Two simple ways to prevent SQL injection attacks and XSS attacks in PHP_PHP Tutorial

WBOY
Release: 2016-07-21 15:39:30
Original
875 people have browsed it

mysql_real_escape_string()

So if the SQL statement is written like this: "select * from cdr where src =".$userId;, it must be changed to $userId=mysql_real_escape_string($userId)

All printing statements such as echo, print, etc. must be filtered using htmlentities() before printing. This can prevent Xss. Note that in Chinese, htmlentities($name,ENT_NOQUOTES,GB2312) must be written.

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/321539.htmlTechArticlemysql_real_escape_string() So if the SQL statement is written like this: "select * from cdr where src =". $userId; must be changed to $userId=mysql_real_escape_string($userId) All...
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template