On Wed, Jun 23, 2010 at 1:01 AM, Tommy Pham <tommyhp2@xxxxxxxxx> wrote: > If you're going to implement this, then it's better to implement the conversion in the backend DB (via SP or UDF). So you can always use MySQL query browser or the command line to run queries or other methods depending on your access to the DB, especially if you need to find that malicious IP address quickly ;) -1 for complicating mysql setups :) -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php