> -----Original Message----- > From: Michael Shadle [mailto:mike503@xxxxxxxxx] > Sent: Wednesday, June 23, 2010 1:07 AM > To: Tommy Pham > Cc: php-general@xxxxxxxxxxxxx > Subject: Re: $_SERVER['REMOTE_ADDR'] and sql injection > > On Wed, Jun 23, 2010 at 1:01 AM, Tommy Pham <tommyhp2@xxxxxxxxx> > wrote: > > > If you're going to implement this, then it's better to implement the > conversion in the backend DB (via SP or UDF). So you can always use MySQL > query browser or the command line to run queries or other methods > depending on your access to the DB, especially if you need to find that > malicious IP address quickly ;) > > -1 for complicating mysql setups :) Then I presume that your firewall, servers, and application is test proven 'bulletproof'? :-P Regards, Tommy -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php