本文实例讲述了php防止sql注入中过滤分页参数的方法。分享给大家供大家参考。具体分析如下:
就网络安全而言,在网络上不要相信任何输入信息,对于任何输入信息我们都必须进行参数过滤。对此,我们先来看看下面的实例:
$this->load->library ( 'pagination' );<br />$config ['base_url'] = site_url () . '/guest/show';<br />$config ['total_rows'] = $c;<br />$config ['per_page'] = $pernum = 15;<br />$config ['uri_segment'] = 3;<br />$config ['use_page_numbers'] = TRUE;<br />$config ['first_link'] = '第一页';<br />$config ['last_link'] = '最后一页';<br />$config ['num_links'] = 5;<br />$this->pagination->initialize ( $config );<br />if (! $this->uri->segment ( 3 )) {<br /> <p style="color:transparent">。本文来源gao!%daima.com搞$代*!码网1</p><cite>搞代gaodaima码</cite> $currentnum = 0;<br />} else {<br /> $currentnum = is_numeric($this->uri->segment ( 3 ))?(intval($this->uri->segment ( 3 ) - 1)) * $pernum:0;<br />}<br /> <br />$current_page=is_numeric($this->uri->segment ( 3 ))?intval($this->uri->segment ( 3 )):1;<br />if($current_page){<br /> $data ['title'] = '第'.$current_page.'页-留言本-防SQL注入测试';<br />}<br />else{<br /> $data ['title'] = '留言本-防SQL注入测试';<br />}<br /> <br />$data ['liuyan'] = $this->ly->getLy ( $pernum, $currentnum );
其中:
$current_page=is_numeric($this->uri->segment ( 3 ))?intval($this->uri->segment ( 3 )):1;<br />$currentnum = is_numeric($this->uri->segment ( 3 ))?(intval($this->uri->segment ( 3 ) - 1)) * $pernum;
这两句判断了参数是否为数字。防止非法字符输入。
希望本文所述对大家的PHP程序设计有所帮助。