auto loop back IP address

Posted on 1998-10-20
Last Modified: 2006-11-17
I read in a book that setting a link to   would allow one to use a perl script locally on a win 95 machine provided that a server soft like Windows personal server and perl were both set up.  I tried this but the script was run without looping back.

The script was:

print "Content-type: text/html\n\n";

print "Worked";

and the call was:  <A HREF="">test</A>

where binvvv was the shared directory set up by the server soft.  As I said the script ran( in a ms-dos window) but the info never looped back. Any suggestions?
Question by:guadalupe
  • 4

Author Comment

ID: 1205549
PS the script runs fine if called in dos but with "perl"
might be important?


Author Comment

ID: 1205550
pps  sorry but I also realized another detail:

MS Explorer asks me if I want to run the file or save it.  like it doesn´t know what to do with it.  Thats when it runs in the msdos windoe without looping back.  So this is important and the ps added above not so much as the script does get run just not looped back
LVL 28

Accepted Solution

sybe earned 70 total points
ID: 1205551
make sure that the directory of the perlscript is "executable" (make a virtual directory, and make it executable)

Edit the registry (using regedit)
go to

[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W3Svc\Parameters\Script Map]

and add

".pl"="C:\perl5\bin\perl.exe %s"


Author Comment

ID: 1205552
Thanks for the suggestion but now the pl script is just oppened as a text document in the browser window, before it was being run (though only in a ms dos window which closed upon completion) and now not even that??

Author Comment

ID: 1205553
Hey just got it to work.  I set the file association in the file type window in Folder Options.  The same association as you stated for the registry.  I don't know why that did it but it did.  Thanks for your help.


Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many time we need to work with multiple files all together. If its windows system then we can use some GUI based editor to accomplish our task. But what if you are on putty or have only CLI(Command Line Interface) as an option to  edit your files. I…
I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now