Includepath does not work the way you describe it.
Why do you want users not to be able to access your php files anyway? If they are written properly they can't do much harm. I can think of several ways of making what you want happen, but I fear all of them include changing the authentication...
PHP can't do image manipulation nagively, but there are several plugins that enable it to do quite a lot.
One of them is GD, for which the image_* series function in php exist. Read the php manual for information about these. I'm not sure you can do all those things you want with it though...
You could try Jeffs code. For testing it is nice, although I wouldn't want to echo my mysql errors on a live site. Too easy for hackers to figure out how my site works then.
I didn't see anything wrong with your code either though. Did you try to echo the query and copy-paste it into phpMyAdmin...
$_POST and $_GET can contain submitted form variables. They are set on the client (i.e. the browser) and submitted to the user. Although you could use them to pass information between pages, they are inherently insecure, as the user can alter/modify them, so their data can not be relied on...
Seems you don't have permission to fopen the file. setting chmod after fopen won't help offcourse, if that is allowed you should do it before the fopen.
Why do you fopen that file twice anyway?
Is the smtp server responding to external requests? Have you tried to Telnet to the server?
I had some problems connecting to by smtp server and by telnetting to the server and reading the responses and such I figured out what went wrong in my case.
So have you echoed the query and tested it?
Obviously something must be wrong with $row_myQuery2
Maybe you can display the content of that.
var_dump($row_myQuery2)
Maybe that will point you to a solution.
Including over internet (http) only works when the fopen wrappers are enabled in php (see http://nl2.php.net/manual/en/function.include.php), and like DRJ478 says you should not use http unless really nessecary.
Btw if including files you don't pass those files parameters in the url like you...
If this works on the paypal server without any error-messages that means they suppress the 'notices', as notices are non-critical errormessages.
You could suppress notices yourself, have a look at http://www.php.net/manual/en/function.error-reporting.php
However it is better to actually check...
I had the same issue you describe a while ago, while moving a page from one server to another. I was allready using a library allready btw, and it didn't cause nor solve my problem.
Seems to me it depends on the mailserver used wether a mail with both & a To & a header with To gets send to 2...
...do:
If I read this correctly this is what happens:
$email is set to test@example.com
the following query is then send to the database:
SELECT * FROM emails WHERE email LIKE test@example.com
This does not seem correct.
First of all why do you use LIKE? If you don't use wildcards like %...
just checking for an @ can be with strpos().
But for validating e-mail addresses you better use a regular expression
http://www.webreference.com/programming/php/regexps/index.html
Ah I understand. Well I don't know who has access to the Intranet? Is access only possible from a certain section of the network, or only to certain users?
You could keep a database of all the systems to send a message to with net send.
The problem with the other suggested method is that...
I understand you can not do a net send from the intranet server for some reason? Cause if you can you can always make your php-scripts execute a net send
Depending on what you do with/how you use your variables people can indeed do nasty things like SQL injection and javascript stuff. Plus they can cause errors and then they can use the information displayed by the error to try and hack your server.
So unless you can trust everyone who might have...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.