Hi list,
I am working on a catalyst project and would have been attempting to create
a user page (form) that allows someone to create an sql query to hammer a
local DB (all secure-ish - maybe). I have used a javascript function to
return the post options and used the catalyst method
$c->request->
Hi list,
I am trying to generate a web page containing a form which is constructed
automagically with catalyst.
The variable which is passed to the template is an array ( [% column_names
%] )
each element in the array looks like:
foo.bar
foo.baz
oof.rab
oof.zab
...
As I loop over t
Sorry, I am a fool. I found the methods in the VMethods section of the tt
website. Sorry.
I have used:
name.0.remove('.*\.')
to sort the problem
On Jan 9, 2008 4:13 PM, perlmunky <[EMAIL PROTECTED]> wrote:
> Hi list,
>
> I am trying to generate a web page c
Hi List,
I am in the process of making a web service which will (at some point) query
an oracle DB with some user supplied text. Currently the page allows the
user to select the information in the insert from a tick box, the tables
from a list and the conditional they can choose and then enter as
On Jan 11, 2008 6:47 PM, Chris Charley <[EMAIL PROTECTED]> wrote:
>
> See this colimn by Randal L. Schwartz. It descibes injection attacks.
> http://www.stonehenge.com/merlyn/UnixReview/col58.html
>
> Thanks, I read the page, alongside the wikipedia page and I think I
understand what an sql inject