Jump to content

benanamen

Members
  • Posts

    2,021
  • Joined

  • Last visited

  • Days Won

    38

benanamen last won the day on December 15 2020

benanamen had the most liked content!

1 Follower

Contact Methods

  • Website URL
    http://galaxyinternet.us/
  • Yahoo
    phpfreaks@galaxyinternet.us

Profile Information

  • Gender
    Not Telling
  • Interests
    Email me at phpfreaks@galaxyinternet.us

Recent Profile Visitors

7,248 profile views

benanamen's Achievements

Prolific Member

Prolific Member (5/5)

130

Reputation

41

Community Answers

  1. mysql_* has been completely removed from current versions of Php. You need to use PDO with Prepared statements. This tutorial will get you going. https://phpdelusions.net/pdo
  2. I knew this conversation sounded familiar......... https://www.phphelp.com/t/terminology-discourse/33277/5
  3. Sounds to me like you have an Architecture problem. You "should" be serving all your files through a single point of entry. You might want to start a new thread about that topic with details of how you have things set up.
  4. Where does $url magically come from?
  5. You need to use Prepared Statements and your problem will be solved. NEVER EVER put variables in your query and NEVER EVER trust user supplied data. But as to why the problem, there are no quotes in your $_POST values. You have $_POST[article_id] instead of $_POST['article_id']
  6. Yes, stop using shared hosting and get a VPS.
  7. As far as file names, what DOES make a difference is underscore and dash to separate words. As simple search proves this out. On google search fast_cars and see returned result count, then try fast-cars. I get 13,000,000 results and 1,600,000,000 respectively Bottom line, use dashes as the separator.
  8. Take a look at my clean-pdo code repo. https://github.com/benanamen/clean-pdo
  9. Your code is vulnerable to an SQL Injection Attack. You need to use Prepared Statements. NEVER EVER PUT VARIABLES IN YOUR QUERY
  10. The form data is in the POST array which you do nothing with. Besides that, this code will be vulnerable to an Email Header Injection Attack if it were to work.
  11. Oh, so your a Domain Squatter. 🚩🚩
  12. The break tag (br) by no means goes anywhere within a Select element. https://developer.mozilla.org/en-US/docs/Web/HTML/Element/select
  13. How about giving us a high level overview of what you have going on and the real problem you are trying to solve by doing this.
  14. You might want to tell us exactly what that error is. We cant see your screen and you posted incomplete code. What you did post is wide open to an SQL Injection Attack. You need to use Prepared Statements.
  15. When you are done, post a sql dump of your db tables and we will review it for you.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.