Jump to content

oni-kun

Members
  • Posts

    1,984
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by oni-kun

  1. It should work, but if you want to replace it with something simpler than you may just have to do this: $CHAT_MESSAGE = 7; $CHAT_END_OF_COMMAND = 255; socket_write($socket, chr($CHAT_MESSAGE) . $message . chr($CHAT_END_OF_COMMAND));
  2. I've not personally learnt Javascript, but it's similarity to PHP (and well, any language) makes it not too hard. Your JS query requires AJAX though, a (slightly) complex side of JS, I'd look into tutorials.
  3. Do you mean $var = $upload_path = "/Main/Uploads/$username"; echo $upload_path; // Returns /Main/Uploads/Foobar echo $var; // Returns /Main/Uploads/Foobar You can assign two variables at once, but your original 'variable within a variable' question doesn't make so much sense. That $var = .. I'm not sure why you're doing, you can just do: $upload_path = "/Main/Uploads/$username"; And it will fill the $username variable accordingly.
  4. Microsoft has documentation for a reason. http://msdn.microsoft.com/en-us/library/k8kf6y2a%28VS.80%29.aspx BTW, nice blast from the past on your GUI. I used to keep it at a nice Windows Classic theme, but my computer is too fast to notice, so I used UXtheming.
  5. Yes, You are aware that a radifying integer will be absolute, as the absolute function is used for. The minus will not appear if what you've posted is truly your code, It is impossible. What exactly are you testing?
  6. India is a company? Well bugger me sideways, here was me thinking it was a country... http://www.companyofindia.com/ Oh, there's a country named after it?
  7. I assumed the previous message would have brought it to light, But you should keep the code I stated as you're allowing people to directly post into your database if not.
  8. But it is! I'll have to try that method later today when I upload a tutorial on how to make thermite.
  9. Your query is suseptable to SQL query injection (A nasty nasty thing). ALWAYS make sure to sanitize the data once retrieved from POST. Place this above in your action script: include ("connection.php"); //Sanitize data for input if(get_magic_quotes_gpc()): $_POST = array_map('stripslashes', $_POST); } $_POST = array_map('mysql_real_escape_string', $_POST); //Retrieve clean $_POST data. $newProductName = $_POST['txtProductName']; $newProductCat = $_POST['txtProductCat']; $newProductCategory = $_POST['txtProductCategory']; $newProductImage = $_POST['txtProductImage']; $newProductSize = $_POST['txtProductSize']; $newProductDesc = $_POST['txtProdectDesc']; $newProductPrice = $_POST['txtProductPrice']; EDIT: Updated code.
  10. You know, I don't think I knew that, that's what you get when you come from a VB.NET background.. Assumed as variables couldn't be called before, functions couldn't either.
  11. I was aware of that, I just meant in the original code Came before: Was the original code just combined or have you not spotted that mistake?
  12. Nice fresh obfuscation technique, That i'm sure a few more people will not get. Albeit I find it pointless to obfuscate anything, if you're releasing it, it should be paid for, copyrighted, or free.
  13. That's where you slip into the dark side of the 'net. IF they copy you, copy the act of annihilation. I'm sure a mipmap of a poorly rushed site may have a few places to add automated payback to.
  14. http://whois.domaintools.com/musicadelibreria.net http://www.nic.ru/whois/?query=forex-biznes.ru They look like to be honest botnetted/ or a relay from an infected site like your own. Be sure to block any data coming/going to these adresses you may want to disallow the IPs of them in a .htaccess file to deny any possible traffic for later preventative measures.
  15. Yes, in this case it is a very valid solution to get many sources on how to work the logic of this, as anyone who posts here may have it flawed and such would not be a good idea to ask such a general question. If there were some more key logic, just ask. And make sure your tutorials/logic come from (atleat) reputable sources, watch for bad coding, PHP is cursed for it.
  16. I sent him 74k e-mails of his own code, so I think he'll be busy enough to miss yours. There isn't much to be done really, just not many laws in place that can really support this, or prove it.
  17. Your code is incorrect. if ($sort = ksort){ That is assigning. == is comparison. and it's not in a string as well! if ($sort == 'ksort'){ ... Is what you should do from now on, you should start by fixing your code.
  18. Hm? $_GET is a superglobal for url passed variables. You'd change: ?month=$qmap&?sort=ksort To: ?month=$qmap&sort=ksort Therefor, you can access them via $_GET['month'] and $_GET['sort'] respectively. ? is an operator to tell the url there is going to be a $_GET variable, file.php?var1=foo&var2=bar&var3=baz
  19. Say what? On PHPFreaks stats it claims to be at 991k, A few weeks you'll have to wait to have it there..
  20. He means change: // (4) Run the query on the customer table through the connection $result = mysql_query ($query); To: // (4) Run the query on the customer table through the connection $result = mysql_query($query) or trigger_error(mysql_error()); This will display any errors if the query was made incorrectly. EDIT: And do you mean a while instead of an IF loop? It shouldn't be an IF.
  21. Your code has errors in it, displaying HTML out of echo's. $nummer = explode(";",$nummers); $lus = count($nummer); echo '<div id="display">'; for ($loop=0;$loop<$lus;$loop++) { $gsmnummer = "32" . substr($nummer[$loop],1,3) . substr($nummer[$loop],4,6); if (strlen($gsmnummer) == 11) { echo "verzending naar " . $gsmnummer . "<br />"; } else { echo "<font color=red>FOUT: Verkeerd geformateerd gsmnummer !! : " . $gsmnummer . "<br /></font>"; } } echo '</div>'; This should work, provided you were wanting it to be within a single div (and not overwritten)
  22. You are outputting a new div every iteration of the loop, Maybe you should define the div before the loop, and end the div after.
  23. Your Grammer/Linguistical skills are at issue as well, I suppose.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.