Pages:
Author

Topic: $40 in BTC for some php/mysql coding help, quick problem (Read 2232 times)

sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
[. . .] This includes what you call things.

that's the first time "things" appears in this thread.

Contest over, please discontinue use/lock thread.
hero member
Activity: 756
Merit: 522

Too much lol.

He didn't get anything except data (potentially).
But he's such a shitty programmer, even that is doubtful how much he got.

I mean this in the best way possible, but you're kinda being the drunk guy who just got beat up and won't shut up. Resulting in getting beat up further! Just leave it alone and walk away!

Actually he reminds me a little of rikur & his buttbuddy.

It's my fault trolls are beating me up and publicizing the scammer's action is bad?

1. It is your fault; 2. What you are doing (all of it) is the exact icon of wrong; 3. This includes what you call things.
sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
He didn't get anything except data (potentially).
But he's such a shitty programmer, even that is doubtful how much he got.

I mean this in the best way possible, but you're kinda being the drunk guy who just got beat up and won't shut up. Resulting in getting beat up further! Just leave it alone and walk away!
Huh?
It's my fault trolls are beating me up and publicizing the scammer's action is bad?
Really, this is a good thing I found the fault in the programmers code and now they are still claiming credit for coding my site, so it really shows how scammy some of the make-pretend programmers on this forum are.

Just to clarify:
Site got hacked once.
I'm taking steps to fix it with the $100 bounty.
I appreciate other people penetration testing *IF* they check with me first and explain the methods used.
full member
Activity: 126
Merit: 100
RavinTavin from MyFreeCams
He didn't get anything except data (potentially).
But he's such a shitty programmer, even that is doubtful how much he got.

I mean this in the best way possible, but you're kinda being the drunk guy who just got beat up and won't shut up. Resulting in getting beat up further! Just leave it alone and walk away!
sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
He didn't get anything except data (potentially).
But he's such a shitty programmer, even that is doubtful how much he got.
full member
Activity: 126
Merit: 100
RavinTavin from MyFreeCams
Some definitely not US based (read their ToS lol) MoneyPak and US debit card laundering site using my code while accusing I'm a scammer. Wut.
I do have to give him kudos for learning from previous services through.
Post *YOUR* code if I'm really using it dumass, you gave me shit, I paid another programmer to actually code the site since your code was non-functional.
Your ARE a scammer unless you can post your functional code, which you obviously can't b/c it doesn't exist.
Which programmer did you pay? His changes introduced a new security vulnerability:



70% or so of the code is mine from what I see. I thought you said that the coder was going to redo it in scratch?

"Boom Baby!"
lol
vip
Activity: 1316
Merit: 1043
👻
It's called see here: https://www.owasp.org/index.php/Category:OWASP_Guide_Project

You know you are using parts of my code, obviously I don't have what changes you made.
sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
Some definitely not US based (read their ToS lol) MoneyPak and US debit card laundering site using my code while accusing I'm a scammer. Wut.
I do have to give him kudos for learning from previous services through.
Post *YOUR* code if I'm really using it dumass, you gave me shit, I paid another programmer to actually code the site since your code was non-functional.
Your ARE a scammer unless you can post your functional code, which you obviously can't b/c it doesn't exist.
Which programmer did you pay? His changes introduced a new security vulnerability:



70% or so of the code is mine from what I see. I thought you said that the coder was going to redo it in scratch?

What's the extent of the vulnerability?
I'll credit the discoveries against what you owe me.
You're a lying piece of shit, your code doesn't exist or you would have revealed it by now.
You could easily host it somewhere using all those scammed coins, but then people would see and compare for themselves to figure out you're a scamming scumbag.
vip
Activity: 1316
Merit: 1043
👻
Some definitely not US based (read their ToS lol) MoneyPak and US debit card laundering site using my code while accusing I'm a scammer. Wut.
I do have to give him kudos for learning from previous services through.
Post *YOUR* code if I'm really using it dumass, you gave me shit, I paid another programmer to actually code the site since your code was non-functional.
Your ARE a scammer unless you can post your functional code, which you obviously can't b/c it doesn't exist.
Which programmer did you pay? His changes introduced a new security vulnerability:



70% or so of the code is mine from what I see. I thought you said that the coder was going to redo it in scratch?
hero member
Activity: 756
Merit: 522
work is related to upgrading my site (link is below and also to left of this message)

I see.
newbie
Activity: 41
Merit: 0
anyone win the bitcoin?
sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
This is probably the best thread of the day.

For my own curiosity, will this be a new Bitcoin/fiat exchange, a Bitcoin forex or a new ASIC miner?
work is related to upgrading my site (link is below and also to left of this message)
sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
Some definitely not US based (read their ToS lol) MoneyPak and US debit card laundering site using my code while accusing I'm a scammer. Wut.
I do have to give him kudos for learning from previous services through.
Post *YOUR* code if I'm really using it dumass, you gave me shit, I paid another programmer to actually code the site since your code was non-functional.
Your ARE a scammer unless you can post your functional code, which you obviously can't b/c it doesn't exist.
vip
Activity: 1316
Merit: 1043
👻
Some definitely not US based (read their ToS lol) MoneyPak and US debit card laundering site using my code while accusing I'm a scammer. Wut.

I do have to give him kudos for learning from previous services through.
hero member
Activity: 756
Merit: 522
This is probably the best thread of the day.

For my own curiosity, will this be a new Bitcoin/fiat exchange, a Bitcoin forex or a new ASIC miner?
sr. member
Activity: 472
Merit: 250
Never spend your money before you have it.
You don't really provide enough code to do this (ie what variable is table b's data stored in, assuming its already been queried). However I would hazard it would be something like the following (assuming table b's data is already queried and stored in $tableB as an array):

Code:

echo '
 '
.$r['id'].
'
;

foreach(
$tableB as $b)
{
      if (
$b['ID'] == $r['id'])
      {
            echo 
'
  •  '.$b['msg'].
  • '
    ;
          }
    }

    echo 
    '
    ';

    ?>

    This did not work either.

    Contest is over. I have created a solution. I might send you 2 a little something for the effort to encourage people helping with my next task.
    sr. member
    Activity: 472
    Merit: 250
    Never spend your money before you have it.

    Code:
    echo '



    ';

    ?

    1PcvEYS54SggtN49n57T2K3cpss3D7xpWp

    This yields a dash-like block with no text (dash block is too narrow vertically to display text).
    Also, I had to correct for r which was already used as a variable.
    sr. member
    Activity: 313
    Merit: 250
    i ♥ coinichiwa

    Code:
    echo '



    ';

    ?

    1PcvEYS54SggtN49n57T2K3cpss3D7xpWp
    newbie
    Activity: 19
    Merit: 0
    You don't really provide enough code to do this (ie what variable is table b's data stored in, assuming its already been queried). However I would hazard it would be something like the following (assuming table b's data is already queried and stored in $tableB as an array):

    Code:

    echo '
     '
    .$r['id'].
    '
    ;

    foreach(
    $tableB as $b)
    {
          if (
    $b['ID'] == $r['id'])
          {
                echo 
    '
  •  '.$b['msg'].
  • '
    ;
          }
    }

    echo 
    '
    ';

    ?>
    Pages:
    Jump to: