Back with another question.
I have come across this really nice function that I think sanitizes and validates (I really hope that statement is actually true). Here is the function and it's usage.
if(funcChkLogin($_POST['username']))
{
$username = escape_data($_POST['username']);
}
funcChkLogin($str)
{
return preg_match("/^[A-z0-9_\-\.]{2,20}$/", stripslashes(trim($str)));
}
escape_data($data)
{
$data = mysql_real_escape_string(trim($data));
$data = strip_tags($data);
return $data;
}
Because I read that the usage of stripslashes creates problems I would like to ask how safe and strong this method is for sanitization. Can it be improved?
I know using PDOs is better but there could be data that is not going into a database then using a nice function like this would be a good idea to ensure we have clean PHP code running. Right?
Thanks all !
mysql_real_escape_string
might not be safe unless you take special precautions. It is also deprecated. Use PDO.No "but"s. Make the right choice.