A PHP Error was encountered

Severity: 8192

Message: Required parameter $limit follows optional parameter $lang

Filename: models/Blog_model.php

Line Number: 34

Backtrace:

File: /home/nohamark/public_html/application/third_party/MX/Modules.php
Line: 157
Function: _error_handler

File: /home/nohamark/public_html/application/third_party/MX/Modules.php
Line: 157
Function: include_once

File: /home/nohamark/public_html/application/third_party/MX/Loader.php
Line: 222
Function: load_file

File: /home/nohamark/public_html/application/controllers/Blog.php
Line: 17
Function: model

File: /home/nohamark/public_html/index.php
Line: 292
Function: require_once

A PHP Error was encountered

Severity: 8192

Message: Required parameter $page follows optional parameter $lang

Filename: models/Blog_model.php

Line Number: 0

Backtrace:

File: /home/nohamark/public_html/application/third_party/MX/Modules.php
Line: 157
Function: _error_handler

File: /home/nohamark/public_html/application/third_party/MX/Modules.php
Line: 157
Function: include_once

File: /home/nohamark/public_html/application/third_party/MX/Loader.php
Line: 222
Function: load_file

File: /home/nohamark/public_html/application/controllers/Blog.php
Line: 17
Function: model

File: /home/nohamark/public_html/index.php
Line: 292
Function: require_once

PUBLISH POST
  • 02 223386241, 02 47114453, 017 8284 0674
PUBLISH POST
PUBLISH POST
May 12, 18

This wikiHow teaches you how to prevent SQL injection using Prepared Statements in PHP. SQL injection is one of the most common vulnerabilities in Web applications today. Prepared Statements use bound parameters and do not combine variables with SQL strings, making it impossible for an attacker to modify the SQL statement.

Prepared Statements combine the variable with the compiled SQL statement, so that the SQL and the variables are sent separately. The variables are then interpreted as mere strings and not part of the SQL statement. Using the methods in the steps below, you will not need to use any other SQL injection filtering techniques such as the mysql_real_escape_string().[1]