<!--
 A page that contains shared code for lab-check php files
 By: Faraj Daoud and Nick Watkins
 Date: 2/6/2012
--!>
<?php
	function print_header() {
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> 
	<head>
		<title>Lab-Check</title>
		<meta http-equiv="Content-type" content="text/html; charset=utf-8" />
		
		<!--CSS-->
		<link href="../css/common.css" type="text/css" rel="stylesheet" />
		<link href="../css/completedLists.css" type="text/css" rel="stylesheet" />
		<link href="../css/controlPanel.css" type="text/css" rel="stylesheet" />
		<link href="../css/newInspection.css" type="text/css" rel="stylesheet" />
		
		<!--java script-->
		<script src="http://ajax.googleapis.com/ajax/libs/prototype/1.6.1.0/prototype.js"
			type="text/javascript"></script>
		<script src="../java-script/manageUserAccounts.js" type="text/javascript"></script>
	</head>
	
	<body>
<?php
	}
	
	function print_footer(){
?>
	</body>
</html>
<?php
	}
	
	// untaint : String -> String
	// Makes sure that the string does not contain any file path.
	// This will fix any exploits in the code.
	function untaint($string){
		$patt = '/[\/]/';
		return preg_replace($patt, "", $string);
	}
?>