sean            Thu Oct 28 10:25:51 2004 EDT

  Modified files:              
    /phpdoc/en/security database.xml 
  Log:
  - Fixed [some of the] grammar
  - Changed recommendation of escape mechanism
  
  
http://cvs.php.net/diff.php/phpdoc/en/security/database.xml?r1=1.7&r2=1.8&ty=u
Index: phpdoc/en/security/database.xml
diff -u phpdoc/en/security/database.xml:1.7 phpdoc/en/security/database.xml:1.8
--- phpdoc/en/security/database.xml:1.7 Thu Sep  9 08:49:33 2004
+++ phpdoc/en/security/database.xml     Thu Oct 28 10:25:50 2004
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.7 $ -->
+<!-- $Revision: 1.8 $ -->
 <!-- splitted from ./index.xml, last change in rev 1.66 -->
   <chapter id="security.database">
    <title>Database Security</title>
@@ -412,11 +412,16 @@
       </listitem>
       <listitem>
        <simpara>
-        Quote each non numeric user input which is passed to the database with
-        <function>addslashes</function> or <function>addcslashes</function>.
+        Quote each non numeric user supplied value that is passed to the
+        database with the database-specific string escape function (e.g.
+        <function>mysql_escape_string</function>,
+        <function>sql_escape_string</function>, etc.). If a database-specific
+        string escape mechanism is not available, the
+        <function>addslashes</function> and <function>str_replace</function>
+        functions may be useful (depending on database type).
         See <link linkend="security.database.storage">the first example</link>.
-        As the examples shows, quotes burnt into the static part of the query
-        is not enough, and can be easily cracked.
+        As the example shows, adding quotes to the static part of the query
+        is not enough, making this query easily crackable.
        </simpara>
       </listitem>
       <listitem>

Reply via email to