|
![]() |
#7 |
WHO IS FONZY!?! Don't they teach you anything at school?
|
Yup anytime you have a database query that can be changed by the user - when using $_GET $_POST $_REQUEST $_COOKIE etc always check the input..
Use the mysql_real_escape_string function in php to clean the input before you put it into the database. This will help to prevent SQL injection attacks by quoting out special characters. so when inserting selecting etc always do this.. PHP Code:
![]() PHP Code:
PHP Code:
![]()
__________________
BBW modelling competitions |
![]() |
![]() |
|
|