<BR>function jk1986_checksql() <BR>{ <BR>$bad_str = "and|select|update|'|delete|insert|*"; <BR>$bad_Array = explode("|",$bad_str); <BR>/** 过滤Get参数 **/ <BR>foreach ($bad_Array as $bad_a) <BR>{ <BR>foreach ($_GET as $g) <BR>{ <BR>if (substr_count(strtolower($g),$bad_a) > 0) <BR>{ <BR>echo "<script>alert('诡异字符,请不要尝试注入本站! 作者:Jk1986 QQ:414028660');location.href='index.php';</script>"; <BR>exit(); <BR>} <BR>} <BR>} <br><br>/** 过滤Post参数 **/ <br><br>foreach ($bad_Array as $bad_a) <BR>{ <BR>foreach ($_POST as <p style="color:transparent">本文来源gao!%daima.com搞$代*!码$网3</p><strong>搞代gaodaima码</strong>$p) <BR>{ <BR>if (substr_count(strtolower($p),$bad_a) > 0) <BR>{ <BR>echo "<script>alert('诡异字符,请不要尝试注入本站! 作者:Jk1986 QQ:414028660');location.href='index.php';</script>"; <BR>exit(); <BR>} <BR>} <BR>} <br><br>/** 过滤Cookies参数 **/ <br><br>foreach ($bad_Array as $bad_a) <BR>{ <BR>foreach ($_COOKIE as $co) <BR>{ <BR>if (substr_count(strtolower($co),$bad_a) > 0) <BR>{ <BR>echo "<script>alert('诡异字符,请不要尝试注入本站! 作者:Jk1986 QQ:414028660');location.href='index.php';</script>"; <BR>exit(); <BR>} <BR>} <BR>} <BR>} <BR>
呵呵 类似asp和asp.net 思路一样,目的就是让懒来提高效率 .88