如何在mysql数据库中存储html代码?我可以在任何地方找到人们可以做到的地方,但没有人说怎么做。我知道我需要使用示例中播放的"mysqli_real_escape_string“来剥离数据,但我不知道如何实际做到这一点。我只需如下所示放置代码,但它只会给我一个错误。我知道它是因为HTML代码有"“,但我需要在页面加载时加载它们,所以我如何将代码插入到数据库中?一个链接或其他什么东西都会很棒。
编辑:这里是完整的代码,它没有输入到数据库中的信息,但没有给出任何错误。
<?php
include_once('global.php');
$city = ("<div id='body_sidebar'>
<ul>
<li class='sidebar_service_space'> </li>
<li class='sidebar_service_title'>About Malware</li>
<li><a href='<?php echo '$home' ?>/services/malware/what-is-malware.html'>What is Malware?</a></li>
<li><a href='<?php echo '$home' ?>/services/malware/common-signs.html'>Common Signs of Malware</a></li>
<li class='sidebar_service_space'> </li>
<li class='sidebar_service_title'>Malware Removal</li>
<li><a href='<?php echo '$home' ?>/services/malware/virus-removal.html'>Virus Removal</a>
<a class='tooltip' href='/knowledge_base/virus_removal.php'><img id='viruses' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Viruses</em>
The computer virus is the most infamous form of malware. It is a self replicating program that infects a system without authorization. Once installed, it will execute itself, infect system files, and attempt to propagate to other systems. The impact of a virus ranges widely from slow system performance to wiping out every file on your computer. <br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li><a href='<?php echo '$home' ?>/services/malware/worm-removal.html'>Worm Removal</a>
<a class='tooltip' href='/knowledge_base/worm_removal.html'><img id='worm' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Worms</em>
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to
other computers on the network and it may do so without any user intervention. Worms usually exploit a
known or zero-day vulnerability that allows them to execute their copies on computers on the same
network.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li><a href='<?php echo '$home' ?>/services/malware/adware-removal.html'>Adware Removal</a>
<a class='tooltip' href='/knowledge_base/adware_removal.html'><img id='adware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Adware</em>
Adware is a program that causes the host computer to display advertisements that the user did not request. These are frequently in the form of pop-up ads that appear while browsing the Internet and pop-under ads that open in a window hidden beneath the Internet browser's window, according to security4web.com. Another version of adware is a toolbar that attaches to an Internet browser search ability.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li><a href='<?php echo '$home' ?>/services/malware/spyware-removal.html'>Spyware Removal</a>
<a class='tooltip' href='/knowledge_base/spyware_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Spyware</em>
Spyware collects information from a host computer and sends it to the creator of the program. Spyware can infect a computer as a result of surfing a website that installs it or even as part of programs a user knowingly downloads to use for a different purpose, according to security4web.com. The website notes that freeware (free software) and Internet links advertising spyware-removal programs frequently install spyware.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li><a href='<?php echo '$home' ?>/services/malware/rootkit-removal.html'>Rootkit Removal</a>
<a class='tooltip' href='/knowledge_base/rootkit_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Rootkit</em>
Rootkits can make it difficult to discover that your computer has been infected by other types of malware. According to h-online.com, a rootkit manipulates files so they are difficult to discover on your computer. This makes it a challenge to find out if a malware process or file is running in the background on your computer because a rootkit program may be preventing you from finding it by browsing folders or searching on your computer file system.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li><a href='<?php echo '$home' ?>/services/malware/trojan-removal.html'>Trojan Horse Removal</a>
<a class='tooltip' href='/knowledge_base/trojan_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Trojan Horse</em>
A trojan horse is unlike a virus or a worm because it cannot replicate itself, according to spamlaws.com. Instead, it executes itself, and the execution of the file can install additional forms of malware, such as viruses or worms. It can also delete files, eliminate access to specific websites and damage files on the computer.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li class='sidebar_service_space'> </li>
</ul>
<span id='sidebar_contactus'>Contact Us</span>
<span id='sidebar_findus'>Find Us</span>
<hr />
<div id='sidebar_quote'>
<div id='sidebar_quote_text'>This is a small quote about someone loving who we are and what we do so they are praising us cuz well we are awesome.</div>
</div>
<div id='sidebar_quote_arrow'>
<div id='sidebar_quote_cite'>
Steven Hawkings
Intelectual Badass
<a href='#'>hiswebsite</a>
</div>
</div>
</div>");
$city = mysqli_real_escape_string($cnx, $city);
/* this query with escaped $city will work */
if (mysqli_query($cnx, "INSERT into services (template_name, template_code) VALUES (sidebar_malware, '$city')")) {
printf('%d Row inserted.\n', mysqli_affected_rows($cnx));
}
mysqli_close($cnx);
?>发布于 2012-06-19 17:41:50
值中的测试字符串必须用引号括起来,请用引号将模板名称值括起来
if (mysqli_query($cnx, "INSERT into services (template_name, template_code) VALUES ('sidebar_malware', '$city')")) {查看如何输出mysql错误,它们将帮助您调试此问题。
发布于 2012-06-19 18:14:19
使用htmlentities($city);
它将转换标签<a>, <img>, <b>,..转换为HTML实体。
https://stackoverflow.com/questions/11098303
复制相似问题