Solved

MySQL front end using Perl/CGI/DBI: How to implement multiple scripts after authentication page?

Posted on 2006-10-23
3
222 Views
Last Modified: 2013-12-25
Hi all,

I am not a complete newbie but relatively new to CGI and databases, I just know Perl well. I am implementing the front and back ends of a MySQL database using Perl/CGI. What I would like to ask is how to create the following setup.

A front/first page which asks username, password and whether I want to search, add or modify the database. Depending on the userid and the choice made, the second page (which I guess will be a second cgi script) loads. The second page will be the mysql front end (search/modify/add). The second page could call a third script depending on certain choices. I don't yet know how to pass parameters well. I know somewhat how to pass parameters that appear in the URL (like search.cgi?param1=xyz&param2=abc).

I have searched and seen recommendations to use Session cookies and MD5 but I haven't still figured how to and am in a time crunch. If somebody can provide me with sample scripts that I can use and learn from, that would be great. A sample cgi script that uses the parameters passed to it (visible and hidden) will also be of help. Pointers to specific resources welcome. I am assigning 500 points.

Thanks a lot,
JCP
0
Comment
Question by:jcprasad
3 Comments
 
LVL 8

Accepted Solution

by:
Perl_Diver earned 500 total points
ID: 17793160
If the main question is how to parse the data passed to your perl script, the CGI module is sort of the defacto module to use for that purpose:

http://perldoc.perl.org/CGI.html

search on CPAN for CGI and you will see there are many modules for working with CGI data:

http://search.cpan.org/search?query=CGI&mode=all

you will find this of interest too most likely:

http://search.cpan.org/~sherzodr/CGI-Session-3.95/Session/CookBook.pm
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Low Disk Space Script to warn logged in User (not via email) 6 80
php survey script 4 64
Update a File not in all folders 2 43
Register AutoHotkey 12 53
It is a general practice to get rid of old user profiles on a computer  in a LAN environment. As I have been working with a company in a LAN environment where users move from one place to some other place at times. This will make many user profil…
This article will show, step by step, how to integrate R code into a R Sweave document
Learn the basics of lists in Python. Lists, as their name suggests, are a means for ordering and storing values. : Lists are declared using brackets; for example: t = [1, 2, 3]: Lists may contain a mix of data types; for example: t = ['string', 1, T…
The viewer will learn how to create a basic form using some HTML5 and PHP for later processing. Set up your basic HTML file. Open your form tag and set the method and action attributes.: (CODE) Set up your first few inputs one for the name and …

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now