Powered by Blogger.

Contact

Popular Posts

Sunday, 8 September 2013

Enterprise Resource Planning Tutorial : Download H...
There are many ways to encode and decode PHP code. From the perspective of site security, there are three PHP functions —str_rot13(), base64_encode(), and gzinflate — that are frequently used to obfuscate malicious strings of PHP code. For those involved in the securing of websites, understanding how these functions are used to encode and decode encrypted chunks of PHP data is critical to accurate monitoring and expedient...

Saturday, 7 September 2013

If you want to block tough proxies like hidemyass.com, my previously posted .htaccess methods won’t work. Those methods will block quite a bit of proxy visits to your site, but won’t work on the stealthier proxies. Fortunately, we can use a bit of PHP to keep them out.Block Tough Proxies with PHPTo stop tough proxy visits from sites like hidemyass.com, add the following slice of finely craftedPHP to the top of your header.php file:<?php...
Web Developing - Computer Engineering: 60+ Awesome New WordPress Themes: 60+ Awesome New WordPress Themes Blog Post In: http://www.webdesignerdepot.com It seems like every time you go looking for a ne...

Friday, 6 September 2013

I recently spent some time wrestling with various e-commerce/shopping-cart/membership plugins. One of them was of course the popular WP e-Commerce plugin, which uses a directory named “downloadables” to store your precious goods. I had some large files that needed to go into this folder, but the server’s upload limit stopped me from using the plugin’s built-in file uploader to do so.On most servers, there are limits to how much data you can upload....

Thursday, 5 September 2013

Computer Engineering: HTTP Headers for ZIP File Downloads: HTTP Headers for ZIP File Downloads You know when you you’re working on a project and get stuck on something, so you scour the Web for s...

Tuesday, 3 September 2013

Ajax-Powered Error LogsUpdate: Check out the new and improved Ajax Error Log Version 2.0!As an obsessive website administrator, I like to keep a keen eye on my error logs. Once a week, I download my PHP, 404, and other error logs, and analyze them as closely as time allows. Monitoring site errors and other traffic patterns leads to many of the security-related articles I post here atPerishable Press, including resources...