CodeCanyon Simple Sanitize 114017

CodeCanyon Simple Sanitize 114017

CodeCanyon Simple Sanitize 114017
PHP Script \ Miscellaneous
Security \ Simple \ User \ Sanitize \ Safe \ Data \ Easy \ Input \ Clean

PHP Script - Simple Sanitize 114017 by sterlingdezine @ CodeCanyon

PHP Script \ Miscellaneous

Last Update: 4 August 10; Software Version: PHP 4.x, PHP 5.x, PHP 5.0 - 5.2, PHP 5.3, MySQL 4.x, MySQL 5.x; Files Included: PHP.

Use this PHP Class to safely access user input like GET and POST variables. Set it and forget it! This class automatically sanitizes your data in various ways. Current options include “strict”, “html”, “mysql”, “both” (html and mysql), or “none”.

Each sanitizing level handles data a little bit differently. “strict” will return input with only alphanumeric characters. “html” encodes all html-entites. “mysql” escapes all special mysql characters (no mysql connection required). “both” runs the html sanitizing and then the mysql. “none” will give you the data as it is.

Optional maxlength parameters included! Before you sanitize a string, you can define the max length (for strings) or max value (for numbers). Strings will be cut off at the maxlength before it is sanitized, and numbers won’t be allowed past that value.

Arrays are supported! This class will recursively sanitize any array it runs into. That means you can return the entire $_POST variable with each and every value sanitized the way you want it.

Force data types! You can force any value you retrieve to be an int, float, or boolean.

Keywords: clean, data, easy, input, safe, sanitize, security, simple, user, xss.

Tags: Simple, Sanitize, Security, Clean, Input

Premium CodeCanyon Simple Sanitize 114017 WordPress Themes, Website Templates, Mobile Themes, Flash Templates & Scripts from creative professional designers. Full details of CodeCanyon Simple Sanitize 114017 for digital design and education. CodeCanyon Simple Sanitize 114017 desigen style information or anything related.


Add Comments:
Enter Code: *