Share this Page URL
Help

Hour 16. Send and React to Form Data > Explore Submission Security - Pg. 235

Send and React to Form Data 4. 235 Enter the name of the Hidden field and the value of that field as shown in Figure 16.5. These name and value pairs are documented in the script documentation. Create three hidden fields using the steps listed above. Enter the following name and value pairs into the hidden fields: · Name a Hidden field "recipient" and give it your email address as a value. · Name a Hidden field "subject" and enter some text that you will see in the subject field of the email that you receive with the data. · Name a Hidden field "redirect" and enter a URL of a pre-built Web page that the user will see after they have submitted the form. Caution When you are naming your own objects in Dreamweaver you can afford to make an occa- sional typo or misspelling. Scripts and applications, however, are not forgiving of typos. Adding hidden fields that a script needs requires you to enter the names exactly as they are listed in the documentation. When the user submits the form the name and value pairs are sent to the email address specified in the hidden field named recipient with the subject specified in the hidden field named subject. The browser will automatically load the URL that is specified in the Hidden field named Redirect. This is the simplest processing possible for a form. Other scripts can save data to databases, proc- ess and validate credit card information, and perform all sorts of complex actions. Explore Submission Security When your users submit form information, it travels in packets across the Internet along with millions of other packets. These packets of information can be intercepted and read by people who under- stand how to intercept and reassemble data taken from the Web. Even though this is not a common occurrence, you still should take steps to assure your users that sensitive data is secure. Again, this is a Web server issue. The Web server that your site is located on must have secure sockets enabled. Many ISPs offer this service. Ask your Webmaster whether you have access to secure Web pages. A user accesses a secure URL exactly like they would a regular URL. The only difference is the protocol that changes from http to https. The user must have a browser that is capable of accessing secure pages. The browser displays a lock in the status bar, as shown in Figure 16.6, when it is in secure mode. You only need to worry about secure submissions when the user enters sensitive information like credit card numbers or other financial data. For polls, or guestbooks, or feedback forms you don't need to shield the information from potential thieves. Customers will expect you to protect their sensitive data. You need a certificate to add security to your form submissions. Sometimes you can use your Web host's certificate or you can purchase your own. One of the major certificate vendors is Verisign and you can learn more about certificate at their Web site: http://www.verisign.com/. [http:// www.verisign.com/]