just as the above sais, im not gonna tell u the url even though u can prolly find it out. but r there any measures i should take? how should i test it (without getting a hacker to test it)
i tried lookign at the code and thought abotu what could go in the pw field to bypass it... but i cant figure it out. ill post the code im lookign at if requested
how do i protect my user system from injection
how do i protect my user system from injection
ESCARGOT!!!!
French for snails, say that word near my cat and it goes nuts :S
French for snails, say that word near my cat and it goes nuts :S
- bad_brain
- Site Owner
- Posts: 11639
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
hm,hard to tell without further info, where are the passes stored for example, in a db or in .htaccess? is it a custom code or a premade CMS? would be best if you post the code too, or (if possible) to set up a testsite on a neutral webspace.
if it´s in PHP you can use Zend Optimizer, ask Maboroshi for details, he used it already I think...
if it´s in PHP you can use Zend Optimizer, ask Maboroshi for details, he used it already I think...

Well, if it's in PHP then all you have to do is filter all in put with the "addslashes($var);" function. But that's if it's using an SQL Database. If it's using a flatfile database, then i suggest doing "htmlentities();" and "addslashes();". But yeah, do whatever.
¯\_(ツ)_/¯ It works on my machine...