gpt4 book ai didi

PHP MYSQL 将HTML插入MYSQL数据库

转载 作者:行者123 更新时间:2023-11-30 23:30:10 25 4
gpt4 key购买 nike

如何将 html 代码存储在 mysql 数据库中?我到处都能找到人们可以做到的地方,但没人说怎么做。我知道我需要使用示例中的“mysqli_real_escape_string”来剥离数据,但不知道如何实际操作。我只是简单地放置了如下所示的代码,但它只是让我犯了一个错误。我知道它是因为 HTML 代码有“”,但我需要在页面加载时加载这些代码,所以我如何将代码插入数据库?一个链接或其他东西会很棒。

编辑:这是完整的代码,它没有将信息输入数据库,但没有给出任何错误。

<?php
include_once('global.php');

$city = ("<div id='body_sidebar'>
<ul>
<li class='sidebar_service_space'>&nbsp;</li>
<li class='sidebar_service_title'>About Malware</li>
<li><a href='<?php echo '$home' ?>/services/malware/what-is-malware.html'>What is Malware?</a></li>
<li><a href='<?php echo '$home' ?>/services/malware/common-signs.html'>Common Signs of Malware</a></li>
<li class='sidebar_service_space'>&nbsp;</li>

<li class='sidebar_service_title'>Malware Removal</li>
<li><a href='<?php echo '$home' ?>/services/malware/virus-removal.html'>Virus Removal</a>
<a class='tooltip' href='/knowledge_base/virus_removal.php'><img id='viruses' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Viruses</em>
The computer virus is the most infamous form of malware. It is a self replicating program that infects a system without authorization. Once installed, it will execute itself, infect system files, and attempt to propagate to other systems. The impact of a virus ranges widely from slow system performance to wiping out every file on your computer. <br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

<li><a href='<?php echo '$home' ?>/services/malware/worm-removal.html'>Worm Removal</a>
<a class='tooltip' href='/knowledge_base/worm_removal.html'><img id='worm' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Worms</em>
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to
other computers on the network and it may do so without any user intervention. Worms usually exploit a
known or zero-day vulnerability that allows them to execute their copies on computers on the same
network.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

<li><a href='<?php echo '$home' ?>/services/malware/adware-removal.html'>Adware Removal</a>
<a class='tooltip' href='/knowledge_base/adware_removal.html'><img id='adware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Adware</em>
Adware is a program that causes the host computer to display advertisements that the user did not request. These are frequently in the form of pop-up ads that appear while browsing the Internet and pop-under ads that open in a window hidden beneath the Internet browser's window, according to security4web.com. Another version of adware is a toolbar that attaches to an Internet browser search ability.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

<li><a href='<?php echo '$home' ?>/services/malware/spyware-removal.html'>Spyware Removal</a>
<a class='tooltip' href='/knowledge_base/spyware_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Spyware</em>
Spyware collects information from a host computer and sends it to the creator of the program. Spyware can infect a computer as a result of surfing a website that installs it or even as part of programs a user knowingly downloads to use for a different purpose, according to security4web.com. The website notes that freeware (free software) and Internet links advertising spyware-removal programs frequently install spyware.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

<li><a href='<?php echo '$home' ?>/services/malware/rootkit-removal.html'>Rootkit Removal</a>
<a class='tooltip' href='/knowledge_base/rootkit_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Rootkit</em>
Rootkits can make it difficult to discover that your computer has been infected by other types of malware. According to h-online.com, a rootkit manipulates files so they are difficult to discover on your computer. This makes it a challenge to find out if a malware process or file is running in the background on your computer because a rootkit program may be preventing you from finding it by browsing folders or searching on your computer file system.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

<li><a href='<?php echo '$home' ?>/services/malware/trojan-removal.html'>Trojan Horse Removal</a>
<a class='tooltip' href='/knowledge_base/trojan_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
<span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
<em>Trojan Horse</em>
A trojan horse is unlike a virus or a worm because it cannot replicate itself, according to spamlaws.com. Instead, it executes itself, and the execution of the file can install additional forms of malware, such as viruses or worms. It can also delete files, eliminate access to specific websites and damage files on the computer.<br /><br />
<font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
<li class='sidebar_service_space'>&nbsp;</li>
</ul>
<span id='sidebar_contactus'>Contact Us</span>
<span id='sidebar_findus'>Find Us</span>
<hr />
<div id='sidebar_quote'>
<div id='sidebar_quote_text'>This is a small quote about someone loving who we are and what we do so they are praising us cuz well we are awesome.</div>
</div>
<div id='sidebar_quote_arrow'>
<div id='sidebar_quote_cite'>
Steven Hawkings
Intelectual Badass
<a href='#'>hiswebsite</a>
</div>
</div>

</div>");

$city = mysqli_real_escape_string($cnx, $city);

/* this query with escaped $city will work */
if (mysqli_query($cnx, "INSERT into services (template_name, template_code) VALUES (sidebar_malware, '$city')")) {
printf('%d Row inserted.\n', mysqli_affected_rows($cnx));
}

mysqli_close($cnx);
?>

最佳答案

VALUES 中的测试字符串必须用引号括起来,用引号将您的模板名称值括起来

if (mysqli_query($cnx, "INSERT into services (template_name, template_code) VALUES ('sidebar_malware', '$city')")) {

查看如何输出 mysql 错误,他们将帮助您调试此问题。

关于PHP MYSQL 将HTML插入MYSQL数据库,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/11098303/

25 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com