creating forms on local lan

Posted on 2012-09-13
Last Modified: 2012-09-17
Hi Experts -

I tried to search google for forms that can be installed on a linux machine (for free) and I couldn't find any, I'm sure the keywords that I'm using aren't the best...would anyone out there recommend what they use?

Question by:gsmith888
    LVL 49

    Expert Comment

    by:Julian Hansen
    I tried to search google for forms
    Can you explain a bit more - what sort of forms?

    Author Comment

    simple forms to collect data and some verification process if possible.
    LVL 49

    Accepted Solution

    Your request is very open ended and it is difficult to answer without knowing more on what you are trying to do and what you expect to get in answer to your question
    A form is not a generic thign - you build it to your requirements
    <form action="processform.php" method="post">
       Name <input type="text" name="name" />
       Telephone <input type="text" name="telephone" />
       Email <input type="text" name="email" />
       <input type="submit" />

    Open in new window

    The above will display a form asking for Name, Telephone and Email. When you click the submit button it will post the results to the script processform.php which will then do something with those values - exactly what depends on what you need done with the values and the script will need to be coded to your requirements.

    Validation can happen on the client side using Javascript and / or on the server side in your processing script.

    Your question seems to be asking for some sort of component - like RSForms for Joomla.

    If you are using an opensource framework there may be a plugin you can use but we can't advise without knowing more about what you are using.

    If you are developing your own code then you will need to code the form yourself - there may be some generic code out there that will allow you to automatically process forms - but again without know what you intend to do difficult to comment

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    The viewer will learn how to count occurrences of each item in an array.
    This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now