$.formValidator.reloadAutoTip(); //Reload the form validation style if(!$.formValidator.pageIsValid('1')) return false; //If it does not pass, do not submit
$(document).ready(function () { $.formValidator.initConfig({ formID: "form1", onError: function () { alert("The verification failed, please see the error message for specific errors") } }); $("# name").formValidator({ onShow: "Please enter your name!", onFocus: "Enter one to ten characters", onCorrect: "The input is correct, thank you for your cooperation!" }).inputValidator({ min: 1, max : 20, onError: "The input length is incorrect!" }); $("#timelong").formValidator({ onShow: "Please enter the roadshow duration!", onFocus: "The input format is a positive integer!", onCorrect: "The input is correct, thank you for your cooperation!" }).regexValidator({ regExp:"intege1",dataType: "enum", onError: "The duration format you entered is incorrect!" }); $( "#address").formValidator({ onShow: "Please enter the name of the roadshow platform!", onFocus: "Enter one to fifty characters", onCorrect: "The input is correct, thank you for your cooperation!" }).inputValidator({ min: 1, max: 50, onError: "The input length is incorrect!" }); $("#urladdress").formValidator({ onShow: "Please enter the roadshow link address!", onFocus: "Input format :http://www.baidu.com", onCorrect: "The input is correct, thank you for your cooperation! " }).regexValidator({ regExp:"^(http|https|ftp)://([a-zA- Z0-9.-] (:[a-zA-Z0-9.&%$-] )*@)*((25[0-5]|2[0-4][0-9]|[0 -1]{1}[0-9]{2}|[1-9]{1}[0-9]{1}|[1-9]).(25[0-5]|2[0 -4][0-9]|[0-1]{1}[0-9]{2}|[1-9]{1}[0-9]{1}|[1-9]|0 ).(25[0-5]|2[0-4][0-9]|[0-1]{1}[0-9]{2}|[1-9]{1}[0- 9]{1}|[1-9]|0).(25[0-5]|2[0-4][0-9]|[0-1]{1}[0-9]{2 }|[1-9]{1}[0-9]{1}|[0-9])|localhost|([a-zA-Z0-9-] .)*[a-zA-Z0-9 -] .(com|edu|gov|int|mil|net|org|biz|arpa|info|name|pro|aero|coop|museum|[a-zA-Z]{2}))(:[0 -9] )*(/($|[a-zA-Z0-9.,?'\ &%$#=~_-] ))*$", onError: "The input format is incorrect! " }); $("#time").formValidator({ onCorrect: "The format is correct" }).functionValidator({fun:isDateTime, onError: "The input format is wrong!" }); $ ("#txtcontent").formValidator({ onShow: "Please enter the expert's introduction!", onFocus: "Enter one to one hundred characters", onCorrect: "The input is correct, thank you for your cooperation!" }).inputValidator({ min: 1, max: 100, onError: "The input length is incorrect!" }); });
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),