ASCII 92 is a \ - try using the php-command «addslashes($string)» to your data you wanna store in the DB...
[edit]
when doing database-queries, I usually do it a little different than you (and alicia).
So this:
$SL_student_name = $_POST["parameter1"];
$result = mysql_query("SELECT Points FROM StudentDetails WHERE Student_Game_Name = '$SL_student_name' "

;
is made into:
$SL_student_name = $_POST["parameter1"];
$result = mysql_query("SELECT Points FROM StudentDetails WHERE Student_Game_Name = '".$SL_student_name."';"

;
Note the last part... This is because when you have special characters in your $whatever, that when you do them inline (i.e. ='$whatever' instead of ='".$whatever."'...) this can cause problems.
You have to type a few extra characters but I never had any problems with my queries using this technique.
Consider the following SQL-Statement:
SELECT Points FROM StudentDetails WHERE Student_Game_Name = 'Haruki Watanabe';
This is what it looks like, when my name is passed with a string:
$SL_student_name = "Haruki Watanabe";
$sql = "SELECT Points FROM StudentDetails WHERE Student_Game_Name = '".$SL_student_name."';";
Now - to make this even worse, imagine you'd have to look for «Haruki Watanabe's house». This has an extra «'» in the string that's being sought for which would confuse the sql-engine since it thinks the string ends at the 2nd «'». Thus your sql-query would look like this:
SELECT Points FROM StudentDetails WHERE Student_Game_Name = 'Haruki Watanabe' s house;
The «s house» would end up in the sql-statement, means, if you leave out the WHERE-condition, it'll end up being this:
SELECT Points FROM StudentDetails s house; // throws an error
That's when «addslashes»*comes in handy:
$SL_student_name = addslashes("Haruki Watanabe's house"

;
Now the content of $SL_student_name is «Haruki Watanabe\'s house» which makes it safe to use in an sql-statement.
$sql = "SELECT Points FROM StudentDetails WHERE Student_Game_Name = '".$SL_student_name."';";
On a sidenote: When someone tries to make an sql-injection, attacking your database, this technique is - alas, just a very tiny - countermeasure...
Your PHP-script waits for the parameter «parameter1» which will be filled by your SL-Script... now if anyone can «sniff» what your script does, they can figure out which parameters should be passed to your php-script and do the following:
parameter1=just-some-stuff' OR '1=1
NOW your SQL-Statement would end up being this:
SELECT Points FROM StudentDetails WHERE Student_Game_Name = 'just-some-stuff' OR '1=1';
The above query will return ALL the entries in your table!
So when you use «addslashes» the sql-query would be:
SELECT Points FROM StudentDetails WHERE Student_Game_Name = 'just-some-stuff\' OR \'1=1';
This won't return any results...
NEVER trust the variables that are being passed to your PHP-script NEVER-EVER!!!