Introduction There’s a lot of advice available on the subject of protecting a PHP based contact form from injection attacks, ...
Author: atul sharma
Registry Key Handling Through PHPRegistry Key Handling Through PHP
The registry is made up of “Keys”. Each key is similiar to branch of a tree. Each key has one ...
upload large file on serverupload large file on server
Write this code in the .htaccess file —-code———————————– suPHP_ConfigPath /home/sdman007/public_html order allow,deny deny from all ————————————— Create php.ini file in ...
jQuery Store LocatorjQuery Store Locator
jLocator is a jQuery store locator plugin uses Google Maps API V3 and enables searching, sorting, filtering and pagination for ...
PHP: Export Database Schema as XMLPHP: Export Database Schema as XML
Sometimes it can be useful to have a dump of the current database schema. The script below reads the schema ...
Prevent PHP Security Attacks in PHP codingPrevent PHP Security Attacks in PHP coding
Security is important part of any language . If we learn PHP then we also need and keep in mind, ...