$name1 = $_POST['name1'];
$lname = $_POST['lname'];
$uname = $_POST['uname'];
$email1 = $email1;
$email2 = $email2;
$pass1 = $pass1;
$pass2 = $pass2;
$pass1 = md5($pass1);
$sql = "SELECT * FROM users WHERE uname = $uname";
if(mysql_num_rows($sql) > 0) {
echo "Sorry, that user already exists";
exit();
}
警告:mysql_num_rows()预计参数1是资源,在给定的/nas/students/unix/public_html/dsa1/register.php上线27参数警告PHP
这不是以目前的形式问题。但是我建议你看一下标准的PHP文档,最好跳过固有的不安全的['mysql_ *'](http://php.net/mysqli)函数家族来支持['mysqli_ *'](http: //php.net/mysqli)甚至['PDO :: *'](http://php.net/PDO)。请*不要*盲目地将用户提供的数据粘贴到任何查询中,除非您实际上正在寻求SQL注入攻击。 – Bart