Thirdly, you're an idiot...
How quick you are to throw words at people, when you clearly don't know what you're talking about =]
I give you as much as your first point, $_SERVER['REMOTE_ADDR'] would be one fix. But the second isn't necessarily true.
If the server has "short open tag" enabled, then your point stands no ground
Short-hand tags are a bad habit and should always be avoided. This is not 1981 and 3 bytes are not going to kill our space. In this case, it can actually cause damage though if you. If you distribute your script not everybody has short hand enabled, thus problems come up.
He may as well use the ASP tags <% %> as they can be valid if enabled >.>.
"You can't be something your not,
Be yourself by yourself
Stay away from me" ~Walk, Pantera
"Playing an acoustic guitar is like having sex with your clothes on" ~Dave Mustaine
Hellbound Hackers is the collective work of the staff and the community and is therefore licensed under the CC BY-NC-SA license.