Author Topic: Community Miner V1 - It's slow! It's awful!  (Read 1524 times)

Well, short of migrating this to a Java applet - which I may do - I'm not sure how well that could work.

I could use Javascript, but it would still have speed problems.

Umm. Why did i get this error.
Quote
XSS bitch whore.

Because you tried to forget with it.

You might have tried to go to "move.php" manually.

lol

Because you tried to forget with it.

You might have tried to go to "move.php" manually.

lol
no, I guess i clicked back or something too much.

Yep, that would do it. lol

Anyways, making some BIG changes in next version, I hope. :D

http://www.sterlingvitcov.com/communityminer/move.php

LOL. You obviously have no idea what XSS is. I didn't even input anything.

why cant you move if you're in the top 5 turns ;_;

http://www.sterlingvitcov.com/communityminer/move.php

LOL. You obviously have no idea what XSS is. I didn't even input anything.

XSS is cross-site scripting. Take, for example, my <select> control that has values of up, down, left, or right. It's called "move".
I could hypothetically create my own HTML form that sends post data called "move" with a value of "sukmydik".
That would be XSS.

There is no reason for any non-malicious user to access that page without sending valid post data. The most likely reason for invalid post data is then XSS.

Not sure where the problem is?

XSS is cross-site scripting. Take, for example, my <select> control that has values of up, down, left, or right. It's called "move".
I could hypothetically create my own HTML form that sends post data called "move" with a value of "sukmydik".
That would be XSS.

There is no reason for any non-malicious user to access that page without sending valid post data. The most likely reason for invalid post data is then XSS.

Not sure where the problem is?
Maybe when you don't send any post data at all, instead of insulting the user, just don't display anything. If you don't send any post data then you're not trying to XSS, are you?
But, good lord did you seriously make that entire map out of a table? That seems like a horrible way to do it, but I'll honestly say I wouldn't know how to do it any other way. That's why it's so slow, because of the giant ass table.
Also when I visited the website someone was XSS attacking it. When I look at it now it looks like it's fixed. Good job.

Maybe when you don't send any post data at all, instead of insulting the user, just don't display anything. If you don't send any post data then you're not trying to XSS, are you?
I'm sorry my website hurt your feelings :/

But, good lord did you seriously make that entire map out of a table? That seems like a horrible way to do it, but I'll honestly say I wouldn't know how to do it any other way. That's why it's so slow, because of the giant ass table.
I know. It takes forever to echo it, <td> by <td>.
I'm thinking generating an image might be faster.

Also when I visited the website someone was XSS attacking it. When I look at it now it looks like it's fixed. Good job.
Actually, not XSS - I'd just forgotten to strip_tags.
But yeah, it's fixed now.

I'm sorry my website hurt your feelings :/
It didn't. I just think it's ridiculous to even say that.
I know. It takes forever to echo it, <td> by <td>.
I'm thinking generating an image might be faster.
Yeah, it would. When you generate an image, please be sure to use
Code: [Select]
imagedestroy( $my_img );after you're done with the image to allocate space, and to only generate a new image when a change has been made to the map to optimize the web application.
Actually, not XSS - I'd just forgotten to strip_tags.
But yeah, it's fixed now.
Yes it is. You don't even know what XSS is.
XSS is cross-site scripting. Take, for example, my <select> control that has values of up, down, left, or right. It's called "move".
I could hypothetically create my own HTML form that sends post data called "move" with a value of "sukmydik".
That would be XSS.
That's not XSS.
Cross-site scripting, or rather, XSS, is a type of vulnerability that can be found on web applications (Such as your miner game) that allows people to inject client-side script, which is generally malicious, into the page that is viewed by others.
Let's say I put <script>alert("Hi.");</script> into something that will then display it on the page without using anything to prevent XSS. That will make an alert window pop up that says "Hi." for everyone that visits the page. You can do plenty of more to the page such as embedding HTML into the page, redirecting to other pages, and even stealing someone's cookies from their browser. That is XSS.