Support Forums

Full Version: Why not use this to help prevent SQL injection?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3
SQL injections are a bitch, Turn off variables:!
mysql_real_escape_string() should do the job in most cases.
(05-19-2011, 09:28 PM)KoBE Wrote: [ -> ]mysql_real_escape_string() should do the job in most cases.

Indeed. Combining the two could make the site even more secure.
agree. It's a good section though. I don't know why it's so dead.
Something on this server was blocking the code I wanted to post so I made an image.

[Image: 1306927712-clip-12kb.png]
I have seen this thread more then 4 times.
(06-01-2011, 04:25 AM)0xE9 Wrote: [ -> ]Something on this server was blocking the code I wanted to post so I made an image.

[Image: 1306927712-clip-12kb.png]

Thanks, that look interesting.

(06-01-2011, 06:29 PM)Filefinder Wrote: [ -> ]I have seen this thread more then 4 times.

Could you please link me to those threads?
(06-02-2011, 03:21 AM)★Cooldude★ Wrote: [ -> ]Thanks, that look interesting.

(06-01-2011, 06:29 PM)Filefinder Wrote: [ -> ]I have seen this thread more then 4 times.

Could you please link me to those threads?
hehe, It's out of my webpanel I'm writing. I use it as part of a class so I can call it with db->sanatize($param);
(06-02-2011, 09:30 AM)0xE9 Wrote: [ -> ]Could you please link me to those threads?
hehe, It's out of my webpanel I'm writing. I use it as part of a class so I can call it with db->sanatize($param);

[/quote]

What sort of webpanel?
(06-02-2011, 12:00 PM)★Cooldude★ Wrote: [ -> ]What sort of webpanel?
It's a client management panel, Here's a preview. http://www.supportforums.net/showthread.php?tid=19222
Pages: 1 2 3