Tutorials to .com

Tutorials to .com » Php » php other

php other Articles


1: PHP script of 8 skills (5) of the user authentication using PHP
If you want a script in each based on password protection, then you can joint use header () function and $ PHP_AUTH_USER, $ PHP_AUTH_PW global variables to create a basic authentication scheme. Usually based on the authentication server request / re...

2: PHP script of 8 skills (6) PHP and COM
If you are an adventure elements, and you are using CGI, ISAPI or Apache module version of the Windows system running PHP, so you can get the COM systems function. Now, the explanation of COM (Microsoft's Component Object Model) of the work and ...

3: PHP-Web Application Development: Using templates
Each carried out a large-PHP-Web Application Programming developers probably have the following experience: spend a lot of time to write hypertext language for page layout, such as double as art; or in the integration and the HTML code in the static...

4: Chinese name of Chinese characters to allow development
Recently, by chance and found a friend named php rules' [a-zA-Z_ \ x7f-\ xff] [a-zA-Z0-9_ \ x7f-\ xff] * ' In other words a to z, and A to Z, and _, and 0xff to 0x7f characters have been named the support of the rules, that is, in the php p...

5: Regular expression syntax opened the mystery
Regular expressions (REs) are often mistakenly believe that only a small number of people to understand the mysterious language. They do on the surface appear chaotic, if you do not know its syntax, the code then it is only in your eyes just a pile ...

6: Template used to deal with the phplib7.2 multiple nested BLOCK
At present, most of the template provided in the block-type functions, block number to deal with the HTML elements of uncertainty, when the emergence of multi-storey element is not set, the nested block will be used, for the use of nested block, aft...

7: The use of combination of PHP and HTML form to visit more than a single form value
Can more easily through the HTML form for users to submit information on the ability to operate has been one of the strengths of PHP. In fact, PHP version 4.1 adds several visits to the new method of information and effectively remove the previous v...

8: PHP development with robust code (a): Introduction from a strategically advantageous position
Robust with PHP code development is a series of articles on the settlement of large and medium-sized applications to practical problems. This series of articles focusing mainly on PHP 4 in new features can be used to highlight a great deal of work t...

9: PHP development with robust code (b): effective use of variable
"Development with PHP robust code" is on the settlement of large and medium-sized application of practical problems in a series of articles. In this article, PHP veteran Amol Hatwar discussed how the effective use of variables. He also dem...

10: PHP with expat Analysis Toolkit XML
XML is now advocating for all Web developers best friend, with the help of XML, which can easily format and display data from virtually any data source. However, dynamic content, the format of the data quality achieved is still far from ideal. The m...

11: PHP code used to achieve functional
  Currently, many sites make use of robots in order to prevent automatic registration of users, logging, irrigation, use of Authentication code. The so-called verification code is a string of randomly generated numbers or symbols to generate ...

12: Described in the PHP-point method using "mapping" in Chinese
Author: LuciferStar Source: Beyond PHP Preface: Now, more and more like the Internet, more and more people have their own personal home page. With the emergence of automated software tools to produce more and more simple page. However, available e...

13: PHP development with robust code (c): the preparation of reusable function
In this series of articles (about how to develop practical and effective PHP code) in Part 3 of, Amol Hatwar was discussed how to build the most effective function of the functional use of these functions will not be sacrificing too much performance...

14: SMARTY template engine
MVC with PHP development model to achieve the logic layer and that layer there are several templates to choose from the engine, but after the birth of the official engine SMARTY, the changes will have a choice. And the realization of the idea of it ...

15: PHP security and related
Attention to the importance of security issues To see far from all Prevent users from malicious damage to your program is often the most effective way is to ignore the code when writing to consider the possibility of it. Pay attention to possible ...

16: PHP function used to solve SQL injection
SQL injection in ASP on the question of hubbub  But of course, much a lot of well-known PHP process "dead." As the details of SQL injection, on-line article too much, can not be introduced here. If you website space magic_quotes_gpc in...

17: MVC model to achieve the PHP
MVC model structure on the site are common. It allows us to build a three-tier application structure, separated from the code layer useful to help designers and developers work together, as well as to maintain and enhance our ability to expand exist...

18: Class on the PHP in the views of a few individuals
Just a bit rough browser page to update an article on the Class of the articles, very good, it is recommended to see: http://www.phpe.net/articles/389.shtml On the kind of feeling ~ ~ I spent only about six months to understand the role of class a...

19: php and php code optimization related issues summary
1, in the function, passing an array The use of return to be efficient than the use of global For example, function userloginfo ($ usertemp) ( $ detail = explode ("|",$ usertemp); return $ detail; ) $ login = userloginfo ($ userdb);...

20: There are several security vulnerabilities PHPShop
The affected system: phpShop phpShop 0.6.1-b Detailed Description: phpShop is a PHP-based e-commerce process to facilitate the expansion of WEB function. phpShop there are several security issues, remote attacker could exploit these vulnerabiliti...


Page 1 of 9
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]   [9]