-
Posts
3,713 -
Joined
-
Last visited
Never
Content Type
Profiles
Forums
Events
Everything posted by Zero-Affect
-
If this isn't one of them scams (no offence) where the people visiting are bots or they visit without even knowing then i may be interested in this when i fully release my game. What is the catch?
-
Not a bad idea, get photoshop do up a sweet leaflet and simply leave them in your library on the keyboards... and hand them out (get popular people to hand them out and bung them a fiver or something).
-
Looks good Dayo why not contact MCC and sell them it, im sure they could do with alot better than what they have atm. @ WRX - lmfao at that display pic
-
so fail i guess Kyle, the solution i posted anyone checked out?
-
would http://www.gamename.com/logout.php?x=.gif work... i think if im reading that correctly it would...
-
The answer is above... i hope i won't have to spoon feed you, this is a learning forum i suggest you do some. This is a bit harsh but when you say your learning i expect you to do at least some of the work, Considering you only have to use the method shown it shouldn't be so difficult really. Drizzle thanks for the offer but people have to learn and Nicholas constantly posts requests so im sure if he does the work himself once he may not need to post another request next time and expect others to do his work for him plus im sure the feeling of accomplishment without being spoon fed will help him mature with PHP. No offence intended there Nicholas but we can't do it all for you, Good luck.
-
that's a simple solution... just MCC makes people a bit thick (no offence), i did explain it in the comments, just need to know if it worked or not. yes obviously $rand could be anything that's why you check what $rand is in the first place and considering if it's something like $rand = rand(1,10); then there is no need for abs intval in my eyes...
-
would not something similar to <?php $img = 'http://static.php.net/www.php.net/images/php.gif'; $parseURL = parse_url(trim($img)); $img_host = trim($parseURL[host] ? $parseURL[host] : array_shift(explode('/', $parseURL[path], 2))); $img = ( in_array($img_host, array('imageshack','photobucket')) ) ? $img : 'Broken image.' ; ?> i just knocked that up and didn't test it so im sure im wrong lol but roughly it's if the hostname isn't imageshack or photobucket it will return with 'Broken image.' You could infact add more onto it checking the actual file type and image size...
-
I am rubbish with preg coding but let me have a look $text = preg_replace('/src=[\'"]?([^\'" >]+)[\'" >]/', '[img='.$1.']', $text); maybe?
-
Sorry but you was explaining to one of your clients what was wrong with his game? not the best solution due to .htacess you can rewrite gif into php easily and bypass that one, personally i like Zeds suggestion.
-
You do have a point but you could also restrict image size to like 40 kb or something and the actually resolutions of the image also...
-
I use a method similar to the following i hope it helps IE => $ql = $db->query('SELECT c.`text`, `id`, `user`, u.`username` FROM `chat` LEFT JOIN `users` ON c.`user` = u.`userid` ORDER BY `id` DESC LIMIT 5 '); // this is a example you will need to edit this to your settings while ( $chat = $db->fetch_row($ql) ) { // grab query and loop $grab_ignore = $db->fetch_row($db->query('SELECT COUNT(`id`) AS `ig_CNT` FROM `ignore` WHERE `blocked` IN('.$chat['user'].') AND `userid` = '.$userid])); // check if the grabbed user is in the blocked list of the viewing user if ( empty($grab_ignore['ig_CNT']) ) { // if the viewing user does have the grabbed user in blocked list then do the following # add something like echo 'ignored user spoke.'; } else { // if the viewing user doesn't have the grabbed user in blocked list then do the following # echo text from chat... } // end else } // end while NOTE this is a example not for copy and paste (it won't work if you just copy and paste it) If you need further help just ask. (This wasn't tested). --- Off Topic --- Why say your learning PHP security i mean it's just PHP i hate when people think PHP security and PHP are different things, if you learnt PHP then you should of had some good examples which were secure (don't tell me you learnt from MCC).
-
yeah i understand it's not directed to MCC it was a example but yeah i kind of provided a example earlier with the external link to dev-forum =>
-
would <?php $db->query('UPDATE `users` SET `user_level` = 2 WHERE userid='.$_GET['ID']); ?> even work if included that way, i think not but if your referring to them linking to staff_specials then i get what your saying.
-
I come across this method about 10 month ago it's not very new im sure BUG may have got the idea from External Link. I don't think BUG really did mean any harm but Bug you do need to ask permission... maybe getimagesize() would work?
-
GD isn't so hard to use for simple stuff like this im sure anyone could do it
-
$id = isset($_GET['id']) && is_string($_GET['id']) && preg_match("/^\d+$/ims", $_GET['id']) ? $_GET['id'] : null; would it not be $id = ( isset($_GET['id']) AND ctype_digit($_GET['id']) ) ? $_GET['id'] : 0 ; and then maybe instead of is_null() use empty() I don't really see the point in the preg_match but if you care to explain...
-
You have been working on DK for 2 years right Kyle? How much did the design cost for DK?
-
authenticate.php wow MCC people are silly really i don't have stock authenticate but simple add this under your query which grabs the users information please don't forget to add user_level to the select columns part... if ( !in_array($mem['user_level'], array('2','3','5')) ) { echo ' Website is under construction, please try again later. '; die; }