Actually i made it for a friend first, and i knew he would change the title to like "Lindoz12(khui) sucks" so i encrypted the title with base64 basically.
You can decrypt it by googling Base64 decrypter, enter a page and take the content of the variable $str2 i think it was and paste it, or you could just set up a basic base64_decrypt script yourself in a few seconds by making a new file and making the end to .php.
Insert the following code into the file:
<?php
$decryption = base64_decrypt("*the content of $str2 here*");
echo $decryption;
?>
Thanks to all of you, i hope you enjoy.
Release for Mangos?
No, this is for Arc / Aspire HS, I also dislike MaNGOS so I do not release anything that is for MaNGOS so my version that I am making will not support MaNGOS.
<3
Thx alot +rep for you
Lol nice release but you asked for +Rep which in term means -Rep =(
sorry but no one reps someone who asks for rep
Lunar Gaming - Reaching For The Stars
nice one and great idea! thank you +3 Rep
awesome thread![]()
oke!
ty! +rep
sorry for the duble post!
If you want it for mangos i's just a few small changes, not too hard, I'm not sure but i think its even possible by just changing the character and mailbox tables in the config
This is terribly dangerous to use on a server. Aside from the fact you aren't checking GM accounts, SQL injection would be easy as well. For example, if I enter the following in the item ID field your mail table would be dropped from the database.
Why does this work? Lets look at your query.Code:0');DROP TABLE mailbox_insert_queue; --
What would it look like if I entered the above?Code:("INSERT INTO" .$mailbox_queue. " VALUES ('$charID', '$charID', '$subject', '$text', '62', '0', '$itemid', '0')
Code:("INSERT INTO" .$mailbox_queue. " VALUES ('$charID', '$charID', '$subject', '$text', '62', '0', '0');DROP TABLE mailbox_insert_queue; --', '0')
At least use PHP: mysql_real_escape_string - Manual if you're going to be inserting things into the database. This isn't entirely secure, but it's certainly more than you have here. I'd also recommend reading the following.
http://dev.mysql.com/tech-resources/...curity-ch3.pdf