Talk:Cross-site scripting

what?
okay escape everything, I get it. But what the f**k is escaping? Before we tell people to escape everything shouldn't we explain: This article as it currently is written does not help me at all, unfortunately to my knowledge, this article is the closest instructions to this security issue this site has. Igottheconch 01:08, 13 December 2011 (UTC)
 * 1) what escaping is
 * 2) an example of escaping?
 * I give up. I simply don't have the computer knowledge to understand this, and 99% of most people won't understand this article either. That would not matter, except this seems to be a serious issue. Igottheconch 01:40, 13 December 2011 (UTC)
 * Escaping is converting e.g. "  " to what you see here, with that I mean that the span tag is not used as a span tag, is is displayed as text because it is escaped using the nowiki tag. Another example: $variable = 'Pagina's'; must be escaped to $variable = 'Pagina\'s';. Some related info: Escape character. SPQRobin 03:04, 13 December 2011 (UTC)
 * thank you so much for responding spq! god bless. Igottheconch 06:03, 13 December 2011 (UTC)
 * okay so in the example of extension:balloons, in the balloon I make, instead of typing:
 * THIS IS A TABLE
 * I would type:
 * &lt;th colspan&#61;3 bgcolor&#61;lightblue&gt;THIS IS A TABLE&lt;/th&gt;
 * The Template:XSS alert says:
 * strictly validate user input and/or apply escaping to all characters that have a special meaning in HTML
 * It does not say WHERE do validate and apply escaping this would only be within the extension correct?
 * So instead would this be correct and clearer:
 * Apply escaping to all characters in all extension edits that have a special meaning in HTML
 * Also which characters have "special meaning" in HTML? Igottheconch 00:36, 16 December 2011 (UTC)
 * Found an answer to last question: Special Characters to Escape is this correct? Igottheconch 00:38, 16 December 2011 (UTC)