To prevent SQL injection in PHP, it is essential to use prepared statements and parameterized queries. These techniques ensure that user input is treated as data, not executable code, which greatly enhances the security of your applications.
<?php
// Create a connection
$conn = new mysqli("localhost", "username", "password", "database");
// Check the connection
if ($conn->connect_error) {
die("Connection failed: " . $conn->connect_error);
}
// Prepare a statement
$stmt = $conn->prepare("SELECT * FROM users WHERE email = ?");
// Bind parameters
$stmt->bind_param("s", $email);
// Set the value of the parameter
$email = $_POST['email'];
// Execute the statement
$stmt->execute();
// Get the result
$result = $stmt->get_result();
// Process the results
while ($row = $result->fetch_assoc()) {
echo "User: " . $row['name'] . "<br>";
}
// Close the statement and connection
$stmt->close();
$conn->close();
?>
How do I avoid rehashing overhead with std::set in multithreaded code?
How do I find elements with custom comparators with std::set for embedded targets?
How do I erase elements while iterating with std::set for embedded targets?
How do I provide stable iteration order with std::unordered_map for large datasets?
How do I reserve capacity ahead of time with std::unordered_map for large datasets?
How do I erase elements while iterating with std::unordered_map in multithreaded code?
How do I provide stable iteration order with std::map for embedded targets?
How do I provide stable iteration order with std::map in multithreaded code?
How do I avoid rehashing overhead with std::map in performance-sensitive code?
How do I merge two containers efficiently with std::map for embedded targets?