Web2py supports it out of the nox
On Jul 15, 2011 10:39 AM, "Carl" wrote:
> Any views/insight for adding (or not adding) one of this approaches to
> web2py for its FORMS ?
>
http://www.codinghorror.com/blog/2008/10/preventing-csrf-and-xsrf-attacks.html
Cliff thanks for the heads up
Except I am not sure what :eval means in that context.
Thanks.
On 7/18/11 4:10 PM, Cliff wrote:
Notice the ':eval' as the last parameter to the ajax call.
ajax('{{=URL('revive_parrot')}}', ['dead_parrot_id'], ':eval')
If 'revive_parrot' ends with the following
Antonio;
I dont think the passwords are decrypt-able;
I remember asking this question and I think that its a one-way hash.
I could be wrong though.
Besides; your client has to TRUST you; obviously there is never a
guarantee who they hire wont be able to maliciously store plain text
passwords
How do use this from uwsgi? Currently I am launching the web2py app using
the web2py uswgi handler
On Aug 8, 2011 6:35 PM, "Massimo Di Pierro"
wrote:
> for now just set an insame large value for repeats. We could agree to
> use -1.
>
> On Aug 8, 12:12 pm, Marin Pranjic wrote:
>> It looks good.
>>
I am using Trunk
I normally have been accessing the console via...
I updated trunk today...
See stacktrace
./../web2py.py -S app -M -P
web2py Web Framework
Created by Massimo Di Pierro, Copyright 2007-2011
Version 1.98.2 (2011-08-09 11:18:07)
Database drivers available: SQLite3
Traceback (most
Thanks.
On 8/10/11 7:47 AM, Massimo Di Pierro wrote:
oops. sorry. should now be fixed in trunk.
On Aug 10, 5:32 am, "David J." wrote:
I am using Trunk
I normally have been accessing the console via...
I updated trunk today...
See stacktrace
./../web2py.py -S app -M -P
201 - 206 of 206 matches
Mail list logo