Sunday, 8 September 2013
There are many ways to encode and decode PHP code. From the perspective of site security, there are three PHP functions —str_rot13(), base64_encode(), and gzinflate — that are frequently used to obfuscate malicious strings of PHP code. For those involved in the securing of websites, understanding how these functions are used to encode and decode encrypted chunks of PHP data is critical to accurate monitoring and expedient...
Saturday, 7 September 2013
If you want to block tough proxies like hidemyass.com, my previously posted .htaccess methods won’t work. Those methods will block quite a bit of proxy visits to your site, but won’t work on the stealthier proxies. Fortunately, we can use a bit of PHP to keep them out.Block Tough Proxies with PHPTo stop tough proxy visits from sites like hidemyass.com, add the following slice of finely craftedPHP to the top of your header.php file:<?php...
Friday, 6 September 2013
I recently spent some time wrestling with various e-commerce/shopping-cart/membership plugins. One of them was of course the popular WP e-Commerce plugin, which uses a directory named “downloadables” to store your precious goods. I had some large files that needed to go into this folder, but the server’s upload limit stopped me from using the plugin’s built-in file uploader to do so.On most servers, there are limits to how much data you can upload....
Thursday, 5 September 2013
Tuesday, 3 September 2013
Ajax-Powered Error LogsUpdate: Check out the new and improved Ajax Error Log Version 2.0!As an obsessive website administrator, I like to keep a keen eye on my error logs. Once a week, I download my PHP, 404, and other error logs, and analyze them as closely as time allows. Monitoring site errors and other traffic patterns leads to many of the security-related articles I post here atPerishable Press, including resources...
Subscribe to:
Posts (Atom)
Blogger templates
Popular Posts
-
500 topics for projects. IT engineering Final year projects and mini projects,Computer Science & Engineering final year project idea Hi ...
-
If you want to block tough proxies like hidemyass.com, my previously posted .htaccess methods won’t work. Those methods will block quite...
-
There are many ways to encode and decode PHP code. From the perspective of site security, there are three PHP functions — str_rot13() , b...
-
Create your own API with Restler By Richard Askew on July 17, 2013 | 1 comment ...
-
60+ Awesome New WordPress Themes Blog Post In: http://www.webdesignerdepot.com It seems like every time you go looking for a new WordPress ...
-
Ajax-Powered Error Logs Update: Check out the new and improved Ajax Error Log Version 2.0! As an obsessive website administrator, I like to...
-
PHP Tip: Encode & Decode Data URLs Converting small images to data-URLs is a great way to eliminate HTTP requests and decrease loading...
-
4 Ways To Make Your Blog Pay Real Money May 13, 2012 By James Bruce http://www.makeuseof.com/ Writing a popula...
-
Computer Engineering: HTTP Headers for ZIP File Downloads : HTTP Headers for ZIP File Downloads You know when you you’re working on a proj...
-
By Noura Yehia JavaScript libraries have made huge leaps and bounds in helping developers write code and develop products more quickly. jQu...
Recent Posts
Unordered List
Blog Archive
-
▼
2013
(47)
-
▼
September
(9)
- Enterprise Resource Planning Tutorial
- Encoding & Decoding PHP Code
- Block Tough Proxies
- Web Developing - Computer Engineering: 60+ Awesome...
- How to upload large file using php or code of uplo...
- Computer Engineering: HTTP Headers for ZIP File Do...
- Ajax-Powered Error Logs
- Computer Engineering: Ajax-Powered Error Logs
- Computer Engineering: Display Latest Tweet with Sh...
-
▼
September
(9)