Grakle 0 Denunciar post Postado Julho 30, 2004 como faço pra tira essis warning?!! por favor alguem ae!! olha ae como fica CLANHI :o :o Compartilhar este post Link para o post Compartilhar em outros sites
walace 1 Denunciar post Postado Julho 30, 2004 Mostre o codigo. Compartilhar este post Link para o post Compartilhar em outros sites
Grakle 0 Denunciar post Postado Julho 30, 2004 session.php <?php/*************************************************************************** * sessions.php * ------------------- * begin : Saturday, Feb 13, 2001 * copyright : (C) 2001 The phpBB Group * email : support@phpbb.com * * $Id: sessions.php,v 1.58.2.10 2003/04/05 12:04:33 acydburn Exp $ * * ***************************************************************************//**************************************************************************** phpbb2 forums port version 2.0.5 (c) 2003 - Nuke Cops (http://nukecops.com)** Ported by Nuke Cops to phpbb2 standalone 2.0.5 Test* and debugging completed by the Elite Nukers and site members.** You run this package at your sole risk. Nuke Cops and affiliates cannot* be held liable if anything goes wrong. You are advised to test this* package on a development system. Backup everything before implementing* in a production environment. If something goes wrong, you can always* backout and restore your backups.** Installing and running this also means you agree to the terms of the AUP* found at Nuke Cops.** This is version 2.0.5 of the phpbb2 forum port for PHP-Nuke. Work is based* on Tom Nitzschner's forum port version 2.0.6. Tom's 2.0.6 port was based* on the phpbb2 standalone version 2.0.3. Our version 2.0.5 from Nuke Cops is* now reflecting phpbb2 standalone 2.0.5 that fixes some bugs and the* invalid_session error message.***************************************************************************//*************************************************************************** * This file is part of the phpBB2 port to Nuke 6.0 (c) copyright 2002 * by Tom Nitzschner (tom@toms-home.com) * http://bbtonuke.sourceforge.net (or http://www.toms-home.com) * * As always, make a backup before messing with anything. All code * release by me is considered sample code only. It may be fully * functual, but you use it at your own risk, if you break it, * you get to fix it too. No waranty is given or implied. * * Please post all questions/request about this port on http://bbtonuke.sourceforge.net first, * then on my site. All original header code and copyright messages will be maintained * to give credit where credit is due. If you modify this, the only requirement is * that you also maintain all original copyright messages. All my work is released * under the GNU GENERAL PUBLIC LICENSE. Please see the README for more information. * ***************************************************************************//*************************************************************************** * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * ***************************************************************************///// Adds/updates a new session to the database for the given userid.// Returns the new session ID on success.//function session_begin($user_id, $user_ip, $page_id, $auto_create = 0, $enable_autologin = 0){ global $db, $board_config; global $HTTP_COOKIE_VARS, $HTTP_GET_VARS, $SID; $cookiename = $board_config['cookie_name']; $cookiepath = $board_config['cookie_path']; $cookiedomain = $board_config['cookie_domain']; $cookiesecure = $board_config['cookie_secure']; if ( isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) || isset($HTTP_COOKIE_VARS[$cookiename . '_data']) ) { $session_id = isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) ? $HTTP_COOKIE_VARS[$cookiename . '_sid'] : ''; $sessiondata = isset($HTTP_COOKIE_VARS[$cookiename . '_data']) ? unserialize(stripslashes($HTTP_COOKIE_VARS[$cookiename . '_data'])) : array(); $sessionmethod = SESSION_METHOD_COOKIE; } else { $sessiondata = array(); $session_id = ( isset($HTTP_GET_VARS['sid']) ) ? $HTTP_GET_VARS['sid'] : ''; $sessionmethod = SESSION_METHOD_GET; } $last_visit = 0; $current_time = time(); $expiry_time = $current_time - $board_config['session_length']; // // Try and pull the last time stored in a cookie, if it exists // $sql = "SELECT * FROM " . USERS_TABLE . " WHERE user_id = '$user_id'"; if ( !($result = $db->sql_query($sql)) ) { message_die(CRITICAL_ERROR, 'Could not obtain lastvisit data from user table', '', __LINE__, __FILE__, $sql); } $userdata = $db->sql_fetchrow($result); if ( $user_id != ANONYMOUS ) { $auto_login_key = $userdata['user_password']; if ( $auto_create ) { if ( isset($sessiondata['autologinid']) && $userdata['user_active'] ) { // We have to login automagically if( $sessiondata['autologinid'] == $auto_login_key ) { // autologinid matches password $login = 1; $enable_autologin = 1; } else { // No match; don't login, set as anonymous user $login = 0; $enable_autologin = 0; $user_id = $userdata['user_id'] = ANONYMOUS; } } else { // Autologin is not set. Don't login, set as anonymous user $login = 0; $enable_autologin = 0; $user_id = $userdata['user_id'] = ANONYMOUS; } } else { $login = 1; } } else { $login = 0; $enable_autologin = 0; } // // Initial ban check against user id, IP and email address // preg_match('/(..)(..)(..)(..)/', $user_ip, $user_ip_parts); $sql = "SELECT ban_ip, ban_userid, ban_email FROM " . BANLIST_TABLE . " WHERE ban_ip IN ('" . $user_ip_parts[1] . $user_ip_parts[2] . $user_ip_parts[3] . $user_ip_parts[4] . "', '" . $user_ip_parts[1] . $user_ip_parts[2] . $user_ip_parts[3] . "ff', '" . $user_ip_parts[1] . $user_ip_parts[2] . "ffff', '" . $user_ip_parts[1] . "ffffff') OR ban_userid = '$user_id'"; if ( $user_id != ANONYMOUS ) { $sql .= " OR ban_email LIKE '" . str_replace("\'", "''", $userdata['user_email']) . "' OR ban_email LIKE '" . substr(str_replace("\'", "''", $userdata['user_email']), strpos(str_replace("\'", "''", $userdata['user_email']), "@")) . "'"; } if ( !($result = $db->sql_query($sql)) ) { message_die(CRITICAL_ERROR, 'Could not obtain ban information', '', __LINE__, __FILE__, $sql); } if ( $ban_info = $db->sql_fetchrow($result) ) { if ( $ban_info['ban_ip'] || $ban_info['ban_userid'] || $ban_info['ban_email'] ) { message_die(CRITICAL_MESSAGE, 'You_been_banned'); } } // // Create or update the session // $sql = "UPDATE " . SESSIONS_TABLE . " SET session_user_id = $user_id, session_start = $current_time, session_time = $current_time, session_page = $page_id, session_logged_in = $login WHERE session_id = '" . $session_id . "' AND session_ip = '$user_ip'"; if ( !$db->sql_query($sql) || !$db->sql_affectedrows() ) { $session_id = md5(uniqid($user_ip)); $sql = "INSERT INTO " . SESSIONS_TABLE . " (session_id, session_user_id, session_start, session_time, session_ip, session_page, session_logged_in) VALUES ('$session_id', '$user_id', '$current_time', '$current_time', '$user_ip', '$page_id', '$login')"; if ( !$db->sql_query($sql) ) { $error = TRUE; if (SQL_LAYER == "mysql" || SQL_LAYER == "mysql4") { $sql_error = $db->sql_error($result); if ($sql_error["code"] == 1114) { $result = $db->sql_query('SHOW TABLE STATUS LIKE "'.SESSIONS_TABLE.'"'); $row = $db->sql_fetchrow($result); if ($row["Type"] == "HEAP") { if ($row["Rows"] > 2500) { $delete_order = (SQL_LAYER=="mysql4") ? " ORDER BY session_time ASC" : ""; $db->sql_query("DELETE QUICK FROM ".SESSIONS_TABLE."$delete_order LIMIT 50"); } else { $db->sql_query("ALTER TABLE ".SESSIONS_TABLE." MAX_ROWS=".($row["Rows"]+50)); } if ($db->sql_query($sql)) { $error = FALSE; } } } } if ($error) { message_die(CRITICAL_ERROR, "Error creating new session", "", __LINE__, __FILE__, $sql); } } } if ( $user_id != ANONYMOUS ) {// ( $userdata['user_session_time'] > $expiry_time && $auto_create ) ? $userdata['user_lastvisit'] : ( $last_visit = ( $userdata['user_session_time'] > 0 ) ? $userdata['user_session_time'] : $current_time; $sql = "UPDATE " . USERS_TABLE . " SET user_session_time = $current_time, user_session_page = $page_id, user_lastvisit = $last_visit WHERE user_id = '$user_id'"; if ( !$db->sql_query($sql) ) { message_die(CRITICAL_ERROR, 'Error updating last visit time', '', __LINE__, __FILE__, $sql); } $userdata['user_lastvisit'] = $last_visit; $sessiondata['autologinid'] = ( $enable_autologin && $sessionmethod == SESSION_METHOD_COOKIE ) ? $auto_login_key : ''; $sessiondata['userid'] = $user_id; } $userdata['session_id'] = $session_id; $userdata['session_ip'] = $user_ip; $userdata['session_user_id'] = $user_id; $userdata['session_logged_in'] = $login; $userdata['session_page'] = $page_id; $userdata['session_start'] = $current_time; $userdata['session_time'] = $current_time; setcookie($cookiename . '_data', serialize($sessiondata), $current_time + 31536000, $cookiepath, $cookiedomain, $cookiesecure); setcookie($cookiename . '_sid', $session_id, 1, $cookiepath, $cookiedomain, $cookiesecure); $SID = ( $sessionmethod == SESSION_METHOD_GET ) ? 'sid=' . $session_id : ''; return $userdata;}//// Checks for a given user session, tidies session table and updates user// sessions at each page refresh//function session_pagestart($user_ip, $thispage_id, $nukeuser){ global $db, $lang, $board_config, $session_id; global $HTTP_COOKIE_VARS, $HTTP_GET_VARS, $SID; $cookiename = $board_config['cookie_name']; $cookiepath = $board_config['cookie_path']; $cookiedomain = $board_config['cookie_domain']; $cookiesecure = $board_config['cookie_secure']; $current_time = time(); unset($userdata); if ( isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) || isset($HTTP_COOKIE_VARS[$cookiename . '_data']) ) { $sessiondata = isset( $HTTP_COOKIE_VARS[$cookiename . '_data'] ) ? unserialize(stripslashes($HTTP_COOKIE_VARS[$cookiename . '_data'])) : array(); $session_id = isset( $HTTP_COOKIE_VARS[$cookiename . '_sid'] ) ? $HTTP_COOKIE_VARS[$cookiename . '_sid'] : ''; $sessionmethod = SESSION_METHOD_COOKIE; } else { $sessiondata = array(); $session_id = ( isset($HTTP_GET_VARS['sid']) ) ? $HTTP_GET_VARS['sid'] : ''; $sessionmethod = SESSION_METHOD_GET; } if ( ($nukeuser != "") && ($userdata['session_logged_in'] == "" )) { bblogin($nukeuser, $session_id); } else { $sessiondata = array(); } // // Does a session exist? // if ( !empty($session_id) ) { // // session_id exists so go ahead and attempt to grab all // data in preparation // $sql = "SELECT u.*, s.* FROM " . SESSIONS_TABLE . " s, " . USERS_TABLE . " u WHERE s.session_id = '$session_id' AND u.user_id = s.session_user_id"; if ( !($result = $db->sql_query($sql)) ) { message_die(CRITICAL_ERROR, 'Error doing DB query userdata row fetch', '', __LINE__, __FILE__, $sql); } $userdata = $db->sql_fetchrow($result); // // Did the session exist in the DB? // if ( isset($userdata['user_id']) ) { // // Do not check IP assuming equivalence, if IPv4 we'll check only first 24 // bits ... I've been told (by vHiker) this should alleviate problems with // load balanced et al proxies while retaining some reliance on IP security. // $ip_check_s = substr($userdata['session_ip'], 0, 6); $ip_check_u = substr($user_ip, 0, 6); if ($ip_check_s == $ip_check_u) { $SID = ($sessionmethod == SESSION_METHOD_GET || defined('IN_ADMIN')) ? 'sid=' . $session_id : ''; // // Only update session DB a minute or so after last update // if ( $current_time - $userdata['session_time'] > 60 ) { $sql = "UPDATE " . SESSIONS_TABLE . " SET session_time = '$current_time', session_page = '$thispage_id' WHERE session_id = '" . $userdata['session_id'] . "'"; if ( !$db->sql_query($sql) ) { message_die(CRITICAL_ERROR, 'Error updating sessions table', '', __LINE__, __FILE__, $sql); } if ( $userdata['user_id'] != ANONYMOUS ) { $sql = "UPDATE " . USERS_TABLE . " SET user_session_time = '$current_time', user_session_page = '$thispage_id' WHERE user_id = " . $userdata['user_id']; if ( !$db->sql_query($sql) ) { message_die(CRITICAL_ERROR, 'Error updating sessions table', '', __LINE__, __FILE__, $sql); } } // // Delete expired sessions // $expiry_time = $current_time - $board_config['session_length']; $sql = "DELETE FROM " . SESSIONS_TABLE . " WHERE session_time < '$expiry_time' AND session_id <> '$session_id'"; if ( !$db->sql_query($sql) ) { message_die(CRITICAL_ERROR, 'Error clearing sessions table', '', __LINE__, __FILE__, $sql); } setcookie($cookiename . '_data', serialize($sessiondata), $current_time + 31536000, $cookiepath, $cookiedomain, $cookiesecure); setcookie($cookiename . '_sid', $session_id, 0, $cookiepath, $cookiedomain, $cookiesecure); } return $userdata; } } } // // If we reach here then no (valid) session exists. So we'll create a new one, // using the cookie user_id if available to pull basic user prefs. // $user_id = ( isset($sessiondata['userid']) ) ? intval($sessiondata['userid']) : ANONYMOUS; if ( !($userdata = session_begin($user_id, $user_ip, $thispage_id, TRUE)) ) { message_die(CRITICAL_ERROR, 'Error creating user session', '', __LINE__, __FILE__, $sql); } return $userdata;}//// session_end closes out a session// deleting the corresponding entry// in the sessions table//function session_end($session_id, $user_id){ global $db, $lang, $board_config; global $HTTP_COOKIE_VARS, $HTTP_GET_VARS, $SID; $cookiename = $board_config['cookie_name']; $cookiepath = $board_config['cookie_path']; $cookiedomain = $board_config['cookie_domain']; $cookiesecure = $board_config['cookie_secure']; $current_time = time(); // // Pull cookiedata or grab the URI propagated sid // if ( isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) ) { $session_id = isset( $HTTP_COOKIE_VARS[$cookiename . '_sid'] ) ? $HTTP_COOKIE_VARS[$cookiename . '_sid'] : ''; $sessionmethod = SESSION_METHOD_COOKIE; } else { $session_id = ( isset($HTTP_GET_VARS['sid']) ) ? $HTTP_GET_VARS['sid'] : ''; $sessionmethod = SESSION_METHOD_GET; } // // Delete existing session // $sql = "DELETE FROM " . SESSIONS_TABLE . " WHERE session_id = '$session_id' AND session_user_id = '$user_id'"; if ( !$db->sql_query($sql) ) { message_die(CRITICAL_ERROR, 'Error removing user session', '', __LINE__, __FILE__, $sql); } setcookie($cookiename . '_data', '', $current_time - 31536000, $cookiepath, $cookiedomain, $cookiesecure); setcookie($cookiename . '_sid', '', $current_time - 31536000, $cookiepath, $cookiedomain, $cookiesecure); return true;}//// Append $SID to a url. Borrowed from phplib and modified. This is an// extra routine utilised by the session code above and acts as a wrapper// around every single URL and form action. If you replace the session// code you must include this routine, even if it's empty.//function append_sid($url, $non_html_amp = false){ global $SID, $admin; if (ereg("admin=1", $url) || ereg("admin_", $url) || ereg("pane=", $url)){ // The format is fine, don't change a thing. } else if (ereg("Your_Account", $url)){ $url = str_replace(".php", "", $url); // Strip the .php from all the files, $url = str_replace("modules", "modules.php", $url); // and put it back for the modules.php } else if (ereg("redirect", $url)) { $url = str_replace("login.php", "modules.php?name=Your_Account", $url); // Strip the .php from all the files, $url = str_replace(".php", "", $url); // Strip the .php from all the files, $url = str_replace("?redirect", "&redirect", $url); // Strip the .php from all the files, $url = str_replace("modules", "modules.php", $url); // and put it back for the modules.php } else if (ereg("menu=1", $url)) { $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to & $url = str_replace(".php", "", $url); // Strip the .php from all the files, $url = "../../../modules.php?name=Forums&file=$url"; } else if ((ereg("privmsg", $url)) && (!ereg("highlight=privmsg", $url))) { $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to & $url = str_replace("privmsg.php", "modules.php?name=Private_Messages&file=index", $url); // and put it back for the modules.php } else if ((ereg("profile", $url)) && (!ereg("highlight=profile", $url))) { $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to & $url = str_replace("profile.php", "modules.php?name=Forums&file=profile", $url); // and put it back for the modules.php $dummy = 1; } else if ((ereg("memberlist", $url)) && (!ereg("highlight=memberlist", $url))) { $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to & $url = str_replace("memberlist.php", "modules.php?name=Members_List&file=index", $url); // and put it back for the modules.php } else { $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to & $url = str_replace(".php", "", $url); $url = "modules.php?name=Forums&file=".$url; //Change to Nuke format } if ( !empty($SID) && !eregi('sid=', $url) && !areyouabot() ) { if ( !empty($SID) && !eregi('sid=', $url) ) { $url .= ( ( strpos($url, '?') != false ) ? ( ( $non_html_amp ) ? '&' : '&' ) : '?' ) . $SID; } } return($url);}function areyouabot(){global $HTTP_SERVER_VARS; $RobotsList = array ( "antibot", "appie", "architext", "bjaaland", "digout4u", "echo", "fast-webcrawler", "ferret", "googlebot", "gulliver", "harvest", "htdig", "ia_archiver", "jeeves", "jennybot", "linkwalker", "lycos", "mercator", "moget", "muscatferret", "myweb", "netcraft", "nomad", "petersnews", "scooter", "slurp", "unlost_web_crawler", "voila", "voyager", "webbase", "weblayers", "wget", "wisenutbot", "acme.spider", "ahoythehomepagefinder", "alkaline", "arachnophilia", "aretha", "ariadne", "arks", "aspider", "atn.txt", "atomz", "auresys", "backrub", "bigbrother", "blackwidow", "blindekuh", "bloodhound", "brightnet", "bspider", "cactvschemistryspider", "cassandra", "cgireader", "checkbot", "churl", "cmc", "collective", "combine", "conceptbot", "coolbot", "core", "cosmos", "cruiser", "cusco", "cyberspyder", "deweb", "dienstspider", "digger", "diibot", "directhit", "dnabot", "download_express", "dragonbot", "dwcp", "e-collector", "ebiness", "eit", "elfinbot", "emacs", "emcspider", "esther", "evliyacelebi", "nzexplorer", "fdse", "felix", "fetchrover", "fido", "finnish", "fireball", "fouineur", "francoroute", "freecrawl", "funnelweb", "gama", "gazz", "gcreep", "getbot", "geturl", "golem", "grapnel", "griffon", "gromit", "hambot", "havindex", "hometown", "htmlgobble", "hyperdecontextualizer", "iajabot", "ibm", "iconoclast", "ilse", "imagelock", "incywincy", "informant", "infoseek", "infoseeksidewinder", "infospider", "inspectorwww", "intelliagent", "irobot", "iron33", "israelisearch", "javabee", "jbot", "jcrawler", "jobo", "jobot", "joebot", "jubii", "jumpstation", "katipo", "kdd", "kilroy", "ko_yappo_robot", "labelgrabber.txt", "larbin", "legs", "linkidator", "linkscan", "lockon", "logo_gif", "macworm", "magpie", "marvin", "mattie", "mediafox", "merzscope", "meshexplorer", "mindcrawler", "momspider", "monster", "motor", "mwdsearch", "netcarta", "netmechanic", "netscoop", "newscan-online", "nhse", "northstar", "occam", "octopus", "openfind", "orb_search", "packrat", "pageboy", "parasite", "patric", "pegasus", "perignator", "perlcrawler", "phantom", "piltdownman", "pimptrain", "pioneer", "pitkow", "pjspider", "pka", "plumtreewebaccessor", "poppi", "portalb", "puu", "python", "raven", "rbse", "resumerobot", "rhcs", "roadrunner", "robbie", "robi", "robofox", "robozilla", "roverbot", "rules", "safetynetrobot", "search_au", "searchprocess", "senrigan", "sgscout", "shaggy", "shaihulud", "sift", "simbot", "site-valet", "sitegrabber", "sitetech", "slcrawler", "smartspider", "snooper", "solbot", "spanner", "speedy", "spider_monkey", "spiderbot", "spiderline", "spiderman", "spiderview", "spry", "ssearcher", "suke", "suntek", "sven", "tach_bw", "tarantula", "tarspider", "techbot", "templeton", "teoma_agent1", "titin", "titan", "tkwww", "tlspider", "ucsd", "udmsearch", "urlck", "valkyrie", "victoria", "visionsearch", "vwbot", "w3index", "w3m2", "wallpaper", "wanderer", "wapspider", "webbandit", "webcatcher", "webcopy", "webfetcher", "webfoot", "weblinker", "webmirror", "webmoose", "webquest", "webreader", "webreaper", "websnarf", "webspider", "webvac", "webwalk", "webwalker", "webwatch", "whatuseek", "whowhere", "wired-digital", "wmir", "wolp", "wombat", "worm", "wwwc", "wz101", "xget", "awbot", "bobby", "boris", "bumblebee", "cscrawler", "daviesbot", "ezresult", "gigabot", "gnodspider", "internetseer", "justview", "linkbot", "linkchecker", "nederland.zoek", "perman", "pompos", "psbot", "redalert", "shoutcast", "slysearch", "ultraseek", "webcompass", "yandex", "robot", "crawl" ); $botID = strtolower($HTTP_SERVER_VARS['HTTP_USER_AGENT']); for ($i = 0; $i < count($RobotsList); $i++) { if ( strstr($botID, $RobotsList[$i]) ) { return TRUE; } } return FALSE;}function admin_sid($url, $non_html_amp = false){ global $SID; $url = "../../../modules.php?name=Forums&file=$url"; if ( !empty($SID) && !preg_match('#sid=#', $url) ) { $url .= ( ( strpos($url, '?') != false ) ? ( ( $non_html_amp ) ? '&' : '&' ) : '?' ) . $SID; } return $url;}?> page_header Compartilhar este post Link para o post Compartilhar em outros sites
vedovatto 0 Denunciar post Postado Julho 30, 2004 Ae maluco, tenta trocar o tema do seu phpnuke ai, parece que ta dando pau em uma das configurações dele, põe o original e testa, se aparecer o erro novamente de uma olhada nos módulos que sao colocados naquele espaço, pode ser que tu presise reinstalá-los :) Compartilhar este post Link para o post Compartilhar em outros sites
michelsp 0 Denunciar post Postado Julho 30, 2004 Isto tbm deve ocorrer no módulo de Mensagens Privadas, ñ? Então, você faz assim, no, ñ tenho certeza, mas acho q é este msm, header.php, depois do <? você coloca: 'ob_start();', q deve resolver todos estes prob's em seu site. Flwwwwwwwwww Compartilhar este post Link para o post Compartilhar em outros sites
Grakle 0 Denunciar post Postado Julho 30, 2004 como assim velho faz ae tipo um exemplo! Compartilhar este post Link para o post Compartilhar em outros sites
michelsp 0 Denunciar post Postado Julho 30, 2004 header.php, depois do <? você coloca: 'ob_start();',Le oq eu disse q já ta explicado!!!!Flwwwwwwwwwwwwww Compartilhar este post Link para o post Compartilhar em outros sites
Grakle 0 Denunciar post Postado Julho 30, 2004 O valeu velho! valeu mesmo! vo ve la! Compartilhar este post Link para o post Compartilhar em outros sites
Grakle 0 Denunciar post Postado Julho 30, 2004 Ow eu fiz isso a la,amd deu parse erro" na on-line 2 q era o 'ob_start();',i agora oq fasso? Compartilhar este post Link para o post Compartilhar em outros sites
michelsp 0 Denunciar post Postado Julho 30, 2004 PHP [/tr][tr]ob_start();[/tr] Sem as '. Flwwwwwwwwwwwwwww Compartilhar este post Link para o post Compartilhar em outros sites
Grakle 0 Denunciar post Postado Julho 30, 2004 O deu certo! valu velho! eheheheeh legal! vaeu mesmo! Compartilhar este post Link para o post Compartilhar em outros sites
michelsp 0 Denunciar post Postado Julho 31, 2004 http://forum.imasters.com.br/public/style_emoticons/default/clap.gif Compartilhar este post Link para o post Compartilhar em outros sites