Here is some code i want to start with to use in a new form (please note I am a noob, thanks):
$myid = intval($_GET['id']);
$mynumber = intval($_GET['number']);
$dbuser_name = "databaseusernamehere";
$dbpassword = "databasepasswordhere";
$dbdatabase = "databasenamehere";
$dbserver = "database.host.com";
$db_handle = mysql_connect($dbserver, $dbuser_name, $dbpassword);
$db_found = mysql_select_db($dbdatabase, $db_handle);
$dbcnx = @mysql_connect($dbserver,$dbuser_name,$dbpassword);
if (!$dbcnx) {
die('unable to connect to database server at this time.<p>');
}
if (! @mysql_select_db("$dbdatabase") ) {
die('unable to connect to db at this time.<p>');
}
$result = @mysql_query("SELECT * FROM `mydatabase` WHERE `dbfield1` = $mynumber and `dbfield2` = $myid");
if (!$result) {
die ('Error performing query: No Match ' . mysql_error() . '<p>');
}
if (mysql_num_rows($result) < 1) {
echo ("No records available");
} else {
How do i clean this up so it's safe from injection attack?
Thank you for any advice!
-Jay