Citat:
Originalno napisao LiquidBrain
Da znam, provereno vec ![Wink](images/smilies/wink.gif) ako bude imalo onda je SQL injection ![Wink](images/smilies/wink.gif)
|
PHP kôd:
function escape_sql($text) {
// return $text;
$text = str_replace("\\", "\\\\", $text);
return str_replace("'", "''", $text);
}
function escape_sql($string) {
return get_magic_quotes_gpc() ? $string : addslashes($string);
}
i jos hiiiiiiljade varijanti
![Smile](images/smilies/smile.gif)