Jump to content

shlumph

Members
  • Posts

    575
  • Joined

  • Last visited

About shlumph

  • Birthday 10/05/1986

Contact Methods

  • Website URL
    http://www.robkeplin.com

Profile Information

  • Gender
    Male
  • Location
    New Hampshire

shlumph's Achievements

Member

Member (2/5)

5

Reputation

  1. I wish the content wasn't fixed width and would stretch across my screen. Also, the top menu (Downloads, Documentation, Community, Help) is kind of annoying; I wish I didn't have to click to see the sub menu items. Other than that, it looks much more modern and overall better looking. And I'm sure there will be a continuous improvements. Edit: It looks like the documentation pages stretch across the screen. So there is some inconsistency in how the content is displayed across the site (as far as layout widths go).
  2. I'm unclear on what you would like, but using GET as the form's method type would place all of it's form variables into the URL. <form action="index.php" method="get"> ... </form>
  3. Instead of searching the font name "spy agency", browse the fonts and look for a similar looking font. It could be named something completely different.
  4. You could try finding a google web font that looks similar to it: http://www.google.com/fonts/ Or, use CSS3 to embed the font, however, this only works with browsers which support embedding fonts. http://www.w3schools.com/css3/css3_fonts.asp
  5. In my opinion, unless there's a strong reason to be storing the files in the DB, you should store them on the file system. That's what the file system was made for. The discussion here goes over pros/cons of storing files in the DB: http://programmers.stackexchange.com/questions/150669/is-it-a-bad-practice-to-store-large-files-10-mb-in-a-database
  6. I hope you've removed it from your server. I would also look for other base_64 encoded strings on your system(s), analyze all your logs, and find what, if any, files have been uploaded.
  7. Yes, it is a malicious script. It's sending email notifications to them to let them know the script made it onto your site. And then they are using the form to upload files into your server, which are probably malicious. If it was encrypted with base_64, that should be a huge red flag.
  8. I'm guessing because, last time I checked, double <br>'s don't have a standard height across browsers. This can be modified with CSS... but I think that's why he did it that way. The style attribute should be quoted. Better yet, give it a class name like "break", then move the styling into a stylesheet.
  9. Sounds like it was word-wrapping.
  10. This would be something like: echo str_replace("\r\n", "<br>", $property_description); Or echo str_replace("<br>", "\r\n", $property_description); Depending on the definition of the replace function in ASP.
  11. I'm not sure about your function. I usually just check $_SERVER['REMOTE_ADDR']. Note that he could be using an anonymous proxy, which would allow him to keep changing his IP address. Do you have a CAPTCHA in your registration process? If you think he is registering via a script he wrote, I would suggest having one in place to prevent this.
  12. You should probably add a CAPTCHA element on your form: http://en.wikipedia.org/wiki/CAPTCHA http://www.google.com/recaptcha/captcha
  13. Ahh, you are right. I retract that statement, for some reason I read it as $date=>posts. Like OP was trying to access an object variable.
  14. Not to mention $date=>$posts is not valid syntax.
  15. http://lmgtfy.com/?q=mysql+set+unique+index
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.