|
|
|
|
|
|
|
![]() |
#1 |
You tried your best and you failed miserably. The lesson is 'never try'
Join Date: Oct 2004
Posts: 166
|
He wasnt trying to log anyone in. I changed the code to fetch the info for the user.
Ramster, there isnt any error checking, you must put that in. Malformed input from a webpage can really screw things up : ) |
![]() |
![]() |
![]() |
#2 |
WHO IS FONZY!?! Don't they teach you anything at school?
|
Yup anytime you have a database query that can be changed by the user - when using $_GET $_POST $_REQUEST $_COOKIE etc always check the input..
Use the mysql_real_escape_string function in php to clean the input before you put it into the database. This will help to prevent SQL injection attacks by quoting out special characters. so when inserting selecting etc always do this.. PHP Code:
![]() PHP Code:
PHP Code:
![]()
__________________
BBW modelling competitions |
![]() |
![]() |
![]() |
|
|