function inject_array_remote($array)
{
    $sock = new sockets();
    $ArticaHttpsPort = $sock->GET_INFO("ArticaHttpsPort");
    if (!is_numeric($ArticaHttpsPort)) {
        $ArticaHttpsPort = 9000;
    }
    include_once dirname(__FILE__) . "/ressources/class.ccurl.inc";
    if ($GLOBALS["REMOTE_SSL"] == 1) {
        $refix = "https";
    } else {
        $refix = "http";
    }
    $uri = "{$refix}://{$GLOBALS["REMOTE_SSERVER"]}:{$GLOBALS["REMOTE_SPORT"]}/squid.stats.listener.php";
    events("Injecting -> {$uri} on line:" . __LINE__);
    $curl = new ccurl($uri, true);
    $f = base64_encode(serialize($array));
    $curl->parms["STATS_LINE"] = $f;
    $curl->parms["MYSSLPORT"] = $ArticaHttpsPort;
    if (!$curl->get()) {
        inject_failed($array);
        events("Injecting -> FAILED " . $curl->error . " on line:" . __LINE__);
        echo "FAILED " . $curl->error . "\n";
        return;
    }
    if (preg_match("#<ANSWER>OK</ANSWER>#is", $curl->data)) {
        return true;
    }
    events("Injecting -> FAILED " . $curl->data . " on line:" . __LINE__);
    echo "FAILED " . $curl->data . "\n";
    inject_failed($array);
}
function inject_array($array)
{
    $q = new mysql_squid_builder();
    while (list($table, $contentArray) = each($array)) {
        if (preg_match("#squidhour_([0-9]+)#", $table, $re)) {
            $q->TablePrimaireHour($re[1], true);
        }
        $prefixsql = "INSERT IGNORE INTO {$table} (`sitename`,`uri`,`TYPE`,`REASON`,`CLIENT`,`zDate`,`zMD5`,`remote_ip`,`country`,`QuerySize`,`uid`,`cached`,`MAC`,`hostname`) VALUES ";
        $sql = "{$prefixsql}" . @implode(",", $contentArray);
        //if($GLOBALS["VERBOSE"]){echo $sql."\n";}
        $q->QUERY_SQL($sql);
        events("inject_array::Injecting -> table `{$table}` " . count($contentArray) . " rows affected: {$q->mysql_affected_rows} in line:" . __LINE__);
        if (!$q->ok) {
            if ($GLOBALS["FORCE"]) {
                echo "\n\n**************\n\n" . $sql . "\n**************\n";
            }
            if ($GLOBALS["VERBOSE"]) {
                echo "\n\n**************\n\n" . $sql . "\n**************\n";
            }
            events("Fatal !!! inject_array::Injecting -> ERROR: {$q->mysql_error} : in line:" . __LINE__);
            inject_failed($array);
            return;
        }
    }
}