to researchers. This virus can attack victims' Internet routers and moni......
2008-8-11 23:54
1. Winmsd -- The "Peacock Feather" for beginners: This command can open the "System Information" window, allowing users to view information about hardware reso......
2008-8-11 23:20
First, open Google, and in the keyword input box, type "indexof/" inurl:lib (the quotation marks should be in English mode), then select the "Search Simplified......
2008-8-9 22:54
How can you prevent others from using your software? Set access permissions? Encrypt the folder? Below is a somewhat "mischievous" method~ In the folder where......
2008-8-6 23:16
I heard that the new Windows operating system is Mojave. This new generation of Windows is an innovative product integrating many features such as security, sp......
2008-8-6 23:14
Under VISTA, you can uninstall in the following way: Since IE8 is installed as an update rather than a regular program, you can restore the previous IE7 by uni......
2008-8-6 23:13
If our IE is damaged by malicious code and cannot be used normally, and we need to uninstall and reinstall IE 6.0, what should we do? Let me teach you a trick ......
2008-8-6 23:1
Microsoft used to use Windowslive.com as the main hub to get information about its Live branded services such as Messager, Hotmail, Spaces, Skydrive and Photo ......
2008-8-6 22:57
When it comes to virtualization technology, I'm sure many of you are now familiar with it. In the entire IT industry, virtualization has become a keyword, from......
2008-8-6 22:52
The environment for solving this problem was Windows XP IIS 5.0, with normal permission settings. When opening an ASP file, it would prompt "HTTP 500 Internal ......
2008-8-6 20:10
Recently, the automatic updates of XP have been failing. I thought it was due to the automatic restore service being turned off, but surprisingly, even after e......
2008-8-5 18:39
In Windows XP, if we want to enter Safe Mode, we must press the F8 key at startup and then select Safe Mode from the boot options menu. Actually, we can add Sa......
2008-8-4 16:49
My evaluation of UltraEdit: **Advantages:** 1. Files open relatively quickly. 2. The hexadecimal editing function is powerful. 3. Column operations are......
2008-8-4 16:47
First of all, the headhunting industry charges only one party, and absolutely does not charge individuals; it only charges companies. A common person might ask......
2008-8-4 16:8
The "load" key, which is hidden very deeply, is located at: `HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load` The "Userinit" key, is located a......
2008-8-4 15:45
I often see a chat dialog box in some friends' blogs, which allows users browsing the site to chat. In my opinion, this function is like chicken ribs - who wou......
2008-8-4 0:55
Many times, people have already used various security software and antivirus software to detect that their computers are infected with viruses such as Backdoor......