Welcome to the Treehouse Community

The Treehouse Community is a meeting place for developers, designers, and programmers of all backgrounds and skill levels to get support. Collaborate here on code errors or bugs that you need feedback on, or asking for an extra set of eyes on your latest project. Join thousands of Treehouse students and alumni in the community today. (Note: Only Treehouse students can comment or ask questions, but non-students are welcome to browse our conversations.)

Looking to learn something new?

Treehouse offers a seven day free trial for new students. Get access to thousands of hours of content and a supportive community. Start your free trial today.

PHP Build a Basic PHP Website (2018) Adding a Basic Form Validating Form Data

Aaron Uusitalo
Aaron Uusitalo
4,229 Points

Does she actually tell us what kind of attacks she referencing at 6:46?

I've re watched the video a couple of times and looked through the transcripts. Around 6:46 she implies that she has discussed two kinds of attacks, one being more serious and the other spamming.

Logically I have to assume that the first attack is a script injection of some sort, since we're filtering out special characters.

Doe she explicitly discuss these attacks anywhere else?

1 Answer

Jennifer Nordell
seal-mask
STAFF
.a{fill-rule:evenodd;}techdegree
Jennifer Nordell
Treehouse Teacher

Hi there, Aaron Uusitalo ! Actually, this is discussed later a bit more in depth in this video. The course you're currently viewing is a "Beginner" level course. The course I linked is an "Intermediate" level course. Many people who come to Treehouse have no background whatsoever in computers/tech and would likely be baffled by that information. I believe the idea here was to introduce it in such a way as to not overwhelm a true beginner.

Hope this helps! :sparkles: