Schedule

Schedule

Thursday, May 28

1432827000 Tech News Today
1432830600 TWiT Live Specials
1432839600 Know How...
1432846800 Home Theater Geeks
1432854000 Tech News 2Night

Friday, May 29

1432918800 Tech News Today
1432922400 This Week in Law
1432933200 Before You Buy
1432940400 Tech News 2Night

Saturday, May 30

1433008800 The Tech Guy

Sunday, May 31

1433095200 The Tech Guy
1433109600 This Week in Tech

Monday, June 1

1433178000 Tech News Today
1433181600 Triangulation
1433187000 iOS Today
1433194200 Coding 101
1433199600 Tech News 2Night

Tuesday, June 2

1433264400 Tech News Today
1433268000 MacBreak Weekly
1433277000 Security Now
1433286000 Tech News 2Night
1433289600 All About Android

Wednesday, June 3

1433345400 FLOSS Weekly
1433350800 Tech News Today
1433354400 Windows Weekly
1433361600 This Week in Google
1433372400 Tech News 2Night
1433374200 Android App Arena
1433379600 Ham Nation

Thursday, June 4

1433437200 Tech News Today
1433440800 Know How...
1433451600 Home Theater Geeks
1433458800 Tech News 2Night

Friday, June 5

1433523600 Tech News Today
1433527200 This Week in Law
1433538000 Before You Buy
1433545200 Tech News 2Night

Saturday, June 6

1433613600 The Tech Guy

Most Recent Episodes

iFive for the iPhone

Is the Apple Watch vulnerable to theft?

This Week in Google

Google Tracker (I/O edition), Android M, Chromecast 2, and lots more.

Android App Arena

GTasks, Wunderlist, Any.do, Layout.

Windows Weekly

Cortana on iOS and Android, and Salesforce turns down $55 billion from MS.

Tech News 2Night

NPR's Elise Hu joins us to talk about Japan's Start-up scene.

FLOSS Weekly
Episode #338: Lucee May 27th, 2015

Andrew Dixon, Gert Franz, and Lucee: a dynamic scripting language for the JVM.

Tech News Today

iPhones crash and reboot when a specific string of text is received.

All About Android

Google IO predictions, Periscope for Android, and a a packed round table session.

Security Now
Episode #509: TLS Logjam May 26th, 2015

Routers with a USB port could be vulnerable to attack because of a NetUSB bug.

Tech News 2Night

Mashable's Jason Abbruzzese talks Charter/TWC merger

Coding 101 27

Perl: Reading POST Form Actions

July 24 2014

Hosts: Fr. Robert Ballecer, SJ and Shannon Morse

Guest: Patrick Delahanty

The Code for today's show is available at our: Github

Ivory Tower

Let's play with some POST!

Last week we used the "GET" method within the HTML "FORM" tag to get information from the browser.

<FORM METHOD=GET ACTION="../cgi-bin/animal_name.pl">

<h2>Would you care to name this creature?</h2><br>

<INPUT NAME="NameOfCreature"><br>
<INPUT TYPE=SUBMIT>

* If we type "My Dog" into the field and click Submit, it will create a URL that calls the script "animal_name.pl" and passes it the value "My+Dog"

* The resulting URL would read:
cgi-bin/bunny.pl?NameOfCreature=My+Dog

Now we're going to use "POST"
* While "GET" was fine for little pieces of data entry from the user, "POST" is the prefered methos for sending longer strings and combinations of HTML FORM data.
- Unlike GET, POST requests have no restruction on data length.

POST is NOT secure, but it DOES have a few security advantages to GET
* GET requests remain in the browser history, CAN be cached and can be bookmarked.
* POST requests are NOT retained the browser history, nor are they cacheable or bookmarkable.

Get in Touch With Us!

* Subscribe and get Coding 101 automatically at TWiT.tv!
* Follow PadreSJ and Snubs on Twitter.
* Watch the show live and join the chatroom every Thursday at 1:30pm PST.
* Email us at Padre@twit.tv and Shannon@twit.tv.
* Join our Google+ Community!
*Check out our transcripts.

Sponsors: