How about $_COULDCONTAINSHELLCODE?

-jason

----- Original Message ----- 
From: "Jani Taskinen" <[EMAIL PROTECTED]>
To: "Zeev Suraski" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Wednesday, August 08, 2001 1:09 PM
Subject: Re: [PHP-DEV] Re: The new $_GET/POST/ENV (was: Re: [PHP-CVS] cvs: php4 / 
NEWS...)


> On Wed, 8 Aug 2001, Zeev Suraski wrote:
> 
> >At 21:01 08-08-01, Jani Taskinen wrote:
> >
> >>[moving this to php-dev]
> >>
> >>First: Great! Woohoo! Thanks Zeev!
> >
> >Andi helped with it too :)
> 
> Ah. Thanks Andi! :)
> 
> >I vote for $_EVIL :)
> 
> I am not kidding. Naming it like that would definately
> be a clear sign for everyone that this stuff is not safe
> to use just as it is.
> 
> --Jani
> 
> 
> 
> -- 
> PHP Development Mailing List <http://www.php.net/>
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> To contact the list administrators, e-mail: [EMAIL PROTECTED]
> 


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to