<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Session &#8211; Blackbams Blog</title>
	<atom:link href="https://blog.blackbam.at/tag/session/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.blackbam.at</link>
	<description>development - digital arts - internet</description>
	<lastBuildDate>Wed, 05 Oct 2011 17:30:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
	<item>
		<title>Bypass usage of sessions by using $_POST and hidden fields with JSON</title>
		<link>https://blog.blackbam.at/2011/04/21/bypass-usage-of-sessions-by-using-post-and-hidden-fields-with-json/</link>
					<comments>https://blog.blackbam.at/2011/04/21/bypass-usage-of-sessions-by-using-post-and-hidden-fields-with-json/#respond</comments>
		
		<dc:creator><![CDATA[Blackbam]]></dc:creator>
		<pubDate>Thu, 21 Apr 2011 21:05:02 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[Web Development]]></category>
		<category><![CDATA[bypass sessions]]></category>
		<category><![CDATA[hidden fields]]></category>
		<category><![CDATA[json]]></category>
		<category><![CDATA[Session]]></category>
		<guid isPermaLink="false">https://blog.blackbam.at/?p=1326</guid>

					<description><![CDATA[Today we have been searching for an easy and fast way to store and reuse $_POST variables over 2 pages and more without using a session. This can save you a lot of work in some cases. This possiblity is completly browser based, so there is no need for the server to re-identify a user. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we have been searching for an easy and fast way to store and reuse $_POST variables over 2 pages and more without using a session. This can save you a lot of work in some cases. This possiblity is completly browser based, so there is no need for the server to re-identify a user.</p>
<p></p>
<p>Save $_POST or some other array to a hidden field by converting it to the JSON-format. Use URL-encode to make sure that there will be no encoding problems.</p>
<p></p>
<pre lang="html4strict">
<form method="post" action="">
<input type='hidden' name='post_saver' value='<?php echo urlencode(json_encode($_POST)); ?>' />
</form>
</pre>
<p>Decode the hidden-fields&#8217; value on the server-side. Replace the $_POST variables depending on your needs or take the new ones.</p>
<p></p>
<pre lang="php">
// We save previous POST values in the 'post_saver', to provide page navigation and so on
if(strlen($_POST['post_saver'])>0) {

	$previous_post_object = json_decode(urldecode($_POST['post_saver']));
	unset($_POST['post_saver']);
	
	foreach($previous_post_object as $pkey=>$pval) {
		if(strlen($_POST[$pkey]) <= 0) {
			$_POST[$pkey] = $pval;
		}
	}
}
</pre>
<p><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.blackbam.at%2F2011%2F04%2F21%2Fbypass-usage-of-sessions-by-using-post-and-hidden-fields-with-json%2F&#038;title=Bypass%20usage%20of%20sessions%20by%20using%20%24_POST%20and%20hidden%20fields%20with%20JSON" data-a2a-url="https://blog.blackbam.at/2011/04/21/bypass-usage-of-sessions-by-using-post-and-hidden-fields-with-json/" data-a2a-title="Bypass usage of sessions by using $_POST and hidden fields with JSON"><img src="https://static.addtoany.com/buttons/share_save_120_16.png" alt="Share"></a></p>]]></content:encoded>
					
					<wfw:commentRss>https://blog.blackbam.at/2011/04/21/bypass-usage-of-sessions-by-using-post-and-hidden-fields-with-json/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Secure Sessions with PHP</title>
		<link>https://blog.blackbam.at/2010/01/26/session-sicherheit-in-php/</link>
					<comments>https://blog.blackbam.at/2010/01/26/session-sicherheit-in-php/#comments</comments>
		
		<dc:creator><![CDATA[Blackbam]]></dc:creator>
		<pubDate>Tue, 26 Jan 2010 17:25:17 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Cookies]]></category>
		<category><![CDATA[Proxies]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[SESSID]]></category>
		<category><![CDATA[Session]]></category>
		<category><![CDATA[Session-ID]]></category>
		<category><![CDATA[Sessions]]></category>
		<category><![CDATA[Sicherheit]]></category>
		<category><![CDATA[Skript]]></category>
		<category><![CDATA[Snippet]]></category>
		<guid isPermaLink="false">http://www.blackbam.at/blog/?p=468</guid>

					<description><![CDATA[Sorry, this entry is only available in Deutsch.]]></description>
										<content:encoded><![CDATA[<p class="qtranxs-available-languages-message qtranxs-available-languages-message-en">Sorry, this entry is only available in <a href="https://blog.blackbam.at/de/tag/session/feed/" class="qtranxs-available-language-link qtranxs-available-language-link-de" title="Deutsch">Deutsch</a>.</p>
<p><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fblog.blackbam.at%2F2010%2F01%2F26%2Fsession-sicherheit-in-php%2F&#038;title=Secure%20Sessions%20with%20PHP" data-a2a-url="https://blog.blackbam.at/2010/01/26/session-sicherheit-in-php/" data-a2a-title="Secure Sessions with PHP"><img src="https://static.addtoany.com/buttons/share_save_120_16.png" alt="Share"></a></p>]]></content:encoded>
					
					<wfw:commentRss>https://blog.blackbam.at/2010/01/26/session-sicherheit-in-php/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
