Refreshing CAPTCHA with coldfusion

Hello
I'm writing a refresh to cfcaptcha. I got it from the blog cfjedi and I can't make it work. I tried a number of different scenarios of this code and even rewrote some of them. The image does not appear, I had it flashes and then it would disappear so it was not a solution. I add my code... I hope someone can help me get this working.

showcaptcha.cfm page:

< cffunction name = returnType = "string" output = "false" "makeRandomString" >

< cfset var floats = "23456789ABCDEFGHJKMNPQRS" >

< cfset var length = randRange (4.7) >

< cfset var result = "" > "".

< cfset var i = "" > "".

< cfset var char = "" > "".

< cfscript >

for (i = 1; i & lt; = length; i ++) {}

char = mid (tanks, plageAleatoire (1, len (tanks)), 1);

result & = char;

}

< / cfscript >

< cfreturn result >

< / cffunction >

< cfset makeRandomString() = captcha >

< cfimage action = "captcha" width = "300" height = "55" text = "" #captcha # "fonts ="verdana, arial' difficulty 'medium' = > "

Contact.cfm page

< script >

{$(document) .ready (function ()}

$("#captchaDiv").load ("showcaptcha.cfm #captchaDiv");

{$("#reloadLink").click (function (e)}

$("#captchaDiv").load ("chowcaptcha.cfm #captchaDiv");

e.preventDefault ();

});

})

< /script >

< cfoutput >

< action = "" #cgi.script_name # cfform "method ="post"class ="post"id = 'formID' enctype =" application/x-www-formulaires-urlencoded"preloader ="true">"

"< name cfinput ="name"type ="text"value =" "#form.name #" id = placeholder "name" = "* name" / >

<!--the rest of my entries are all here-->

< div id = "captchaDiv" style = "width: 300px;" height: 55px; margin-top: 10px; "> < / div >

< span > cannot read? </span > < a href = "" id = "reloadLink" > Reload < /a > < br / > "

the CODE < span > SECURITY </span >

< cfinput type = "text" name = "captcha" style = "margin-top: 20px;" left margin:-142px; ">

< cfinput type = "submit" name = "submit" value = "Submit" class = "more_button" / >

< / cfform >

< / cfoutput >

Can someone help me with this problem?

If I understand correctly, you want to pass a variable value (hash of captcha) of the showCaptcha.cfm of the page contact.cfm page. Communication between 2 CFM pages implies, for example, sessions.

One solution is the following

in showCaptcha.cfm:

Place the line

just after the line

in contact.cfm:

Change the line

TO

------------------------------------

(remove the now unnecessary line, )

Tags: ColdFusion

Similar Questions

  • Debugging in CF Builder with ColdFusion 7?

    ColdFusion Builder debugging doesn't work with ColdFusion 7?  I was able to run successfully debugging by using breakpoints with ColdFusion 8, but cannot make it work with ColdFusion 7.  If it is possible, what are the parameters?

    Thank you

    Kasia

    ColdFusion debugger support was introduced in version 8. So version 7 is not supported.

  • Consumers with ColdFusion DataServicesMessaging Gateway selector

    Is it possible to filter the messages through consumer selectors when using BlazeDS with a ColdFusion DataServicesMessaging event gateway? I can't get the following to work:

    In my Flex client, I agree with the following code:


    var selector: String = "someid =" + this.someID; ".
    selector = myConsumer.selector;

    myConsumer.subscribe ();

    I produce a message with the following code:

    var asyncMsg:AsyncMessage = new AsyncMessage();
    asyncMsg.body = data;
    asyncMsg.headers.msgtype = msgtype;

    asyncMsg.headers.someid = this.someID;

    asyncMsg.headers.gatewayid = "TestMessagingGateway";
    myProducer.send (asyncMsg);

    And in my event gateway, I have something like the following:

    < cffunction name = "onIncomingMessage" retruntype = "any" >
    < cfargument = 'event' type name = "struct" required = "true" >

    < cfset var msg = StructNew() / >
    < cfset msg.destination = "ColdFusionGatewaySecure" / >
    < cfset msg.body = arguments.event.data.body / >
    < cfset msg.headers ["someid"] = arguments.event.data.headers.someid / >

    < cfreturn msg / >

    < / cffunction >

    However when I test the code, all customers receive all messages sent to the ColdFusion event gateway. I would like expert that they only get messages with a someid header that matches that specified in the selector. (I confirmed that the message I get from the gateway has a someid header that does not correspond to that specified in the selector). Does anyone have experience using the selectors with ColdFusion event gateways that are likely to shed some light on what I'm doing wrong?

    Thank you

    -Nathan

    Hello. So, I took a glance at the code in CFEventGatewayAdapter with the developer who wrote it. Selectors are not taken in charge right now even if it looks like the difficulty of getting this job would be quite low. I logged an enhancement request to get this fixed/added.

    https://bugs.Adobe.com/jira/browse/BLZ-388

    -Alex

  • Problem with Coldfusion 7.0.1 IIS6.0 and Perl

    Hello

    I have a bit of a weird problem that I can't understand. We
    run an application coldfusion 7.0.1 Server

    We also use a custom built-in perl program that performs authentication
    on some of our pages and read/write on a cookie.

    Here is an example of a URL that would redirect the user to the
    Perl script login screen, authenticate and direct the user to the
    page specified in the URL

    https://127.0.0.1/CGI/bluestem/lb_login.pl/CF/index.cfm

    This URL will be redirect the user to the /cf/index.cfm path after the
    authentication by the perl program.

    My problem is that the URL above allows to work very well with Coldfusion 6.1
    and IIS 5.0 and it also worked well with Coldfusion 7.0.1 and IIS 5.0
    but when I try to do this with IIS 6.0, it throws a missing model
    error. I did some research and found out that instead of running the Perl file, she tries to find the CF file on the location of /cgi/bluestem/lb_login.pl/cf/index.cfm that of course does not exist.

    The most interesting thing is that this URL is the same as above, but it works!

    https://127.0.0.1/CGI/bluestem/lb_login.pl/CF/

    It seems that the problem occurs when there is a .pl and a .cfm extension in the URL.

    Any ideas?

    I found the solution to this problem. I have all of my perl scripts in a virtual directory. This virtual directory has all of the Coldfusion files. What I've done in IIS 6.0, I click with the right button on the virtual directory and go to properties. From there, I click on configuration. You will see a section "wildcard application maps (order of implementation)" here. There will be only one entry in it, something like C:\JRun4\lib\wsconfig\1\jrun_iis6_wildcard.dll.

    This mapping of wildcard characters should be deleted for perl scripts redirect to the right page. Delete this generic mapping will also remove the ability to run ColdFusion templates in this virtual directory.

  • Why can I not see the Captcha with Firefox 20, even in safe mode?

    MacMini OS 10.7.5; 20 of Firefox. It is currently a problem for me with Google Scholar, although I generally don't see Captcha at all on any web site - that said, I do not even request the character string. With Firefox, I accept it corresponds to access Google scholar and get an error page telling me that my system can send automated queries, and there is no Captcha visible on the screen. With Safari, when I had this problem, Captcha is visible, I enter the chain and proceed to the scholar.

    I just restarted firefox in safe mode and still don't see a captcha. I tried a little clear cache (for 'today' didn't want to completely clear the cache, but I will if it will help), but it is a problem long enough that I'm just now trying to fix. Any ideas?

    Fixed! Thank you!

  • How to turn off the stars, rss buttons and replace refresh them with the button 'go '?

    I used to be able to fix the latter with userchrome.css, but apparently it doesn't work anymore.

    #go-button  {display: none !important;}
    #star-button {display: none !important;}
    #feed-button {display: none !important;}

    can someone tell me what they have been changed to because these #buttons do not work

    Oops. I was editing a cell firefoxes .css intsead of my native installed but still can't get "go button to work. After a bit of searching on Google I found a solution

    #urlbar-go-button {visibility: visible !important;}
    #urlbar-reload-button {display: none !important;}
    #star-button {display: none !important;}
    #feed-button {display: none !important;}

    even though I wish I could put the go button last instead of the first (arrow go, history dropdown, refresh)

    but I see what you mean with being separated from the Interior of the obtained, stop and refresh

    Edit: oh I see button GB - url and url-update now. Thank you

  • Configuration Apache web server with Coldfusion 2016 on Linux

    We plan to use the version with JBOSS J2EE. Documentation on how to set up the Apache to WSCONFIG connector bibl, supposedly are to:

    cf_root/runtime/bin/wsconfig

    But it is not part of the J2EE installation. How can I get the software needed for the configuration of Apache?

    Hi Joop,

    ColdFusion does not binary connector for J2EE installation. You must use the binaries of JBoss.

    Thank you

    Priyank

  • ADF refresh page with page fragments jsff jsf after the set session variable

    Hello.

    I have a model that includes a button that allows you to select a profile, you push the button appear available profiles, choose one and press to accept. After that, I put a variable session successfully.

    I have a page of 'First' of jsf with two fragments of page jsff after seeing a link. The display link is composed by a headerView and detailView. The headerView had a variable binding. What I need, is that this parameter (bindVariableParameter) can be defined by the session of the model variable.

    That's what I get:

    I am in a homepage (separate Application Module), model button is pushed until I load "first" jsf page and after that, I go to the page jsf 'First', that information is loaded successfully. What I do in the Application Module is something like this:

    protected void prepareSession (one session) {}

    SessionScope card = ADFContext.getCurrent () .getSessionScope ();

    Company string = (String) sessionScope.get ("compId");

    System.out.println ("Default Comapny in British Colombia is:" + company);

    super.prepareSession (session);

    this.getSession () .getUserData () .put ("The company", company);

    System.out.println ("after the definition userData value card BC");

    }

    And in the variable binding expression of the headerView that I use:

    adf.userSession.userData.Company

    It works very well! But!

    When I press the button again and I chose another profile, the info is not updated. In the headerView or in the detailView.

    Also, when I go to the 'First' jsf page (without previously pressing the button model), I had no info, which is just, because I have no session variable. After I have press the model and select the profile, but the page is not refreshed.

    I tried many ways to this, but I'm lost.

    Could you help me?

    Kind regards.

    I'm not sure that understand your use case. What do I get, you set a parameter after that you press a button on the home page to pass this parameter to the first.jsf.

    Why don't you implement a method of the application module and call it directly with the parameter. The session of preparation will not be called whenever you browse but only init am.

    Do you need the parameter in the layer model or only in the display?

    Timo

  • Java/jre ColdFusion 11 mutual auth ssl api calls.  Help with coldfusion/java logs.

    Hello

    I'm here because I have exhausted my Coldfusion/Java ssl keystore certs troubleshooting capabilities.  Here's the question. I'm developing a Coldfusion 11 application which must make calls to api for services SOAP Chase payconnexion. I use the tags of cfhttp in coldfusion to do this, that is using java jre 1.7.x to achieve this. The problem I'm getting generic 500 internal server errors of Chase.   They claim that I'm not sending a cert in the exchange of ssl.    What I did is:

    -put our generic cert/key pair in the keystore of coldfusion

    -put our root and the string in the keystore

    -put the chase Server certs in the keystore

    -converted files of key/crt in .pfx and make calls

    for hunting with those, something like:

    < cfset objSecurity = createObject ("java", "impossible") / >

    < cfset storeProvider = objSecurity.getProvider ("JsafeJCE") / >

    < cfset Application.sslfix = true / >

    < cfhttp url = "" #chase_api_server #/ ' "

    result = "http_response.

    method = "post".

    port = "1401" charset = "utf-8".

    clientCert = "#cert_path #/ #cert_file1 #

    clientCertPassword = "#cert_password #" >

    < cfhttpparam type = "header" name = "SOAPAction" value = "updateUserProfileRequest" / >

    < cfhttpparam type = "header" name = "Host" value = "ws.payconnexion.com" / > "

    < cfhttpparam type = "xml" value = "#trim (my_xml) #" / >

    < / cfhttp >

    Here is what I see in the newspapers of the CF, can someone help me interpret what

    is happening?

    Thank you

    Bob

    =============================================================

    ***

    found the key for: 1

    String [0] =]

    [

    Version: V3

    Object: CN = *. payments.austintexas.gov, O = city of Austin, L = Austin, ST = Texas, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    Validity: [from: Mon Aug 11 12:39:37 CDT 2014]

    [To: Fri Oct 01 18:34:24 CDT 2016]

    Issuer: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Serial number: [< snip > 7]

    Certificate extensions: 9

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ,

    accessMethod: caIssuers

    accessLocation: U: http://AIA.entrust.NET/2048-L1C.CER

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/level1c.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [1.2.840.113533.7.75.2]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    [CertificatePolicyId: [2.23.140.1.2.2]]

    []  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    ]

    [7]: ObjectId: 2.5.29.15 criticality = false

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: *. payments.austintexas.gov

    DNSName: payments.austintexas.gov

    ]

    [9]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [1] string =]

    [

    Version: V3

    Object: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Fri 11 Nov 09:40:40 CST 2011,]

    [To: Thu Nov 11 20:51:17 CST 2021]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 7

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:0

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/2048ca.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.5.29.32.0]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [7]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [2] string =]

    [

    Version: V3

    Subject: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip > public exponent: 65537

    Validity: [from: Fri dec 24 11:50:51 CST 1999]

    [To: kill Jul 24 09:15:12 CDT 2029]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 3

    [1]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:2147483647

    ]

    [2]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [3]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    ***

    trustStore is: / opt/coldfusion11/jre/lib/security/cacerts

    trustStore type is: jks

    trustStore provider is:

    init truststore

    adding that cert trust:

    < certs snip 85 >

    trigger the seeding of SecureRandom

    done seeding SecureRandom

    January 23, 2015 13:15:37 information [ajp-bio-8014-exec-7] - HTTP request to leave {URL ='https://ws.payconnexion.com:1401/pconWS/9_5 /", method = 'post'"}

    Ignoring the unsupported encryption suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_RSA_WITH_AES_256_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_RSA_WITH_AES_128_CBC_SHA256

    Allow the dangerous renegotiation: true

    Allow legacy Hello messages: true

    Is the first handshake: true

    Is secure renegotiation: false

    % No session caching client

    ClientHello, TLSv1

    RandomCookie: GMT: 1405197529 bytes = {191, 115, 95, 85, 79, 234, 145, 176, 62, 70, 36, 102, 168, 15, 127, 174, 88, 118, 4, 177, 226, 5, 254, 55, 108, 203, 80, 80}

    Session ID: {}

    Cipher suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV, SSL_RSA_WITH_RC4_128_MD5]

    Compression methods: {0}

    Extension elliptic_curves, the names of curve: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}

    Extension ec_point_formats, formats: [uncompressed]

    Servername extension, server_name: [hostname: ws.payconnexion.com]

    ***

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 191

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 81

    ServerHello, TLSv1

    RandomCookie: < snip >

    Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA

    Compression method: 0

    Extension renegotiation_info, renegotiated_connection: < empty >

    ***

    %% Initialized: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]

    * TLS_RSA_WITH_AES_256_CBC_SHA

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 4183

    Certificate chain

    String [0] =]

    [

    Version: V3

    Subject: CN = ws.payconnexion.com, OR is PayConnexion, O is JPMorgan Chase, L = New York, ST = New York, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Sun Apr 20 19:00:00 CDT 2014]

    [To: kill Jun 02 18:59:59 CDT 2015]

    Issuer: CN = VeriSign Class 3 International Server CA - G3, OU = terms of use at https://www.VeriSign.com/RPA (c) 10, OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 8

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://se.symcd.com

    ,

    accessMethod: caIssuers

    accessLocation: U: http://se.symcb.com/se.CRT

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://se.symcb.com/se.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.16.840.1.113733.1.7.54]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ], PolicyQualifierInfo:]

    qualifierID: 1.3.6.1.5.5.7.2.2

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    2.16.840.1.113730.4.1

    ]

    [7]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: ws.payconnexion.com

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [1] string =]

    [

    Version: V3

    Object: CN = VeriSign Class 3 International Server CA - G3, OU = terms of use at https://www.VeriSign.com/RPA (c) 10, OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Sun 07 Feb 18:00:00 CST 2010]

    [To: Fri Feb 07 17:59:59 CST 2020]

    Issuer: CN = VeriSign Class 3 Public Primary Certification Authority - G5, OR = "(c) 2006 VeriSign, Inc. - use only permitted", OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 10

    [1]: ObjectId: 1.3.6.1.5.5.7.1.12 criticality = false

    Unknown extension: coded DER BYTE string =

    < snip >

    [2]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.VeriSign.com

    ]

    ]

    [3]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [4]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:0

    ]

    [5]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.verisign.com/pca3-g5.crl]

    ]]

    [6]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.16.840.1.113733.1.7.23.3]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ], PolicyQualifierInfo:]

    qualifierID: 1.3.6.1.5.5.7.2.2

    qualifier: < snip >

    ]]  ]

    ]

    [7]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    2.16.840.1.113730.4.1

    2.16.840.1.113733.1.8.1

    ]

    [8]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [9]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    CN = VeriSignMPKI-2-7

    ]

    [10]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [2] string =]

    [

    Version: V3

    Object: CN = VeriSign Class 3 Public Primary Certification Authority - G5, OR = "(c) 2006 VeriSign, Inc. - use only permitted", OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Tue Nov 07 18:00:00 CST 2006]

    [To: Sun Nov 07 17:59:59 CST 2021]

    Issuer: OU = class public primary Certification Authority 3, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 8

    [1]: ObjectId: 1.3.6.1.5.5.7.1.12 criticality = false

    Unknown extension: coded DER BYTE string =

    < snip >

    [2]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.VeriSign.com

    ]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:2147483647

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.verisign.com/pca3.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.5.29.32.0]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    resynced

    2.16.840.1.113730.4.1

    2.16.840.1.113733.1.8.1

    ]

    [7]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [8]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    ***

    Found the certificate of trust:

    [

    [

    Version: V3

    Subject: CN = ws.payconnexion.com, OR is PayConnexion, O is JPMorgan Chase, L = New York, ST = New York, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: public exponent: 65537

    Validity: [from: Sun Apr 20 19:00:00 CDT 2014]

    [To: kill Jun 02 18:59:59 CDT 2015]

    Issuer: CN = VeriSign Class 3 International Server CA - G3, OU = terms of use at https://www.VeriSign.com/RPA (c) 10, OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 8

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://se.symcd.com

    ,

    accessMethod: caIssuers

    accessLocation: U: http://se.symcb.com/se.CRT

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://se.symcb.com/se.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.16.840.1.113733.1.7.54]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ], PolicyQualifierInfo:]

    qualifierID: 1.3.6.1.5.5.7.2.2

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    2.16.840.1.113730.4.1

    ]

    [7]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: ws.payconnexion.com

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 13

    CertificateRequest

    CERT types: RSA, DSS

    CERT authorities:

    < empty >

    ServerHelloDone

    corresponding to the alias: 1

    Certificate chain

    String [0] =]

    [

    Version: V3

    Object: CN = *. payments.austintexas.gov, O = city of Austin, L = Austin, ST = Texas, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    < snip > public exponent: 65537

    Validity: [from: Mon Aug 11 12:39:37 CDT 2014]

    [To: Fri Oct 01 18:34:24 CDT 2016]

    Issuer: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Serial number: [< snip >]

    Certificate extensions: 9

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ,

    accessMethod: caIssuers

    accessLocation: U: http://AIA.entrust.NET/2048-L1C.CER

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/level1c.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [1.2.840.113533.7.75.2]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    [CertificatePolicyId: [2.23.140.1.2.2]]

    []  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    ]

    [7]: ObjectId: 2.5.29.15 criticality = false

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: *. payments.austintexas.gov

    DNSName: payments.austintexas.gov

    ]

    [9]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [1] string =]

    [

    Version: V3

    Object: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Fri 11 Nov 09:40:40 CST 2011,]

    [To: Thu Nov 11 20:51:17 CST 2021]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 7

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:0

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/2048ca.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.5.29.32.0]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [7]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [2] string =]

    [

    Version: V3

    Subject: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip > public exponent: 65537

    Validity: [from: Fri dec 24 11:50:51 CST 1999]

    [To: kill Jul 24 09:15:12 CDT 2029]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 3

    [1]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:2147483647

    ]

    [2]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [3]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    ***

    ClientKeyExchange, RSA PreMasterSecret, TLSv1

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 3970

    SESSION KEYGEN:

    PreMaster Secret:

    < snip >

    KEYGEN OF CONNECTION:

    Nuncio of the client:

    < snip >

    Nuncio of server:

    < snip >

    Master Secret:

    < snip >

    Give your MAC Secret client:

    < snip >

    MAC server write Secret:

    < snip >

    Write the client key:

    < snip >

    Server write key:

    < snip >

    Client write IV:

    < snip >

    Server write IV:

    < snip >

    CertificateVerify

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 262

    AJP-bio-8014-exec-7, WRITING: TLSv1 Change Cipher Spec length = 1

    Finish

    verify_data: {51, 254, 40, 56, 247, 218, 130, 183, 112, 239, 95, 4}

    ***

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 48

    AJP-bio-8014-exec-7, READ: TLSv1 Change Cipher Spec length = 1

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 48

    Finish

    verify_data: {89, 182, 137, 178, 177, 31, 27, 115, 151, 90, 169, 49}

    ***

    % Cache the client session: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]

    AJP-bio-8014-exec-7, setSoTimeout (60000) called

    AJP-bio-8014-exec-7, WRITING: TLSv1 Application Data, length = 1520

    AJP-bio-8014-exec-7, READ: TLSv1 Application Data, length = 128

    January 23, 2015 13:15:38 information [ajp-bio-8014-exec-7] - complete HTTP request {status Code = 500, time = 1302 ms}

    AJP-bio-8014-exec-7, READ: TLSv1 Application Data, length = 256

    AJP-bio-8014-exec-7, READ: alert TLSv1, length = 32

    AJP-bio-8014-exec-7, RECV TLSv1 ALERT: attention, close_notify

    AJP-bio-8014-exec-7, called closeInternal (false)

    AJP-bio-8014-exec-7, SEND TLSv1 ALERT: attention, description = close_notify

    AJP-bio-8014-exec-7, WRITING: alert TLSv1, length = 32

    AJP-bio-8014-exec-7, call closeSocket (selfInitiated)

    AJP-bio-8014-exec-7, called close()

    AJP-bio-8014-exec-7, called closeInternal (true)

    OK, apparently nobody Chase who said that we don't send the certificates and realization mutual auth

    was wrong.   Https calls were connection and mutual authentication took place.   The 500

    error was on a soap envelope during delivery and NOT of SSL that I directed to.   Everything that

    works fine now.

    Thank you

    Bob

  • 8287 error: manual/refresh operations with Where clause

    Hello

    I defined a group of read-only cache

    CREATE CACHE READONLY ABC GROUP

    AUTOREFRESH INTERVAL 60 seconds

    OF ORACLE_TABLE

    I want to only load the 3 months of the underlying table for Oracle data so I don't


    ABC LOADING CACHE GROUP

    WHEN TRUNC (date_column) > TRUNC (add_months (sysdate,-3))

    COMMIT ALL 256 ROWS

    4 PARALLEL;

    However, I get the error message

    8287: manual LOADING/REFRESH with clauses WITHID or WHERE operations are not be allowed on ABC Group cache because it is specified as AUTOREFRESH

    The command failed.

    What should I do to load the data of 3 months only if possible? Can I use autorefresh?

    Thanks in advance

    Cache AUTOREFRESH groups to include the WHERE clause in the definition of Group of cache. For example, if drop you in Oracle's:

    CREATE TABLE MYDATE

    (

    C1 VARCHAR2 (10) NOT NULL PRIMARY KEY,

    C2 DATE NOT NULL

    );

    Then your cache group definition would look like this:

    CREATE CACHE READONLY ABC GROUP

    AUTOREFRESH INTERVAL OF 60 SECONDS

    OF MYDATE

    (

    C1 VARCHAR2 (10) NOT NULL PRIMARY KEY,

    C2 DATE NOT NULL

    )

    WHEN TRUNC (c2) > TRUNC (add_months (sysdate,-3));

    And then you would load by using

    ABC LOADING CACHE GROUP

    COMMIT ALL 256 ROWS

    4 PARALLEL;

    As auto refreshes occur time passes, all the data that falls outside the range will be removed from the cache and new data that now lying in the range will be added to the cache.

    Chris

  • I get the following error: "cfgridapplet.class not found" when you try to use my site that is coded with ColdFusion.

    What is the problem?  Perhaps Java version?  IE version?

    Someone there troubleshooting tips?

    I'm not a ColdFusion programmer, but am pretty tech savvy.

    Any help is greatly appreciated.

    Ok.  You are on a version really old and not supported in ColdFusion.  At the time, CFGRID control was an option to use an applet (also Flash via HTML and Flex) for the interface of the grid. Java applets are now no longer supported with many modern browsers.  Even if they are, the CF7 Java applets are not compatible with Java 7 (maybe not even 6) which is apparently what is running on the client (your computer).  To my knowledge, these Java applets have not been updated to run on newer versions of Java.  You will need Explorer moving to one of the other that cfgrid supports formats (HTML or Flash/Flex).  I suggest strongly several things, however:

    • If possible, upgrade your version of ColdFusion - CF7 is long past support and has to many security problems that cannot be corrected.  CF10, CF11 and CF2016 are currently supported versions and can run on Java 8 (the current version of Java).
    • If possible, replace the implementation of CFGRID controls:
      • At a minimum, see if you can make HTML format works.  Flex/Flash may not be a viable alternative as browsers begin to remove support for Flash and the Flash plugin is notorious for security vulnerabilities.
      • A more long-term solution would be to replace the CFGRID with a grid controls based on a JavaScript library that is well supported client-side (my favorite is the combination of jQuery and the plugin Datatables , but there are tons of other similar libraries out there).
  • Why I can't work with ColdFusion documents?

    UH... just updated and went to open some ColdFusion files normally, I work with but can't open them at all. They are grey. And he is no longer a ColdFusion option in the Panel 'New '. And in the preferences, you can not select ColdFusion as the default document type.

    I'm just missing where it is?

    Hi all

    Can you check this document and let us know if you still need help?

    http://helpx.Adobe.com/x-productkb/policy-pricing/open-ColdFusion-Dreamweaver-cc.html

    Thank you

    Preran

  • IIS7.5 with ColdFusion 9.0.1 64-bit IIS 500 error

    Hello

    I have the following:

    Windows 2008 R2 sp1 64-bit

    IIS 7.5

    ColdFusion 9 64 bit, upgrade to version 9.0.1 64-bit

    After installing ColdFusion 9 and upgrade to the version 9.0.1, I get error 500 IIS .cfm file, .txt, etc.  IIS was functioning before the installation of the CF.

    After research, I have confirmed:

    CGI, the ISAPI Extensions, ISAPI, IIS 6 Management compatibility filters installed all

    If IIS/pplicaiton pool: applications enable 32-bit = True - then I get the error with a .cfm, error 500 0 193 593 .txt or .jpg 500 0 193 15 file IIS 500 19 5 31.

    If pool IIS/process: applications enable 32-bit = False - then I get error 500 0 1001 93 IIS and a system event log ' unexpecedly put end to a process of asking "DefaultAppPool".  Event ID 5009, source - has.

    I think that enable 32-bit applications must be wrong, since I use 64-bit CF.  Why the AppPool plant then?

    Any ideas?

    I had a similar problem when setting up our servers.  I does NOT allow 32-bit applications.  You should not need to do.  Also, just FYI, after the upgrade to version 9.0.1 the IIS 6 Management Compatibility option is more necessary.  I think you can always run with him, but it is not necessary.  I don't have this option installed on our server.  I installed these options of IIS (I think by the installation documentation): .net extensibility, ASP.NET (document says no, but web server tool needs him), ISAPI filters, ISAPI Extensions.

    Anyway, my situation could have been different than yours but just in case.  I couldn't get the server web configuration tool (gui) for run on our server, so I had to manually install the connector (referenced http://kb2.adobe.com/cps/195/tn_19575.html and http://kb2.adobe.com/cps/121/121a0b29.html).  After installation, the application pool might be breaking.  That's what finally got him to be happy.  To stop the application pool and IIS/WWW.  Then delete the LogFiles of the web connector folder.  It is located here: {drive}: \JRun4\lib\wsconfig\1\ just delete the folder completely LogFiles.  When you restart IIS it will recreate the file.

    I hope that helps you too.  It took me a while to find this gem.

  • export data to Word with Coldfusion

    Saw the link to

    http://www.irt.org/articles/js154/index.htm which explains how to...

    But my need is a little more than what is shown.

    I have to run a query and results on the basis of this to decide what should be a title of rank, and then display its value. Something like

    < name cfquery = "getDepartments" datasource = "#Application.ds #" >
    SELECT *.
    Ministries
    WHERE deptID = ' #form_data.deptID # '.
    < / cfquery >

    then

    < table width = "100%" border = "1" rules = "all" cellpadding = "5px" cellspacing = "0px" style = "width: 100%;" do-family: Arial, Helvetica, without serif. do-size: 12px; ">
    < b >
    < style td = "do-family: Arial;" do-size: 12px; "> < b >

    < cfif getDepartments.DEPT_TYPE is "AP" >
    Corporate
    < cfelse >
    Retail
    < / cfif >
    : < /b >
    < br >

    It works not with the method indicated on the link http://www.irt.org/articles/js154/index.htm

    How can I get what I want?

    Any advice would be welcome.

    Well, the two formats are completely different. I don't think that you can mix the two. So, either you try to create a rtf or html file.

    Most of the versions of MS Word are able to interpret/display html. Unless you specifically need a rtf file, so it is easier to generate just plain html. Then use cfheader and cfcontent to indicate that the document must be opened with MS Word. There is an example to Excel at the bottom of this page. But the same concept applies to Word files. Just use the correct mime type and name.

    http://livedocs.Adobe.com/ColdFusion/8/htmldocs/help.HTML?content=Tags_c_11.html

  • THEY Flash Remoting request limit introduced with Coldfusion 9?

    Hi all

    We've just been our Coldfusion servers since 8.01 CF CF 9. They run Win 2008. On servers that provide the Flash remoting backend for a Flex application, we provide, we ran into trouble.

    After upgrading CF 9 noticed that during busy when many customers Flex have been completed, we connect, we seemed to have a strict limit of 25 Flash Remoting running queries, despite the much higher limits (in fact 150) in CF Admin.

    We first thought that it was a problem with the fact that Blaze DS now ships with CF 9 (rather than a separate installation) we decided to roll back the installation of CF 9. This, unfortunately, has not worked and we were always stuck with out strict limit of 25 applications for Flash Remoting.

    Then looking at IIS we noticed the CF9 ISAPI filter was installed yet (after we ran the part of installing Web Service Configuration). Who took the CF 8 were re-run and all of a sudden the strict limit Flash Remoting has disappeared. So it seems that it might have had something to do with the wsconfig CF 9 (C:\ColdFusion9\runtime\bin\wsconfig.exe)

    If anyone has had this problem or does anyone know where these hard limits are configured in IIS?

    Any help appreciated!

    @ciaranarcher (and other interested parties in the present), I posted what, in my view, is the solution on the stackoverflow website where it had also posted the question:

    http://StackOverflow.com/questions/3037390/IIS-Flash-Remoting-request-limit-introduced-wit h-coldfusion-9

    Let us know (here and there) if it is the solution for you (and others). Thank you.

    /Charlie

Maybe you are looking for

  • M4: Regulation of the CPU power and fan - tablet is running hot and noisy

    My M4 is running hot and and the frequent active noisy fan in the normal power setting. This allows to improve some during the definition of the maximum energy saving options: battery life. But still the fan starts running and short relatively freque

  • How long does it take to fix a broken or cracked for iPhone6 screen

    How long does it take to fix a broken or cracked for iphone6 screen?

  • MSN e-mail (my mailing more up-to-date information is missing

    My husband called to tell me that I sent 3 messages to the community, when I looked in my file send the last send message to 11/07/2011.  I send messages every day.  I need retrack these messages that I do.

  • Able to print, unable to analyze

    I have a Photosmart C6380. The warranty expired a few months ago 10. I just plugged it up to a new Mac running 10.6.7. I'm getting "sorry, scanner could not be initialized." Year error has occurred communicating with the scanner. "and"sorry, an unkno

  • LED light blackBerry Z10

    When I get a message on my z10, the light comes on, but it only flashes as it is long. It seems that it only flashes for 10-15 minutes. Why does it only flashes until I have watch the message, however long it is? Is it possible that I can do the LEDS