<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1042851" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1042851</link>
    <description></description>
    <language>en</language>
          <item>
    <title>I believe the difference</title>
    <link>https://www.webmaster-forums.net/web-programming-and-application-development/password-protected-download#comment-1237434</link>
    <description> &lt;p&gt;I believe the difference being that GET is in the URL and POST is not means that using POST prevents URL manipulations&lt;/p&gt;
&lt;p&gt;In some cases a URL with the GET values is necessary - but not here.&lt;/p&gt;
&lt;p&gt;I posted here for critique, and I appreciate the comments. I sort of forget about the baddies, naive me!&lt;/p&gt;
&lt;p&gt;@greg - we&#039;ve been over the security vs usability issues before. I want the client to be able to change the password, so a specific regexp is not really possible (yeah, we can check it is alphanumeric, so what, it will reject any input that doesn&#039;t match - and what if he wants to put other chars in later on...) I agree, if a db connection were involved, we would need to take greater precautions.&lt;/p&gt;
&lt;p&gt;I am highly honored to debate with you guys (or gals? naw-I don&#039;t think so) it is really a form of compliment... &lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/tongue.png&quot; title=&quot;Sticking out tongue&quot; alt=&quot;Sticking out tongue&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
 </description>
     <pubDate>Sat, 24 Jan 2009 02:58:51 +0000</pubDate>
 <dc:creator>decibel.places</dc:creator>
 <guid isPermaLink="false">comment 1237434 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>decibel.places wrote:
I</title>
    <link>https://www.webmaster-forums.net/web-programming-and-application-development/password-protected-download#comment-1237430</link>
    <description> &lt;p&gt;&lt;div class=&quot;quote-msg&quot;&gt;&lt;div class=&quot;quote-author&quot;&gt;&lt;em&gt;decibel.places&lt;/em&gt; wrote:&lt;/div&gt;I added htmlspecialchars() which I think sanitizes enough (and I&#039;m using POST so the input is not in the URL)&lt;/div&gt;htmlspecialchars() - it is &#039;ok&#039; especially in this case as your data is not going into MYSQL, it&#039;s not the real purpose of that function though, and especially in this case as you don&#039;t actually output the data (comments/forum etc) so XSS isn&#039;t an issue.&lt;br /&gt;
It is better than nothing, but still about the same amount of code as a &#039;preferred&#039; regex match, so I see no point in not using the stronger option.&lt;/p&gt;
&lt;p&gt;POST - If the data being sent is corrupted in a way that bypasses security, or in your case no security, then it doesn&#039;t have to matter how the data is transferred.&lt;/p&gt;
&lt;p&gt;&lt;div class=&quot;quote-msg&quot;&gt;&lt;div class=&quot;quote-author&quot;&gt;&lt;em&gt;decibel.places&lt;/em&gt; wrote:&lt;/div&gt;What exactly can be injected in a text field?&lt;/div&gt;site hacking is in NO way limited to injection attacks, nor necessarily through MYSQL injections.&lt;/p&gt;
&lt;p&gt;OK, you only use a text input, there&#039;s not a great deal can be done with it.&lt;br /&gt;
New methods are being found each day, new server software is released as are new PHP updates, both with the possibility that a vulnerability is released with it. &lt;/p&gt;
&lt;p&gt;If you had to spend hours securing it I could understand the time required versus unlikely chance of hack means it&#039;s not worth doing. As it takes a few minutes at most, I see no point in NOT doing it.&lt;/p&gt;
&lt;p&gt;&lt;div class=&quot;quote-msg&quot;&gt;&lt;div class=&quot;quote-author&quot;&gt;&lt;em&gt;decibel.places&lt;/em&gt; wrote:&lt;/div&gt;The URL for this form will only be provided for subscribers.&lt;/div&gt;And how does that make it ok? So a hacker has to subscribe?&lt;/p&gt;
&lt;p&gt;&quot;Of course I let him into my house, he must have been legitimate, he had a clipboard and a little badge and everything you know.... But I still don&#039;t know where my car keys are ... &quot;&lt;/p&gt;
 </description>
     <pubDate>Fri, 23 Jan 2009 19:49:00 +0000</pubDate>
 <dc:creator>greg</dc:creator>
 <guid isPermaLink="false">comment 1237430 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>(and I&#039;m using POST so the</title>
    <link>https://www.webmaster-forums.net/web-programming-and-application-development/password-protected-download#comment-1237427</link>
    <description> &lt;blockquote&gt;&lt;p&gt;(and I&#039;m using POST so the input is not in the URL)&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Post &amp;amp; Get makes no difference security wise.&lt;/p&gt;
 </description>
     <pubDate>Fri, 23 Jan 2009 19:14:10 +0000</pubDate>
 <dc:creator>pr0gr4mm3r</dc:creator>
 <guid isPermaLink="false">comment 1237427 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>oh yeah, I forget about the</title>
    <link>https://www.webmaster-forums.net/web-programming-and-application-development/password-protected-download#comment-1237426</link>
    <description> &lt;p&gt;oh yeah, I forget about the baddies &lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/wink.png&quot; title=&quot;Wink&quot; alt=&quot;Wink&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I added htmlspecialchars() which I think sanitizes enough (and I&#039;m using POST so the input is not in the URL)&lt;/p&gt;
&lt;p&gt;What exactly can be injected in a text field?&lt;/p&gt;
&lt;p&gt;The URL for this form will only be provided for subscribers.&lt;/p&gt;
&lt;p&gt;For the record, StartLogic changed a mysql password on a test site without any live users. And they just changed Cpanel and FTP logins.&lt;/p&gt;
 </description>
     <pubDate>Fri, 23 Jan 2009 18:47:08 +0000</pubDate>
 <dc:creator>decibel.places</dc:creator>
 <guid isPermaLink="false">comment 1237426 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>I have said this to you</title>
    <link>https://www.webmaster-forums.net/web-programming-and-application-development/password-protected-download#comment-1237425</link>
    <description> &lt;p&gt;I have said this to you before and had a discussion about it, so wont blah here again, but really feel the need to mention it one more time.&lt;/p&gt;
&lt;p&gt;You really should be doing at least minimum checking with any user inputs on your site. ESPECIALLY when you actually make the PHP code for the form publicly available!!&lt;/p&gt;
&lt;p&gt;A simple regex depending on the construction of the passwords would be enough, If you only have alpha numerical password for example, then limit the user to that.&lt;/p&gt;
&lt;p&gt;You really are leaving a site wide open without any checks at all, including yours while you have that form available.&lt;/p&gt;
&lt;p&gt;Maybe this is related to your MYSQL passwords getting changed ? &lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/tongue.png&quot; title=&quot;Sticking out tongue&quot; alt=&quot;Sticking out tongue&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
 </description>
     <pubDate>Fri, 23 Jan 2009 18:28:00 +0000</pubDate>
 <dc:creator>greg</dc:creator>
 <guid isPermaLink="false">comment 1237425 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
