三个函数:
1. addslashes($string):用反斜线援用字符串中的特别字符' " \
$username=addslashes($username);
2. mysql_escape_string($string):用反斜杠转义字符串中的特别字符,用于mysql_query()查询。
$username=mysql_escape_string($username);
3. mysql_real_escape_string($string):转义SQL语句中运用的字符串中的特别字符,并考虑到衔接的当前字符集,须要保证当前是衔接状况才能用该函数,不然会报正告。 不转义%与_
$username=mysql_real_escape_string($username);
两种挑选:
1. 运用PDO
$stmt = $pdo->prepare('SELECT * FROM user WHERE name = :name'); $stmt->execute(array(':name' => $name)); foreach ($stmt as $row) { // do something with $row }
2. 运用mysqli
$stmt = $dbConnection->prepare('SELECT * FROM user WHERE name = ?'); $stmt->bind_param('s', $name); $stmt->execute(); $result = $stmt->get_result(); while ($row = $result->fetch_assoc()) { // do something with $row }
更多PHP相干学问,请接见ki4网!
以上就是php三个函数、两种挑选防备sql注入的细致内容,更多请关注ki4网别的相干文章!