Posted by Rasti | May 29th, 2009
Configuration of PHP is one of the significant security breakpoints. There is no doubt that ignoring this can lead to serious security consequencies. I’m not talking just about web applications vulnerabilities. Wrong PHP setup can allow to take your server under control by some invader. This article is trying to help you to do more for your calm sleep.
Posted by Rasti | May 28th, 2009
Regular expression is the basic functionality of pattern comparison. PHP offers two sets of functions for regular expressions – POSIX style and Perl style. Both types have slightly different syntax and this post should give basic overview of the POSIX one.
Posted by Rasti | May 27th, 2009
Many of my customers hold data in Excel files. Then, when they decide to build a web based, database driven project controlled by PHP, ask me to move their Excel data into the MySQL. Whether it’s possible and how to do it, will be the content of this post.
Posted by Rasti | May 26th, 2009
XMLHttpRequest is one of the goals of AJAX technology. But what XMLHttpRequest actually is, where it comes from or how we can use it will be the content of this short post.