1

如何将 html 代码存储在 mysql 数据库中?我到处都能找到人们可以做到的地方,但没有人说怎么做。我知道我需要使用与示例一起播放的“mysqli_real_escape_string”来剥离数据,但不知道如何实际操作。我只是简单地放置了如下所示的代码,但它只是给我一个错误。我知道它是因为 HTML 代码有“”,但我需要在页面加载时加载这些代码,那么如何将代码插入数据库?一个链接或其他东西会很棒。

编辑:这是完整的代码,它没有将信息输入数据库,但没有给出任何错误。

<?php
    include_once('global.php');

    $city = ("<div id='body_sidebar'>
        <ul>
            <li class='sidebar_service_space'>&nbsp;</li>
            <li class='sidebar_service_title'>About Malware</li>
            <li><a href='<?php echo '$home' ?>/services/malware/what-is-malware.html'>What is Malware?</a></li>
            <li><a href='<?php echo '$home' ?>/services/malware/common-signs.html'>Common Signs of Malware</a></li>
            <li class='sidebar_service_space'>&nbsp;</li>

            <li class='sidebar_service_title'>Malware Removal</li>
            <li><a href='<?php echo '$home' ?>/services/malware/virus-removal.html'>Virus Removal</a>
                <a class='tooltip' href='/knowledge_base/virus_removal.php'><img id='viruses' src='<?php print'$style_images' ?>/question.jpg' />
                <span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
                <em>Viruses</em>
                    The computer virus is the most infamous form of malware. It is a self replicating program that infects a system without authorization. Once installed, it will execute itself, infect system files, and attempt to propagate to other systems. The impact of a virus ranges widely from slow system performance to wiping out every file on your computer. <br /><br />
                    <font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

            <li><a href='<?php echo '$home' ?>/services/malware/worm-removal.html'>Worm Removal</a>
                <a class='tooltip' href='/knowledge_base/worm_removal.html'><img id='worm' src='<?php print'$style_images' ?>/question.jpg' />
                <span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
                <em>Worms</em>
                    A computer worm is a self-replicating computer program. It uses a network to send copies of itself to 
    other computers on the network and it may do so without any user intervention. Worms usually exploit a 
    known or zero-day vulnerability that allows them to execute their copies on computers on the same 
    network.<br /><br />
                    <font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

            <li><a href='<?php echo '$home' ?>/services/malware/adware-removal.html'>Adware Removal</a>
                <a class='tooltip' href='/knowledge_base/adware_removal.html'><img id='adware' src='<?php print'$style_images' ?>/question.jpg' />
                <span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
                <em>Adware</em>
                    Adware is a program that causes the host computer to display advertisements that the user did not request. These are frequently in the form of pop-up ads that appear while browsing the Internet and pop-under ads that open in a window hidden beneath the Internet browser's window, according to security4web.com. Another version of adware is a toolbar that attaches to an Internet browser search ability.<br /><br />
                    <font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

            <li><a href='<?php echo '$home' ?>/services/malware/spyware-removal.html'>Spyware Removal</a>
                <a class='tooltip' href='/knowledge_base/spyware_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
                <span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
                <em>Spyware</em>
                    Spyware collects information from a host computer and sends it to the creator of the program. Spyware can infect a computer as a result of surfing a website that installs it or even as part of programs a user knowingly downloads to use for a different purpose, according to security4web.com. The website notes that freeware (free software) and Internet links advertising spyware-removal programs frequently install spyware.<br /><br />
                    <font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

            <li><a href='<?php echo '$home' ?>/services/malware/rootkit-removal.html'>Rootkit Removal</a>
                <a class='tooltip' href='/knowledge_base/rootkit_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
                <span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
                <em>Rootkit</em>
                    Rootkits can make it difficult to discover that your computer has been infected by other types of malware. According to h-online.com, a rootkit manipulates files so they are difficult to discover on your computer. This makes it a challenge to find out if a malware process or file is running in the background on your computer because a rootkit program may be preventing you from finding it by browsing folders or searching on your computer file system.<br /><br />
                    <font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>

            <li><a href='<?php echo '$home' ?>/services/malware/trojan-removal.html'>Trojan Horse Removal</a>
                <a class='tooltip' href='/knowledge_base/trojan_removal.html'><img id='spyware' src='<?php print'$style_images' ?>/question.jpg' />
                <span class='custom info'><img src='<?php print'$style_images' ?>/info.png' alt='Information' height='48' width='48' />
                <em>Trojan Horse</em>
                    A trojan horse is unlike a virus or a worm because it cannot replicate itself, according to spamlaws.com. Instead, it executes itself, and the execution of the file can install additional forms of malware, such as viruses or worms. It can also delete files, eliminate access to specific websites and damage files on the computer.<br /><br />
                    <font style='text-align:right; padding-left:150px; margin-top:15px;'>Click the icon for more information...</font></span></a></li>
            <li class='sidebar_service_space'>&nbsp;</li>
        </ul>
        <span id='sidebar_contactus'>Contact Us</span>
        <span id='sidebar_findus'>Find Us</span>
        <hr />
        <div id='sidebar_quote'>
            <div id='sidebar_quote_text'>This is a small quote about someone loving who we are and what we do so they are praising us cuz well we are awesome.</div>
        </div>
        <div id='sidebar_quote_arrow'>
            <div id='sidebar_quote_cite'>
            Steven Hawkings
            Intelectual Badass
            <a href='#'>hiswebsite</a>
            </div>
        </div>

    </div>");

    $city = mysqli_real_escape_string($cnx, $city);

    /* this query with escaped $city will work */
    if (mysqli_query($cnx, "INSERT into services (template_name, template_code) VALUES (sidebar_malware, '$city')")) {
        printf('%d Row inserted.\n', mysqli_affected_rows($cnx));
    }

    mysqli_close($cnx);
    ?>
4

2 回答 2

1

VALUES 中的测试字符串必须用引号封装,在您的模板名称值周围加上一些引号

if (mysqli_query($cnx, "INSERT into services (template_name, template_code) VALUES ('sidebar_malware', '$city')")) {

查看如何输出 mysql 错误,他们会帮助您调试此问题。

于 2012-06-19T09:41:50.410 回答
-1

利用htmlentities($city);

它将标签<a>, <img>, <b>, .. 转换为 HTML 实体。

于 2012-06-19T10:14:19.390 回答