<?php
class SmartSecurity {

//Stop XSS From $_GET
 function GET_XSS()
 {
 	global $SF;

    foreach ($_GET as $xss_get)
    {
   		if ((eregi("<[^>]*script*\"?[^>]*>", $xss_get)) or
       		(eregi("<[^>]*object*\"?[^>]*>", $xss_get)) or
       		(eregi("<[^>]*iframe*\"?[^>]*>", $xss_get)) or
       		(eregi("<[^>]*applet*\"?[^>]*>", $xss_get)) or
       		(eregi("<[^>]*meta*\"?[^>]*>", $xss_get)) 	or
       		(eregi("<[^>]*style*\"?[^>]*>", $xss_get)) 	or
       		(eregi("<[^>]*form*\"?[^>]*>", $xss_get)) 	or
       		(eregi("<[^>]*img*\"?[^>]*>", $xss_get)))
            {
	
echo( "Hacking Attempt has been logged");

  exit;
   			}
  	}
 }

//Stop SQL Injection From $_GET
 function Injection()
 {
 	global $SF;

  	foreach ($_GET as $sql_get)
    {
   		if ((eregi("select", $sql_get)) or
       		(eregi("union", $sql_get)) 	or
       		(eregi("--", $sql_get)))
            {

echo("Hacking Attempt has been logged");

			exit;

               
   			}
  	}
 }
}

?>
