On Wed, Jun 23, 2010 at 1:01 AM, Tommy Pham <tommy...@gmail.com> wrote:
> If you're going to implement this, then it's better to implement the > conversion in the backend DB (via SP or UDF). So you can always use MySQL > query browser or the command line to run queries or other methods depending > on your access to the DB, especially if you need to find that malicious IP > address quickly ;) -1 for complicating mysql setups :) -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php