Jump to content
MakeWebGames

Lithium

Members
  • Posts

    1,099
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by Lithium

  1. Lithium

    Lights needed here

    I feel bad now... damn stupid mistake!!!!!!!!!!!!!!!!   Error processing: SELECT `tID` FROM `test` WHERE `tTYPE` = 'a' AND `tWHEN` = 'a1' AND `aUSER` = '1'   `aUSER`ought to be `tUSER`and i didn't even noticed it, only when i saw your output and compared, i noticed the damn typo! :/
  2. Hendrickson: indeed i am, popped out (again) a couple weeks ago... let's see until when this time :) And replying to your initial question, yes that can be done. You got my mail still? hit me there and we can talk ;) if not pm and i'll give it again :)
  3. The only and painfull way is to throw a captcha/security code every X minutes, and still not foolproof
  4. Lithium

    Lights needed here

    Need some lights here...   $x = array(array('a',array('a1','a2','a3','a4','a5')),array('b',array('b1','b2','b3')),array('c',array('c1','c2','c3','c4'))); output: Array ( [0] => Array ( [0] => a [1] => Array ( [0] => a1 [1] => a2 [2] => a3 [3] => a4 [4] => a5 ) ) [1] => Array ( [0] => b [1] => Array ( [0] => b1 [1] => b2 [2] => b3 ) ) [2] => Array ( [0] => c [1] => Array ( [0] => c1 [1] => c2 [2] => c3 [3] => c4 ) ) ) Now applying into a query foreach ($x as $key1 => $value1) { foreach ($x[$key1][1] as $key2 => $value2) { $user = 1; /* set here for testing purposes only */ $sql = "SELECT `tID` FROM `test` WHERE `tTYPE` = '".$x[$key1][0]."' AND `tWHEN` = '".$value2."' AND `aUSER` = '".$user."'"; $xx = mysql_query($sql); if (!mysql_num_rows($xx)) { echo $sql."\cr"; echo "Empty ".$x[$key1][0]." -> ".$value2."\cr"; } } } this results in a few queries like this if no match on db... SELECT `tID` FROM `test` WHERE `tTYPE` = 'b' AND `tWHEN` = 'b2' AND `aUSER` = '1' and the echo Empty b -> b2   despite all this... i keep getting "mysql_num_rows() expects parameter 1 to be resource, boolean given" Any light why this occurs or how to overcome this would be appreciated!
  5. Dayo: I had the exact same problem, that is why i sent you the pm...
  6. The problem is within the script. Dayo has been pointed on a way to fix it :)
  7. meh... me thinks SRB would sell anything for its weight in gold :)
  8. one other chance if your host doesn't allow curl is to use "php -f /path/to/cron_file.php" and obviously check RoZ suggestion
  9. Check their API for payment transactions, they ought to have something on their website...
  10. http://makewebgames.io/showthread.php/31352-mccode-v1-Mccodes-V1-Jail Keep in mind that some adjustments might need to be done. This is quite old and the code might be messed up as for the forum change software
  11. Old mods, have the code totally screwed up, upon forum software change... a quick look at the code itself... it's probably the issue!
  12. http://code.google.com/p/ezrpg/downloads/list
  13. Then you ought to talk to him as it is a paid mod, he's most likely the best choice to help you.
  14. Dave's one or Spudinski's ?
  15. default: index(); break;   as simple as that, seems illusions was faster! :)
  16. I just dl'ed it and no warning has come...
  17. @DJK, finally assuming that it is too short? heh, nice move, but no one cares about it! :P
  18. Lithium

    SOPA act 2

    If you haven't heard of it yet, CISPA is the latest piece of proposed legislation that's causing an uproar among privacy and civil liberties advocates, as well as defenders of the free internet everywhere. The Cyber Intelligence Sharing Protection Act is a bipartisan bill that essentially encourages ISPs to work together with the government to keep tabs on users who could pose a 'cybersecurity threat' – or just happens to pirate a file, according to TorrentFreak. Even though some people have described it as the new SOPA, that's just rhetoric. But even though the bills have almost nothing in common, that doesn't make them any less of a problem. Whereas SOPA was unabashedly targeting piracy (for the record, that wasn't the problem with it; the ends didn't justify the means), CISPA is focused on protecting private and government networks from hackers and more nebulous threats (which, once again, isn't the problem). Despite containing a few provisions targeting piracy, which we'll get to in a minute, most criticism of CISPA is aimed at the privacy nightmare it threatens to create. Despite co-sponsor Mike Rogers describing the bill to Huffington Post as 'non-invasive,' a legislative counsel at the ACLU called it “a new backdoor around the Fourth Amendment... ,” which protects against unwarranted searches. “This is a whole new surveillance program,” she warned. So, what's not to love about the bill? According to a summary from the Congressional Research Service, a nonpartisan arm of the Library of Congress, the bill “[encourages] the sharing of [cyber threat intelligence].” Privacy advocates are concerned that this could mean that ISPs would end up sifting through web traffic looking for such threats. The bill also encourages sharing of information involving a “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.” Now, hacking, especially 'serious' hacking between governments, is no doubt a serious problem, but CISPA seems to be going down the same road as SOPA, due to overly intrusive provisions in a bill that tries to address problems that otherwise need to be reasonably addressed. What's even more disturbing is that CISPA seems to not only permit, but even encourages, companies to actively spy on consumers. Since it doesn't require a warrant, CISPA could potentially lead to ISPs trying to seek out crime, rather than simply reporting truly reasonable threats. A statement from the Electronic Frontier Foundation hits the nail right on the head: “That means a company like Google, Facebook, Twitter, or AT&T could intercept your emails and text messages, send copies to one another and to the government, and modify those communications or prevent them from reaching their destination if it fits into their plan to stop cybersecurity threats.” There's a whole host of issues at stake here, but if Congress really does want to pass legislation to protect against cybersecurity threats and yes, even piracy, they would be wise to take the advice given by Caitlin Hayden, a spokeswoman for the National Security Council , to Huffington Post, who would “encourage the Congress to craft information sharing legislation carefully with robust protections to safeguard civil liberties and privacy.” As it is, CISPA could go before Congress as early as the week of April 23rd.  
  19. $_GET 's or $_POST or sanitize the entire script
  20. that could've been an option, though the version i use (this was trimmed down to the simplest version possible ;)), i encrypt the string just before the post so any automated attempt, would fail unless using rainbow tables :)
  21. Honestly... you are totally wrong, people love this site, and you in particular ought to love to be trashed out as well as you keep replying. :)
  22. Happy Birthday brat! :)
  23. I've seen a few requests floating around for a login captcha. so here it goes, a very simple one that does the work just fine. (Despite this is on MCC thread this is usable pretty much everywhere!   Create a file called captcha.php with this code <?php session_start(); $seccode = mt_rand(10000, 99999); $_SESSION['code'] = $seccode; $im = imagecreate(47, 18) or die('error!'); $corfundo = imagecolorallocate($im, 255, 153, 0); $corfonte = imagecolorallocate($im, 0, 0, 0); $corborda = imagecolorallocate($im, 0, 0, 0); imageline($im, 0, 0, 0, 46, $corborda); imageline($im, 0, 0, 100, 0, $corborda); imageline($im, 0, 17, 100, 17, $corborda); imageline($im, 46, 0, 46, 17, $corborda); imagestring($im, 3, 6, 2, $seccode, $corfonte); header("Content-Type: image/png"); imagepng($im); imagedestroy($im); ?>   Then inside the login form get some space for the image using <img src="captcha.php" />   and~next the input for the code <input name="code" type="text" value="" size="22" />   After this, wherever you check the credentials use $_POST['code'] from the input and compare it to $_SESSION['code'] A final note, you might need to re-adjust file size and colors to suit your needs!
  24. LMAO, that one made my day! http://php.net/manual/en/language.basic-syntax.comments.php and keep the reading throughout all the links on the left
×
×
  • Create New...