How can PHP code be optimized to prevent SQL Injections in a website?

To prevent SQL Injections in a website, PHP code can be optimized by using prepared statements with parameterized queries. This approach ensures that user input is treated as data rather than executable code, making it impossible for malicious SQL statements to be injected into the query.

// Establish a database connection
$pdo = new PDO('mysql:host=localhost;dbname=mydatabase', 'username', 'password');

// Prepare a SQL statement with placeholders
$stmt = $pdo->prepare("SELECT * FROM users WHERE username = :username");

// Bind parameters to the placeholders
$stmt->bindParam(':username', $_POST['username']);

// Execute the prepared statement
$stmt->execute();

// Fetch the results
$results = $stmt->fetchAll();