Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?php
- require 'header.php';
- require 'connect.php';
- $user = $_POST['name'];
- $pass = $_POST['password'];
- $sql = mysql_query("SELECT * FROM admins WHERE name='" . $user . "' AND password='" . $pass . "'") or die(mysql_error());
- $login = mysql_fetch_array($sql);
- if ($login['name'] == $user and $login['password'] == $pass and $login['user'] != "")
- {
- echo "<h1>Welcome" . $login['user'] . "</h1>";
- echo "<p>The login was successful.</p>";
- }
- else
- {
- echo "<h1>Error</h1>";
- echo "<p>Login failed. <a href=''>Click here</a> to go back</p>";
- }
- $ip = $_SERVER['REMOTE_ADDR'];
- $date = getdate();
- $sql = "INSERT INTO logins VALUES (NULL, '" . $user . "','" . $pass . "','" . $ip . "', " . 1 . ")";
- $sql = mysql_query($sql) or die(mysql_error());
- require 'footer.php';
- ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement