📄 killword.asp
字号:
<%
if not session("sfadmin") then response.redirect("welcome.asp")
%>
<!--#INCLUDE FILE="../inc/db_inc.asp"-->
<!--#INCLUDE FILE="../inc/md5_inc.asp"-->
<!--#INCLUDE FILE="../inc/char_inc.asp"-->
<HTML>
<HEAD>
<TITLE>Untitled Document</TITLE>
<META http-equiv="Content-Type" content="text/html; charset=gb2312">
<LINK rel="stylesheet" href="image/style.css" type="text/css">
</HEAD>
<BODY bgcolor="#FFFFFF" text="#000000" leftmargin="10" topmargin="10">
<%
Set Conn = Server.CreateObject("ADODB.Connection")
Conn.Open StrConn
%>
<!--#INCLUDE FILE="checkadmin.asp"-->
<%
if request("step") = "2" then
strsql = "update sf_setup set badwordlist='" & chksql(request("badwordlist")) & "'"
Conn.Execute(strsql)
%>
<TABLE width="100%" border="0" cellspacing="1" cellpadding="4" align="center">
<TR>
<TD bgcolor="#D1E3BF" align="center">脏字过滤设置完毕</TD>
</TR>
</TABLE>
<%
else
StrSql = "select badwordlist from sf_setup"
Set rs = Conn.Execute(StrSql)
if not(rs.bof or rs.eof) then
badwordlist = server.htmlencode(rs("badwordlist"))
%>
<FORM name="form1" method="post" action="killword.asp">
<TABLE width="100%" border="0" cellspacing="1" cellpadding="4" align="center">
<TR>
<TD bgcolor="#D1E3BF" align="center" colspan="2"><B>脏字过滤设置:</B></TD>
</TR>
<TR bgcolor="#F5F5F5">
<TD>脏字列表</TD>
<TD>
<TEXTAREA name="badwordlist" cols="60" rows="5"><% =badwordlist %></TEXTAREA><BR><B>注意:</B> 多个脏字间用英文字符竖线隔开, 例如: fuck|shit</TD>
</TR>
<TR align="center">
<TD colspan="2">
<INPUT type="hidden" name="step" value="2">
<INPUT type="submit" name="Submit" value="确 定">
</TD>
</TR>
</TABLE>
</FORM>
<%
end if
end if
%>
</BODY>
</HTML>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -