On Mon, 15 Dec 2003, Tino Wildenhain wrote: > Hi Scott, > > scott.marlowe schrieb: > [...] > > > > print "<url goes here...>?orderby=".$flds[$i]."moreurlstuffhere???"; > > > > Then, if the orderby is set when you build your query, just append it: > > > > if (isset($orderby)){ > > $query.= "order by ".$orderby" > > } > > > > Add some directional control: > > > > if (isset($dir)){ > > if ($dir=="down") $query.=" DESC"; > > } > > > [...] > > This leads to a nice SQL-injection posibility. > At least it has to made sure that no illegal > data can be transported via $orderby Actually, the $flds[] array var is internally generated, and you'll notice that orderby is NOT a PHP var, but a field name. Good point though, lots of folks "trust" user input without paying attention to injection issues, which is one reason I always setup servers with magic quotes on. :-)