How to prevent a PHP script being executed when it is being read in as an $_post element?
Simple, don't:
<?php
eval($_POST['unvalidated_user_data']);
?>
(in fact don't eval at all, if you need eval you're usually doing something wrong)
Having RTFA, I interpreted it slightly differently. I think the supplied PHP code is uploaded to another, previously compromised server and it is used to send out phishing emails.
The unwary user then enters their login details on the compromised server (or if they are using an email client that displays HTML forms(!), within the email) the data is then sent to the compromised server which forwards it on to the script kiddie. The user is then redirected to the real login page along with their POST data so when they arrive there they are automatically logged in, none the wiser...
Hell I *am* a technical person and I would dearly love for a database that made it as easy to create a simple database as it is to create a spreadsheet.
Are you sure you are "a technical person"?
and there are no countervailing examples in TV fiction
How about Walter White (Breaking Bad) or Gregory House MD (House MD)? I'd say they are intellectual heroes (or anti-heros in the case of WW).
Interestingly House also has some of the social issues that are represented in TBBT but he's never belittled by the plot/script, far from it.
The hardest part of climbing the ladder of success is getting through the crowd at the bottom.