>They want you DIVIDED
like commas and colons
splits us in two
serial commas murder grammar
serial killers murder people
serial _ _ _____ ?
grammar is a key
grammar key ?
gould has the gold?
ghouldy locks?
What about the THREE Bares? O Meye
how many of ya'll seen that GRAMMARLY app on all these youtube vids?
don't say you ain't hit skip a hundred+ times
lol
So back when i was a noob learning to code (y2k!), I didn't know better and would pass $_GET variables through my URL without sanitizing on the other side. Any programmer worth his… salt, would know how dumb that is. #1 exploit was to pass a code snippet that (always destructive) would then get executed in the website's environment. steal databases, wipe out servers, turn into "zombie machines" that send spam email.
$_GET, $_POST … environment "variables".
we take these words from real life, and we use them as descriptors for our programming languages.
rinse, recycle, reuse.
"sanitization" (not: sanitation) is a huge important step in protecting the integrity of your code (we're going to imagine when i code, i symbolically also mean your mind)
if you don't perform the necessary operations to "clean" your data, it can corrupt your entire project/company/system.
How do you "sanitize" input from $_GET or $_POST ($_REQUEST)?
first you have to implant the trigger condition:
there are a hundred ways to do this, but one of the most basic rudimentary ones would be something like:
if (isset($_GET['q'])) { … perform function }
you have no idea what $_GET['q'] is, so you have to do you perform some detection of content type.
"is it a number? string? float? code? does it have spaces? alpha numeric?"
if this, then that, case/switch (break; default;)
You have to anticipate how some fucker could hack your shit.
if Is_int() … if (preg_match()/eregi() … etc etc.
or str_replace()/preg_replace();
you perform these functions based on a trigger. you receive receiving external output (from someone else - you dont know the source truly)
If you're just gobbling something up without AUTHENTICATING each iteration of data, you have no way to validate the information.
I hear you Q. it will be hard for them to get I think