Two functions for ASP to generate random passwords
Two functions for ASP to generate random passwords:
Function 1
<% function makePassword(byVal maxLen) Dim strNewPass Dim whatsNext, upper, lower, intCounter Randomize For intCounter = 1 To maxLen whatsNext = Int((1 - 0 + 1) * Rnd + 0) If whatsNext = 0 Then 'character upper = 90 lower = 65 Else upper = 57 lower = 48 End If strNewPass = strNewPass & Chr(Int((upper - lower + 1) * Rnd + lower)) Next makePassword = strNewPass end function %>
makePassword(str) 'str Number of digits in the password
Function 2
<% Function gen_key(digits) dim char_array(35) char_array(0) = "0" char_array(1) = "1" char_array(2) = "2" char_array(3) = "3" char_array(4) = "4" char_array(5) = "5" char_array(6) = "6" char_array(7) = "7" char_array(8) = "8" char_array(9) = "9" char_array(10) = "A" char_array(11) = "B" char_array(12) = "C" char_array(13) = "D" char_array(14) = "E" char_array(15) = "F" char_array(16) = "G" char_array(17) = "H" char_array(18) = "I" char_array(19) = "J" char_array(20) = "K" char_array(21) = "L" char_array(22) = "M" char_array(23) = "N" char_array(24) = "O" char_array(25) = "P" char_array(26) = "Q" char_array(27) = "R" char_array(28) = "S" char_array(29) = "T" char_array(30) = "U" char_array(31) = "V" char_array(32) = "W" char_array(33) = "X" char_array(34) = "Y" char_array(35) = "Z" randomize do while len(output) < digits num = char_array(Int(35 * Rnd + 0)) output = output + num loop gen_key = output End Function %>
gen_key(str) 'str is the number of password digits
This function can also be expanded. . If you want to add the "case-sensitive" feature, change the array size to char_array(50), and then list all possible lowercase characters later. For example:
char_array(36) = "a"
char_array(37) = "b"
.....and so on
The above is the detailed content of Two functions for ASP to generate random passwords. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

ASP built-in objects include Request, Response, Session, Application, Server, Session.Contents, Application.Contents, Server.CreateObject, Server.MapPath, Server.Execute, Server.Transfer, etc. Detailed introduction: 1. Request: represents HTTP request object, etc.

ASP development tools include Visual Studio, Dreamweaver, FrontPage, EditPlus, UltraEdit, SQL Server Management Studio, RAD Studio, Delphi, Asp.NET and Oracle SQL Developer.

ASP scanning tool vulnerability detection: 1. Select the appropriate scanning tool; 2. Configure the scanning target in the scanning tool; 3. Configure scanning options as needed; 4. After the configuration is completed, start the scanning tool to start scanning; 5. Scanning tool A report will be generated listing the detected vulnerabilities and security issues; 6. Fix the detected vulnerabilities and security issues according to the recommendations in the report; 7. After fixing the vulnerability, re-run the scanning tool to ensure that the vulnerability has been successfully exploited repair.

ASP manual detection of vulnerabilities: 1. Check the ASP application's verification and filtering mechanism for user input; 2. Check the ASP application's encoding and filtering mechanism for output data; 3. Check the ASP application's authentication and session management mechanism; 4. Check the ASP application's permission control on files and directories; 5. Check the ASP application's handling of errors; 6. Check the ASP application's database security; 7. Check the ASP application's configuration file and server configuration.

Methods include: 1. Use specialized vulnerability scanning tools; 2. Manual testing to discover and verify vulnerabilities in ASP applications; 3. Conduct security audits to check the code and configuration files of ASP applications; 4. Use vulnerability exploitation frameworks; 5. Review the code of the ASP application.

Connection method: 1. Use ADO to connect to the database; 2. Use DSN to connect to the database; 3. Use the connection string to connect to the database.

iPhone average selling price (ASP) achieved double-digit growth last year, growing 14% year-on-year. The popularity of iPhone 13 is a key driver, helping push the global smartphone market as a whole to a record annual revenue of $448B. Despite parts shortages, the smartphone market grew 7% year-on-year, with Apple taking by far the largest share... Market intelligence firm Counterpoint released its latest estimates today. According to the latest research from Counterpoint's MarketMonitorService, the global smartphone market revenue will exceed US$448 billion in 2021. Even as component shortages and COVID-19 restrictions continue to disrupt global supply

ASP security audit vulnerability detection steps: 1. Collect relevant information about the ASP application; 2. Carefully analyze the source code of the ASP application; 3. Check the ASP application's verification and filtering mechanism for user input; 4. Check the application's Encoding and filtering mechanism of output data; 5. Check the application's authentication and session management mechanism; 6. Check the application's permission control on files and directories; 7. Check the application's handling of errors; 8. Check the application's Configuration files and server configuration; 9. Fix vulnerabilities.
