Solved

Login with a password

Posted on 1997-05-02
4
210 Views
Last Modified: 2013-12-25
I'm operating a web site and considering allowing registered users additional features.  These fetaures would have to be password protected each with an individual login name and password.

I am interested in one with a setup similar to that of experts - exchange where a user is asked to enter there password to get into the site!

Can you tell me where I can obtain such a cgi script, it must be free.

Thanks alot
0
Comment
Question by:bulmer
  • 2
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
icd earned 100 total points
Comment Utility
This access control uses an 'htaccess' file to determine which users are allowed to enter a site (actually a directory). There is an access tutorial at:-

http://faq.clever.net/htaccess.htm

This will give you full details on how to set up this file.

0
 

Author Comment

by:bulmer
Comment Utility
Will this allow me to set up a protection similar to yours?  How secure is this?  I already have a .htaccess file used for redirecting error messages and have found it to be unsecure.  I'd prefer a cgi script?  Any more idea's?
0
 
LVL 5

Expert Comment

by:icd
Comment Utility
Experts Exchange uses this scheme, as do many sites and it is secure. A cgi script can be no more secure (and indeed is likely to be far LESS secure).

Some sites will however allow the maintainence of the .htaccess file to be carried out by a cgi script. In this way people can register with a site through a script. Their username and password are entered into the .htaccess file using the script. I understand this is the way that Experts Exchange works and perhaps this is what you are looking for?

I am puzzled by your suggestion that you are already using this for 'redirecting error messages' and that you find it 'unsecure'. Can you elaborate?

0
 

Author Comment

by:bulmer
Comment Utility
nope, you have just solved my problem!  Thanks
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Introduction This tutorial will give you a fast look what you can do with WhizBase. I expect you already know how to work with HTML at least, and that you understand the basics of the internet and how the internet works. WhizBase is a server-s…
In this tutorial I will show you how to provide a dynamic RTF document on your website generated with data from your database. For this tutorial you will need Microsoft Word or WordPad, WhizBase and Microsoft Access. In this tutorial I will show …
Learn the basics of strings in Python: declaration, operations, indices, and slicing. Strings are declared with quotations; for example: s = "string": Strings are immutable.: Strings may be concatenated or multiplied using the addition and multiplic…
In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now