php防止sql注入之过滤分页参数实例
|
本文实例讲述了php防止sql注入中过滤分页参数的方法。分享给大家供大家参考。具体分析如下: 就网络安全而言,在网络上不要相信任何输入信息,对于任何输入信息我们都必须进行参数过滤。对此,我们先来看看下面的实例: 代码如下:load->library ( 'pagination' ); $config ['base_url'] = site_url () . '/guest/show'; $config ['total_rows'] = $c; $config ['per_page'] = $pernum = 15; $config ['uri_segment'] = 3; $config ['use_page_numbers'] = TRUE; $config ['first_link'] = '第一页'; $config ['last_link'] = '最后一页'; $config ['num_links'] = 5; $this->pagination->initialize ( $config ); if (! $this->uri->segment ( 3 )) { $currentnum = 0; } else { $currentnum = is_numeric($this->uri->segment ( 3 ))?(intval($this->uri->segment ( 3 ) - 1)) * $pernum:0; } $current_page=is_numeric($this->uri->segment ( 3 ))?intval($this->uri->segment ( 3 )):1; $data ['liuyan'] = $this->ly->getLy ( $pernum,$currentnum ); 代码如下:uri->segment ( 3 ))?intval($this->uri->segment ( 3 )):1; $currentnum = is_numeric($this->uri->segment ( 3 ))?(intval($this->uri->segment ( 3 ) - 1)) * $pernum; 这两句判断了参数是否为数字。防止非法字符输入。 希望本文所述对大家的PHP程序设计有所帮助。 (编辑:安卓应用网) 【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容! |
