Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Creating a log in area from form details

Posted on 2006-10-22
2
Medium Priority
?
158 Views
Last Modified: 2013-12-24
Hi experts,

I am using a frontpage form to collect information from my website visitors, and the form collects their first name and their email address.

How would I go about having a secure log in area that would work by using what the person signed up with?

For example, to log into a secure area that would be protected, the visitor would inout their name and their email address to gain access to the secure area?

I would prefer to do all this in frontapage, if it can be done this way.

I have the form data saved in the _private folder of the root.

Cheers guys, and thanks in advance for your help!


Kevin
0
Comment
Question by:oconnork00
2 Comments
 
LVL 16

Accepted Solution

by:
CWS (haripriya) earned 1500 total points
ID: 17786962
For doing this you need to know some scripting languages, ASP or PHP with javascript.

You should maintain a database either MS Access or My SQL or SQL.

You can design a form for collecting the name and email address with some password. Store it in  the database. So, next time if the user logs in with his/her name and email, you can check with the database and redirect them accordingly.

If you need any further help, please ask.
0
 
LVL 2

Author Comment

by:oconnork00
ID: 17787440
Hi cyberwebservice,

I am collecting details from people and it is saving to a text file as csv.

Could you demonstrate to me how I could implement this to work? From my limited knowledge I would imagine that somehow my secure log in area would read into the txt file, look for the person's email address, check to see if it is on the list, and if inputted correctly, allow them in!

It's nothing too secure, just a free pdf i would like people to download after signing up.


Cheers for all the help cyberwebservice,


Kevin
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When setting up new project requests for our site, one of the most powerful tools our team has available to use is Axure (http://www.axure.com/). It’s a tool for creating software and web prototypes that can function and interact as if it were the a…
Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
The purpose of this video is to demonstrate how to Import and export files in WordPress. This will be demonstrated using a Windows 8 PC. Go to your WordPress login page. This will look like the following: mywebsite.com/wp-login.php : Click on Too…
The purpose of this video is to demonstrate how to integrate Mailchimp with Facebook. This will be demonstrated using a Windows 8 PC. Mailchimp and Facebook will be used. Log into your Mailchimp account. : Click on your name. Go to Account Setti…
Suggested Courses

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question