Jump to content
MakeWebGames

rockwood

Members
  • Posts

    416
  • Joined

  • Last visited

  • Days Won

    10

Everything posted by rockwood

  1. rockwood

    Securing $_POST

    you can use this too htmlspecialchars()
  2. me too wanna try if you dont mind
  3. then what kind of password hashing i should use ?
  4. show me example what are you trying ?
  5. syndicate is name of a person ?
  6. rockwood

    Securing $_POST

    bind your values best way
  7. rockwood

    Securing $_POST

    yes, you have a valid point and i am agree with your comments. as per my view a change is required in old db class something like new update. it is not very hard to do
  8. rockwood

    Securing $_POST

    are you sure about this ?? please Compare both db classes
  9. rockwood

    Securing $_POST

    1. The MCC db class not looking enough as per my view so i added as suggestion. 2. for use have to recode every query and lots of changes. and i tested this is working 100% perfectly
  10. rockwood

    Securing $_POST

    if (!empty($_POST['name'])) { $_POST['name'] = filter_var($_POST['name'], FILTER_SANITIZE_STRING); }else{echo "Error";} i am sanitizing
  11. rockwood

    Securing $_POST

    isset and empty both are different
  12. rockwood

    Securing $_POST

    HTML5 having inbuilt validation
  13. rockwood

    Securing $_POST

    Mccodes db class is old (also not escaping values properly by Old MCC) so i think it is bit better mysql.class.txt
  14. Good Luck Grant
  15. sorry, i got answer
  16. keep it on guyz good job
  17. rockwood

    Mafia Creed

    good worked and looking clean Best of luck MNG
  18. me too facing this problem what should i do for remove this error???
  19. KyleMassacre's " !=" or you can use of "<>" bcz both having same mean not equal to $q=mysql_query("SELECT im.*, i.*, u.*,it.* FROM itemmarket im LEFT JOIN items i ON im.imITEM=i.itmid LEFT JOIN users u ON u.userid=im.imADDER AND i.itemtypeid <> "item id goes here");
  20. i am leaving this thread.
  21. Dominion you should check posts chain, i tried to improve his code and he told me escaping is wrong on $_GET variable the question from his side, not from mine and i am trying to explain him about xss attacks and what is wrong in it ??
  22. my point was only safety nothing else friend ,that was just an example for validating you can use preg_match too and many more so please make it safe bcz get is non hide thing
×
×
  • Create New...