<?php
include('includes/dbInfo.php');
$tbl_name = "Users"; // Table name
// Connect to server and select databse.
$db = mysql_connect(db_server, $db_user, $db_password);
mysql_select_db($db_dbname);

// username and password sent from form
$myusername = $_POST['myusername'];
$mypassword = $_POST['mypassword'];

// To protect MySQL injection (more detail about MySQL injection)
$myusername = stripslashes($myusername);
$mypassword = stripslashes($mypassword);
$myusername = mysql_real_escape_string($myusername);
$mypassword = mysql_real_escape_string($mypassword);

$sql = "SELECT * FROM $tbl_name WHERE RUID='$myusername' and Password='$mypassword'";
$result = mysql_query($sql);

// Mysql_num_row is counting table row
$count = mysql_num_rows($result);
// If result matched $myusername and $mypassword, table row must be 1 row

if ($count == 1) {
// Register $myusername, $mypassword and redirect to file "login_success.php"
    $row = mysql_fetch_array($result);
    session_register("myusername");
    session_register("mypassword");
    setcookie("user", $row['FirstName'] . " " . $row['LastName'], time() + 3600);
    setcookie("ruid", $myusername, time() + 3600);
    header("location:login_success.php");
} else {
    header("location:main_login.php?status=0");
}
?>