Authorization table and authorized address, PHP Web Programming

The number of emails  to a given email address is updated each time an email is sent.  A request for a given address should be rejected unless the address is in the Authorization table and the number of current number of accesses for that address are below the limit.  Set the limit  at a value that reduces the risk of abuse of your web service if your reporter name and password are compromised.  You can enforce the limit and the authorized email addresses using SQL update command with an appropriate condition in its where clause.

Use the SQL update command in the PHP script to update the current attribute for the unique row with a matching address.  This command  should affect a row only if the address exists and if the limit for the address has not yet been reached.  The addresses and limit attribute values are manually set, and current is manually initialized to zero for each row.  Refer to IT 202 manual for the use of SQL update command (such as p. 239 of manual).  Refer to IT 202 manual or online PHP manual for related use of the mysql_affected_rows() function which returns how many rows were affected by the update (which will be zero if the request was un-authorized but one if the request was granted).

Posted Date: 3/29/2013 6:09:06 AM | Location : United States







Related Discussions:- Authorization table and authorized address, Assignment Help, Ask Question on Authorization table and authorized address, Get Answer, Expert's Help, Authorization table and authorized address Discussions

Write discussion on Authorization table and authorized address
Your posts are moderated
Related Questions
Hello, i''m building a sharing website for an internet providing company, i want this website to be accessed by only registered users for that company or else the website would be

want to learn php

In Dreamweaver, you may directly type content into a layout cell, or you can cut & paste content from another document in a layout cell. In this unit, you will insert text to the l

identify the feasible region for a set of constraints 3a-2b>0 2a - 1b 1a a,b>0

Yet another kind of input is HIDDEN input. A HIDDEN input is a name/value pair which is returned to you but do

Need a developer to create web-based service I am seeking a developer to build a website that will provide users with an online business service. I will provide wireframes of th

We need help in web site development I need a developer to replicate a site for me. This will need the developer to setup an account as well as engage in to the site understandi

Modify auth on code igniter for cakephp auth, SSO lite Project Description: I start to develop apps with cakephp, but now i wish to add forum made with code igniter. i nee

Responsive Architectural Portfolio, HTML5 and jQuery We are seeking a new website to showcase our architectural projects. I have a good hint of exactly how I want the website

In this unit we have study some significant and advanced topics of HTML. Now you have to be able to develop interactive Web pages also. We have discussed ways of connecting to dist