// workaround for not updated config.php
if (! isset($use_iframe)) $use_iframe = false;
- // If there's no "view_unsafe_images" setting in the user's preferences,
- // turn unsafe images off by default.
- // FIXME: Check if the UIR plugin is enabled. If it's not, no unsafe images should be displayed regardless of the user's preferences. This test is done in several places in the code and they should all be fixed in the same way.
+ // If there's no "view_unsafe_images" variable in the URL, turn unsafe
+ // images off by default.
+ // FIXME: Update this code to use the default value FALSE.
if( !sqgetGlobalVar('view_unsafe_images', $view_unsafe_images, SQ_GET) ) {
$view_unsafe_images = false;
}
$attvalue = trim(substr($attvalue,1,-1));
}
- // If there's no "view_unsafe_images" setting in the user's preferences,
- // turn unsafe images off by default.
- // FIXME: Check if the UIR plugin is enabled. If it's not, no unsafe images should be displayed regardless of the user's preferences. This test is done in several places in the code and they should all be fixed in the same way.
+ // If there's no "view_unsafe_images" variable in the URL, turn unsafe
+ // images off by default.
+ // FIXME: Update this code to use the default value FALSE.
if( !sqgetGlobalVar('view_unsafe_images', $view_unsafe_images, SQ_GET) ) {
$view_unsafe_images = false;
}
+
$secremoveimg = '../images/' . _("sec_remove_eng.png");
/**
)
);
- // If there's no "view_unsafe_images" setting in the user's preferences,
- // turn unsafe images off by default.
- // FIXME: Check if the UIR plugin is enabled. If it's not, no unsafe images should be displayed regardless of the user's preferences. This test is done in several places in the code and they should all be fixed in the same way.
+ // If there's no "view_unsafe_images" variable in the URL, turn unsafe
+ // images off by default.
+ // FIXME: Update this code to use the default value FALSE.
if( !sqgetGlobalVar('view_unsafe_images', $view_unsafe_images, SQ_GET) ) {
$view_unsafe_images = false;
}