|
Posted by Jeff North on 12/19/06 12:35
On Tue, 19 Dec 2006 06:37:22 -0500, in comp.lang.php bill
<nobody@spamcop.net>
<HLydnaQz665uUxrYnZ2dnUVZ_uS3nZ2d@cablespeedmi.com> wrote:
>| MySQL newbie, not new to computing.
>|
>| In my application I accept photos and data, some structured and
>| some free text. I store the information (but not the images) in a
>| MySQL database and then from that information I construct a web
>| page for the user.
>|
>| The images are always displayed within an <img tag.
>|
>| The text is displayed as part of the web page, within <p> tags.
>|
>| The users are all registered and (more or less) trusted individuals
>|
>| <paranoid mode on>
>|
>| 1: Do I need to worry about SQL injection if I do not process the
>| incoming free form data ?
>|
>| 2: Do I need to worry about PHP statements being embedded in the
>| free form data ?
>|
>| 3: if so, what is the best practices to protect my database/site ?
>|
>| <paranoid mode off>
http://en.wikibooks.org/wiki/Programming:PHP:SQL_Injection
http://www.php.net/manual/en/security.database.sql-injection.php
http://dev.mysql.com/tech-resources/articles/guide-to-php-security-ch3.pdf
---------------------------------------------------------------
jnorthau@yourpantsyahoo.com.au : Remove your pants to reply
---------------------------------------------------------------
[Back to original message]
|