Solved

long file names

Posted on 1998-11-26
5
116 Views
Last Modified: 2013-12-25
Will using filenames for web pages longer than 8 letters cause any problems for any web browsers?
0
Comment
Question by:jtp101
  • 3
  • 2
5 Comments
 
LVL 5

Expert Comment

by:aioudine
ID: 1856763
generaly no,
but avoid using filename with spaces and national characters (non-latit-1)
it's may confuse same browsers (like Netscape 3 for Win3.x)
0
 

Author Comment

by:jtp101
ID: 1856764
Hello Again aioudine

I really need more info on exactly which browsers would be affected.

Thanks anyway.

From
   Justin
0
 
LVL 5

Expert Comment

by:aioudine
ID: 1856765
OK To be clear, according to RFC 2068

1) Servers should be cautious about depending on URI lengths
above 255 bytes, because some older client or proxy implementations
may not properly support these lengths.

2) You may not use in URL
reserved       = ";" | "/" | "?" | ":" | "@" | "&" | "=" | "+"
unsafe         = CTL | SP | <"> | "#" | "%" | "<" | ">"
where is
CTL            = <any US-ASCII control character   (octets 0 - 31) and DEL (127)>
SP             = <US-ASCII SP, space (32)>
<">            = <US-ASCII double-quote mark (34)>

We never have problem with filename length (our URL is less 255 char)
We have problem with national character using dark-age International ver of Netscape 2&3.?  running on Win3.1

0
 

Author Comment

by:jtp101
ID: 1856766
So using only standard alphabet (abc...) filenames shorter than 256 characters will work
even in the dead old browsers Right?

Anyway you have answered my question so if you post your comment again as an answer
I'll give you the points.

Thanks very much.

From
   Justin
 
0
 
LVL 5

Accepted Solution

by:
aioudine earned 10 total points
ID: 1856767
Yes it's will work
thank you

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
Any person in technology especially those working for big companies should at least know about the basics of web accessibility. Believe it or not there are even laws in place that require businesses to provide such means for the disabled and aging p…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now