Talk:327: Exploits of a Mom
- I think that's embellished upon later in a series called l33t. Davidy22(talk) 15:42, 17 November 2012 (UTC)
- It's for novelty license plates with people's names on them (like "Bort" for example). 220.127.116.11 18:15, 6 July 2014 (UTC)
- The common tale is that someone purchases some item or other with writing on it (or somewhere where writing can appear, on closer examination) and finds that this writing reads "Help, I'm trapped in a <item> factory", or similar, as appropriate to the object concerned. This suggests that someone is trapped (or perhaps even enslaved to work) within such a place and their only hope of escape is to make 'messages in a bottle' out of the product that leaves the facility. This is often extended to various fantastical situations, like the (British only?) joke about the stick of sea-side rock.
- (Of course, the writing in sticks of rock generally starts to become unreadable (for normal-sized sticks) for any name larger than "Bridlington", although with care I suppose they've made them with a semi-legible "Western-super-Mare" set through them. But one aspect of this version of the joke could definitely well be that the theoretical SOS message wouldn't legibly fit.)
- So, anyway, Mrs Roberts (who waited for a number of years for Little Bobby Tables to grow up to school-age, for the illustrated exploit) is patiently waiting for her daughter to get to somewhere in her mid-teens, or later, all the while intending that she will get to spoof such a message from the local DMV's license-printing facility at some point. (Turns out that could be as 'soon' as her reaching 14-16 years of age for her first Learner license, depending on state.) Momma Roberts likes playing the long-game, it appears. 18.104.22.168 16:02, 19 June 2013 (UTC)
- The mouseover text might also be a reference to an easter egg in classic Mac OS, in which the text "Help! Help! We're being held prisoner in a system software factory!" was embedded in the system suitcase. 22.214.171.124 20:02, 13 April 2014 (UTC)
- Someone should probably put something like this on the actual page instead of just the discussion... 126.96.36.199 02:23, 11 March 2015 (UTC)
The example talks about a SELECT query (for looking up information in a database), but I think an INSERT query (for inserting new information in the database) makes more sense, because of the closing bracket. A SELECT query is usually of the following form: SELECT column1, coulm2 FROM table WHERE username='somethingsomething'. An INSERT query is usually of the following form: INSERT INTO table (column1, columns2) VALUES (value1, value2) In the case of the comic, I think it's reasonable to assume it's the start of the school year and someone is adding the name of a new student (Bobby) to the database, which triggers the exploit.188.8.131.52 21:23, 23 March 2015 (UTC) David
It seems to me that Bobby doesn't necessarily share her technical savvy or sense of humour, but caused the incident simply through having the name she gave him. 184.108.40.206 23:47, 23 May 2015 (UTC)
Anyone want to comment on the missing outline from panel 2? 220.127.116.11 23:48, 27 July 2015 (UTC)someGuy
The explanation says that Bobby Tables got his technical savvy from his mom, however we have no reason to believe that he has any technical savvy at all- this prank was entirely his parents'. He is most likely having his first day of kindergarten, and has no technical savvy at all. Bbruzzo (talk) 13:15, 4 September 2015 (UTC)
- ... I read all the way down here waiting to see someone mention that, only to find you did it ... about a month ago. On what is now a very old strip. Weird o_O 18.104.22.168 18:56, 28 October 2015 (UTC)
- Real Life
And possibly a warning not to try this on a live system.. a colleague just got fired after XKCD inspired stupidity. ~100% his own fault, but might be worth mentioning. Xseo (talk) 09:49, 29 November 2015 (UTC)
The explanation is incorrect. It keeps putting single quotes around the variable $name when it is the input stored in $name which will have the single quotes. It even mentions how the single quotes around $name are the reason for the exploit as opposed to the single quotes in the input stored in the variable $name.
On another note, the explanation seems to indicate that Bobby is responsible for the SQL injection and later suggests instead the mother is responsible. My interpretation was that this is entirely attributed to the mother since it is called "Exploits of a Mom". I do not believe she actually named her son with an SQL injection, but rather input that as his first name in the school's online registration form.