[Javascript] force to load window.open()

noel.jean-baptiste at courrier.uqam.ca noel.jean-baptiste at courrier.uqam.ca
Wed Jun 18 17:18:05 CDT 2003


Hi, 
my code is :
<A HREF="javascript:window.open('./ServletAcces?
nomBase=etudiant','_self','status=yes');" >
<IMG SRC="bouton.gif"/></A>

When i clik on the button for the first time the ServletAcces is 
called.
But the second time and more, the ServletAcces is not called because i 
think it's the cach's browser.
How can i do to force the link to call the ServletAcces each times it 
is called ?
 
I kwow it is ok if i use _blank as attribute but i don't want to use 
it.

Thanks a lot




Djib

---- Messages d´origine ----
De: "Michael Dougherty" <Michael_Dougherty at PBP.com>
Date: lundi 14 avril  2003 22:12
Objet: RE: [Javascript] ssi, layers, table alternative to frames

> suppose your "SafeInclude" file were overwritten with 
> "CrackerTools" and
> included into an otherwise 'friendly' web page?  My point is that 
> by the
> time the web designer/developer should be worrying about security 
> failuresof a site compromised by a root kit, it's already too 
> late.  Security should
> be in place before the building starts, and then kept in mind 
> throughout the
> process; not added on like landscaping after the job is done.  I 
> would have
> been more concerned about this, but using IIS on Win2k means we 
> are at risk
> regardless of the implementation decisions we make for the site 
> itself,since the web server and OS are notorious in their own 
> right. :)
> 
> -----Original Message-----
> From: javascript at LaTech.edu [mailto:javascript at LaTech.edu]
> Sent: Monday, April 14, 2003 9:53 PM
> To: javascript at latech.edu
> Subject: Re: [Javascript] ssi, layers, table alternative to frames
> 
> 
> I presume if you have some kind of security code in each include 
> it would
> help?
> 
> <%
> if not checkUser() then
>  ' kick out
> end if
> 'rest of include %>
> 
> >> More inherently insecure than unpatched software?  I can't 
> understand>how
> >> SSI is any more dangerous in a controlled environment than any 
> other>kind
> of
> >> active content.  <!-- #include 
> virtual="/inc/TooLazyToRetype.htm" -->
> >> shouldn't be posing much security threat.
> >http://url/crackers/utility.asp
> >> would be a far worse thing to have running.  If this is listed 
> as a
> drawback
> >> to using SSI, then i would suggest the administrator just 
> disconnect the
> >> ethernet from the box or turn it off altogether...
> >>
> >> "Just a thought"
> 
> 
> 
> _______________________________________________
> Javascript mailing list
> Javascript at LaTech.edu
> https://lists.LaTech.edu/mailman/listinfo/javascript
> 
> _______________________________________________
> Javascript mailing list
> Javascript at LaTech.edu
> https://lists.LaTech.edu/mailman/listinfo/javascript
> 



More information about the Javascript mailing list