O'Reilly logo

jQuery 1.3 with PHP by Kae Verens

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Forms and Form Validation

Problems can occur when unfiltered form data is inserted into a database or used to send emails.

SQL injection, for example, is a method where an attacker tries to "hack" the site's database by submitting SQL fragments through your forms in an attempt to have them run as actual SQL on the server.

In email forms, spamming robots sometimes try subverting the email-sending mechanism to send their own spam through your server.

Form validation is used to make sure that the data is sane and will not cause problems. For example, if you validate that what you expect to be an email address actually is an email address, or that SQL is properly escaped before running it, then you will go a long way towards stopping these ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required