《PHP實例:php防止sql注入之過濾分頁參數實例》要點:
本文介紹了PHP實例:php防止sql注入之過濾分頁參數實例,希望對您有用。如果有疑問,可以聯系我們。
PHP編程本文實例講述了php防止sql注入中過濾分頁參數的辦法.分享給大家供大家參考.具體分析如下:
PHP編程就網絡平安而言,在網絡上不要相信任何輸入信息,對于任何輸入信息我們都必須進行參數過濾.對此,我們先來看看下面的實例:
代碼如下:
$this->load->library ( 'pagination' );
$config ['base_url'] = site_url () . '/guest/show';
$config ['total_rows'] = $c;
$config ['per_page'] = $pernum = 15;
$config ['uri_segment'] = 3;
$config ['use_page_numbers'] = TRUE;
$config ['first_link'] = '第一頁';
$config ['last_link'] = '最后一頁';
$config ['num_links'] = 5;
$this->pagination->initialize ( $config );
if (! $this->uri->segment ( 3 )) {
??? $currentnum = 0;
} else {
??? $currentnum = is_numeric($this->uri->segment ( 3 ))?(intval($this->uri->segment ( 3 ) - 1)) * $pernum:0;
}
?
$current_page=is_numeric($this->uri->segment ( 3 ))?intval($this->uri->segment ( 3 )):1;
if($current_page){
??? $data ['title'] = '第'.$current_page.'頁-留言本-防SQL注入測試';
}
else{
??? $data ['title'] = '留言本-防SQL注入測試';
}
?
$data ['liuyan'] = $this->ly->getLy ( $pernum, $currentnum );
其中:
代碼如下:
$current_page=is_numeric($this->uri->segment ( 3 ))?intval($this->uri->segment ( 3 )):1;
$currentnum = is_numeric($this->uri->segment ( 3 ))?(intval($this->uri->segment ( 3 ) - 1)) * $pernum;
這兩句判斷了參數是否為數字.防止非法字符輸入.
PHP編程希望本文所述對大家的PHP程序設計有所贊助.
歡迎參與《PHP實例:php防止sql注入之過濾分頁參數實例》討論,分享您的想法,維易PHP學院為您提供專業教程。
轉載請注明本頁網址:
http://www.snjht.com/jiaocheng/14266.html