How can the use of mysql_real_escape_string() prevent SQL injection attacks in PHP?

SQL injection attacks occur when malicious SQL queries are inserted into input fields on a website, allowing attackers to manipulate the database. Using mysql_real_escape_string() in PHP helps prevent SQL injection attacks by escaping special characters in the input data, making it safe to use in SQL queries.

// Example of using mysql_real_escape_string() to prevent SQL injection
$unsafe_variable = $_POST['input_field'];
$safe_variable = mysql_real_escape_string($unsafe_variable);

$query = "SELECT * FROM users WHERE username='$safe_variable'";
$result = mysql_query($query);