 |
Categories |
|
|
|
This post is an attempt to explain and introduce the reader to Haskell. The hope is that by the end of the post, you will be able to see some of the beauty in a language like such, and while you might not switch to it immediately, some of the nice properties might be highlighted.
To start off, you will want to install the Glasgow Haskell Compiler to follow these examples; it can be found here: http://haskell.org/ghc/
After you've done that, we can begin!
Introduction
First off, to get a feel for the environment, simply start it up ... View In Full
|
|
Intro
One of the most handiest features of C++ (and C) are pointers. Many beginner programmers learn about pointers and don't see the practical uses for them. This tutorial will go over pointers and point out multiple practical uses of them in C++. Some experience in C or C++ programming would be helpful, but not mandatory.
What's a pointer?
A pointer is a variable, like any other, only that a pointer variable holds a memory address. That is an integer will hold a integer, while an integer pointer will hold a memory address. ... View In Full
|
|
PHP as you all know is a very powerful and yet fairly loose language, however one of it's very usefully abilities is the ability to upload files. PHP can upload literally any type of file you allow it to. However this can also open up many holes for many exploits, which is why we'll also cover some basic security along with uploading the files.
Where shall we start? How about at the very beginning, how are you going to upload files without a form to upload them from?
First I'll show you an example:
HTML Form Example
&l...; View In Full
|
|
Note: Examples used in this article are in PHP
Many developers believe in the practice of securing passwords and other financial data using a hash function (a function of turning some kind of data into a small number that may serve as a digital "fingerprint"). However just hashing a password isn�t enough it may still be bruteforced and as usernames and passwords are determined by the users not all will meet minimum secure levels so it is up to the developer to pick up where they leave off.
Many developers use hashes such as MD... View In Full
|
|
This is purely how I use Objects in PHP and I am not saying this way will be best for you however it has proven to be the better way for myself without the disadvantages of OOP� i.e. spending more time on structure of a program than coding, and having your code jump all over the place from object to object.
My Rules (To prevent complication)
1. Each object ONLY refers to itself i.e. it will not create any new objects inside of itself.
2. Each object achieves just ONE task and does not try to do everything.
3. Objects are used to proces... View In Full
|
|
Basic Tags
<html></html>
Creates an HTML document
<head></head>
Sets off the title and other information that isn't displayed on the Web page itself
<body></body>
Sets off the visible portion of the document
Header Tags
<title></title>
Puts the name of the document in the title bar
Body Attributes
<body bgcolor=?>
Sets the background color, using name or hex value
<body text=?>
Sets the text color, using name or hex value
<body link=?>
Sets the color of l... View In Full
|
|
Please do not rate this article as it has yet to be completed, however if you have any comments on it feel free to submit them.
Introduction
This document was created in order to be a guide for users to create their own modules and submit to an administrator for consideration of being placed on the site. This guide was made with the assumption that you have some moderate PHP, MySQL, and HTML knowledge.
Globals
string SNAME (DerangedMinds.net)
SNAME contains the value of the site name, by default the value �DerangedMinds.net� i... View In Full
|
|
Some of you may know that plain unparsed PHP files are sent from the server to the person browsing your website. This is down to the way in which mod_php is implemented in Apache. Facebook have suffered from their servers spitting out unparsed PHP, and many more may unknowingly be rarely spitting out PHP files as well! So, the purpose of this article is to show you how you can secure your PHP code on to your server and make sure people never get hold of your PHP files!
Includes Outside Web Root
All your include files such as database conn... View In Full
|
|
Search Engines play an important role in how much traffic web sites get these days and ultimately control the success of your site or not. Search Engines see http://zwhost.net and http://www.zwhost.net as two seperate websites, which can cause you to have duplicate content in the search engine's eyes. So what you want to do is fix that so when a person goes to your website, it automatically transfers them to the www domain.
This is a tutorial on how to redirect you non-www url to the www domain.
Apache:
Ensure that your hosting pr... View In Full
|
|
PLEASE DON"T RANK IT YET- CAUSE IT"S NOT FINISHED YET
hey hey hey. got a long weekend here, so i thought of writing the 5th article
So like i said, i'll start talking about different IO ways, and in each article that will follow this one, i'll talk about different one specifically
section 2.3
Java allows the user to enter data in a variety of ways. i will try to explain three different methods of gathering user input. first will be DOS window based using the EasyReader class(the class which was written by some g... View In Full
|
|