Another fine thing about this is the fact that you can use unicode
characters as an alternative which the regular expression engine
probably wont match, unless it's somehow tweaked. This is the same
theory as in when you are doing phising, for say ebay.com and replace
the a with one of them non-ASC
No, I agree, for this matter you can never create a regular expression
well written enough to match all or even most of the lingo we use.
=
Been off the list for a couple of days and just stumbled across this
thread.
Our company uses some kind of 'nicey-ni
-oOo--
> - Original Message -
> From: "Ludvig Ericson" <[EMAIL PROTECTED]>
> To: "Julien Bonastre" <[EMAIL PROTECTED]>
> Cc:
> Sent: Sunday, March 12, 2006 11:31 AM
> Subject: Re: [PHP-DB] Database abuse help needed
>
&g
PROTECTED]
www.the-spectrum.org --oOo---oOo--
- Original Message -
From: "Ludvig Ericson" <[EMAIL PROTECTED]>
To: "Julien Bonastre" <[EMAIL PROTECTED]>
Cc:
Sent: Sunday, March 12, 2006 11:31 AM
Subject: Re: [PHP-DB] Database abuse help need
sidered if: ... a.. You have no users, and nobody ever visits
> your server. ... Extracted Quote: Security Tips - Apache HTTP
> Server ---oOo--- --oOo---oOo-- Julien Bonastre
> [The_RadiX] The-Spectrum Network CEO ABN: 64 235 749 494
> [EMAIL PROTECTED]
> www.the-spectrum.org --
--
From: "Ludvig Ericson" <[EMAIL PROTECTED]>
To: "Julien Bonastre" <[EMAIL PROTECTED]>
Cc: "Chris Payne" <[EMAIL PROTECTED]>;
Sent: Sunday, March 12, 2006 12:18 AM
Subject: Re: [PHP-DB] Database abuse help needed
Erm, dude, chill out with the elitism
fferent fields. Easy enough?
>
>
> Then I have the second part, which uses the PCRE [perl compat reg exp]
> handler functions of PHP to attempt matching my patterns to the given
> inputs from user.
>
>
> Easy right???
>
>
> Too easy, and extremely fast and effective...
>
hes about how expensive they are
to run, but wouldn't we be BADed without them!?!?!?
---oOo--- Allowing users to execute CGI scripts in any directory should
only be considered if: ... a.. You have no users, and nobody ever visits
your server. ... Extracted Quote: Security Tips - Apache HTT
t: Thursday, March 09, 2006 8:40 PM
To: php-db@lists.php.net
Subject: RE: [PHP-DB] Database abuse help needed
Thank you for that. And excuse the inexperience, but how would I use an
Array with the below? I mean say I had words such as this,is,a,bad,word
(Just as examples as I can't post wh
us2.php.net/in_array
-Original Message-
From: Chris Payne [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 09, 2006 8:40 PM
To: php-db@lists.php.net
Subject: RE: [PHP-DB] Database abuse help needed
Thank you for that. And excuse the inexperience, but how would I use an
Array with the below? I
I use an array of 'bad' words and the in_array function to check if the data
is in the array
Bastien
From: "Chris Payne" <[EMAIL PROTECTED]>
To:
Subject: [PHP-DB] Database abuse help needed
Date: Thu, 9 Mar 2006 18:21:25 -0500
Hi there everyone,
Is there a better way I can do this?
if
Thank you for that. And excuse the inexperience, but how would I use an
Array with the below? I mean say I had words such as this,is,a,bad,word
(Just as examples as I can't post what I'm trying to block on here) how
would I loop through those to check if any of them exist and if they do THEN
exec
If you POST from your form use $_POST, or $_GET for a form GET
foreach($_POST as $key => $value){
if( strpos($value, $findme) !== false ){
//$findme was found in $value
}
}
http://php.net/manual/en/reserved.variables.php
http://us2.php.net/manual/en/control-structu
13 matches
Mail list logo