'; } else { $sql = "SELECT * FROM `t_user_client` WHERE `user_email` = '".$_POST['txt_Username']."' AND `user_password` ='".$_POST['txt_Password']."' AND `status` = 'Active' and `user_act_key` = '1'"; $result=mysql_query($sql) or die(mysql_error()); if(mysql_num_rows($result)<1){ $_SESSION['UserID']=$row["user_id"]; $_SESSION['UserName']=$row["user_username"]; echo ''; }elseif(mysql_num_rows($result)>0){ $_SESSION['UserID']=$row["user_id"]; $_SESSION['UserName']=$row["user_username"]; //header("Location: index.php"); echo ''; } } } ?>
   
Login