Solved

cgi form

Posted on 1997-12-17
2
186 Views
Last Modified: 2013-12-25
I know very little about CGI, just the basic concepts.

I'm working on a feedback mail form that includes check boxes, radio buttons, and text fields.

I've created my own form and my HTML page is ready. The ISP I will use requires sending them the script and they install it.

My question is can I use a mailto.cgi script that I find on the internet to mail the form results? Or will I have to edit the script to match my form layout?

I want a simple report of the user's form input by email.
0
Comment
Question by:brado
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Expert Comment

by:icd
ID: 1831674
If the ISP is going to install the script for you then they are soon going to be hacked off. Unless you can do your testing on a home PC (I use Win95 with PWS and perl) then you are unlikely to get the script to work first time and will need to upload it several times.


0
 
LVL 6

Accepted Solution

by:
alamo earned 50 total points
ID: 1831675
The most common email script I've seen is Formmail, from "Matt's Script Archive". Most of the problems I've seen reported here have to do with things like file rights, and if your ISP is doing the install that shouldn't be a problem. If there does turn out to be a problem your ISP is much more likely to believe it's something on their end (which it almost certainly will be) if you are using a well known off-the-shelf script. Formmail does not need to be edited for each form, all the info it needs is included in the form.

You can get it from http://www.worldwidemart.com/scripts/formmail.shtml 

Good luck!
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will show, step by step, how to integrate R code into a R Sweave document
In threads here at EE, each comment has a unique Identifier (ID). It is easy to get the full path for an ID via the right-click context menu. However, we often want to post a short link within a thread rather than the full link. This article shows a…
HTML5 has deprecated a few of the older ways of showing media as well as offering up a new way to create games and animations. Audio, video, and canvas are just a few of the adjustments made between XHTML and HTML5. As we learned in our last micr…
In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question