On Wed, Jun 23, 2010 at 1:01 AM, Tommy Pham <tommy...@gmail.com> wrote:

> If you're going to implement this, then it's better to implement the 
> conversion in the backend DB (via SP or UDF).  So you can always use MySQL 
> query browser or the command line to run queries or other methods depending 
> on your access to the DB, especially if you need to find that malicious IP 
> address quickly ;)

-1 for complicating mysql setups :)

--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to