This page lists some miscellaneous items of web software that has been written during the development of the author's main sites, which may be of interest to other web developers. They were developed as the author found that equivalent facilities available on the web did not meet his requirements for one reason or another. More details may be found by following the links. You are welcome to download and use any of this software, but please note that:
It is assumed that users of a given facility will have a basic knowledge of the technology used in its implementation.
A fully functional Client-Side Image Mapper program available for Windows systems - written in Visual Basic.
A PHP transaction that creates a site map for your web site that is acceptable to the main search engines. It supports special metatags which allow the full range of sitemap.xml attributes to be easily used.
A PHP transaction that spiders through a website, obeying the robot.txt rules, and checks the integrity of any links it finds.
A PHP routine that checks whether the credit card number provided is valid for the given credit card type.
This is a set of facilities designed to detect rogue robots - those that ignore robots.txt rules - so that they can, if required, be banned from your site.
This is a simple script that allows you to check that you are sending the information that you think you're sending from a web page form. Perl CGI, PHP, and ASP versions of the script are available.
This simple Perl script allows the contents of a submitted web form to be emailed to a given address. Although there are other more sophisticated scripts that offer similar functionality, the main benefit of this one is that all the required parameters are embedded in the script, and hence provides a securer environment.
A PHP script that allows you to restrict access to areas of a web site through a password page. This could be of use if you don't have access to the HTTP authentication facilities on your web server.
A PHP script that optionally emails details of invalid requests to a given email address, and optional logs details of such requests to a file in an format easily analysed.