Thanks ignace for your replay.
Fist "sorry for long explanation, but I want to explain everything very well for you".
The registrattion-form that i have it is simple, just request from my family (users): First Name, Last Name, Login (will be the nick login name e.g "whatevernickname"), Password (confirmation of cpassword), and set that info into the table of db, after that the login-form just ask for "nick" means login name, and password... so my mysql db for these users, holds the "nick" and "passwords" since their registered... so she has to login as (name:whatevernickname) (password:herpassword).
And their Alias (public_html) has been set (into httpd.conf) sintax:
Alias /Dady "/home/midadyname_midadylastname/public_html"
<Directory "/home/midadyname_midadylastname/public_html">
Options Indexes MultiViews
AllowOverride None
Order allow,deny
Allow from all
</Directory>
Alias /Mom "/home/mimomname_mimomlastname/public_html"
<Directory "/home/mimomname_mimomlastname/public_html">
Options Indexes MultiViews
AllowOverride None
Order allow,deny
Allow from all
</Directory>
That means they can access their ...public_html/index.php just typing http://mifamilyserver.com/Mom or http://mifamilyserver.com/Dady
ummm, where ?
like this?:
<?php
//Start session
session_start();
//Include database connection details
require_once('main_user_config.php');
//Array to store validation errors
$errmsg_arr = array();
//Validation error flag
$errflag = false;
//Connect to mysql server
$link = mysql_connect(DB_HOST, DB_USER, DB_PASSWORD);
if(!$link) {
die('Failed to connect to server: ' . mysql_error());
}
//Select database
$db = mysql_select_db(DB_DATABASE);
if(!$db) {
die("Unable to select database");
}
//Function to sanitize values received from the form. Prevents SQL injection
function clean($str) {
$str = @trim($str);
if(get_magic_quotes_gpc()) {
$str = stripslashes($str);
}
return mysql_real_escape_string($str);
}
//Sanitize the POST values
$login = clean($_POST['login']);
$password = clean($_POST['password']);
//Input Validations
if($login == '') {
$errmsg_arr[] = 'Login ID missing';
$errflag = true;
}
if($password == '') {
$errmsg_arr[] = 'Password missing';
$errflag = true;
}
//If there are input validations, redirect back to the login form
if($errflag) {
$_SESSION['ERRMSG_ARR'] = $errmsg_arr;
session_write_close();
header("location: login_form.php");
exit();
}
//Create query
$qry="SELECT * FROM members WHERE login='$login' AND passwd='".md5($_POST['password'])."'";
$result=mysql_query($qry);
//Check whether the query was successful or not
if($result) {
if(mysql_num_rows($result) == 1) {
//Login Successful
session_regenerate_id();
$member = mysql_fetch_assoc($result);
$_SESSION['SESS_MEMBER_ID'] = $member['member_id'];
$_SESSION['SESS_FIRST_NAME'] = $member['firstname'];
$_SESSION['SESS_LAST_NAME'] = $member['lastname'];
session_write_close();
header("location: member_index.php");
//ignace below is what i did.. is like that?
list(.., $alias) = mysql_fetch_row($result);
header('Location: /' . $alias);
exit(0);
}else {
//Login failed
header("location: login_have_failed.php");
exit();
}
}else {
die("Query failed");
}
?>
I do have also in a very top of every php page that is supose include in their home directory thi following sintax:
<?php
require_once('auth.php');
?>