Forum Moderators: coopster
Alternately, you can do this all differently, using imagepng to save the image with some kind of hashed or id name, and your script knows the hashed or id name, and calls up the image. This is somewhat more advanced php than the other stuff we've been talking about, but you seem like a quick learner! And the image functions are really fun, too. Rasmus Lehrdorf, the 'instigator' of PHP, has done a lot in the last year trying to promote the image functions, probably mainly since they're so fun.
that was alot info there. not sure about being a quick learner tough...but thanks for the comliment still :)
well, the adds are not to be public. there is only a sign up form and then the adds will be sotred somewhere. and this is where i was thinking about security issues. i could save them in a txt file and im sure they will be relatively secure. but u know...just in case anyone would wanto to take a look at whats on the server. i was thinking of a way of avoiding, i think what is called, social engineering, or something.
and as u suggest, the mails will go trough a form. with only admin access off course.
you do have sparked sparked my interest in the image fucntions tough, and i will do some playing around as soon as i get time...thanks
kumar
File/db choice really depends on how well each of these is secured. Securing files would involve making sure they are .php files, not txt, having them actually parsed and putting the sensitive stuff there in the form of variables, setting a constant at the base file and checking if this constant is set in the secured files, and making sure all dynamically included files are screened by some kind of naming convention.
If it's just e-mail addresses, and not credit card info or real sensitive stuff, either should be fine. No e-mail harvesters are going to go the pain of trying an sql injection or cross-site scripting attack just to try to sell more people viagara. However, whatever you do, you want to have these security issues stopped up anyways, since it'll be more than just e-mail addresses the hackers are after.