I think that each of you tried to find the own way to solve tasks in the learning process of a relational database management system, and not knowing that out there are various helpful features, which could speed up the queries at times and reduce the code size. In this article I want to share with you my experience, namely how to work with MySQL comfortably, often allowing the programmer to do the things that other databases would not be able to do. This material would be useful rather for those who just decided to delve into the wonderful world of queries, but maybe the experienced programmers will find something interesting for themselves here.
I want to share one feature when setting COOKIE values, which is often overlooked by the web developers.
According to my experience as for research of the web application vulnerabilities for 2009-2011, this error occurred in 87% of the web applications that were written in PHP.
In order to reduce this rate, I have decided to write this article.
I will not even talk about httpOnly flag, though its use is very important and necessary.
Let’s look at the example of code:
According to my red-planet interests, I often find unusual pictures of Mars or illustrated scientific facts about this planet. Some of them are so awesome that I want to run out into the street and show them to all passersby. However, I am not sure if people will understand me on the street, but here, I hope readers will appreciate the amazing details about our neighbor in the Solar System.
After three years of working with studio lights, I thought I knew a lot about the on-camera flash. Three weeks ago, I went to visit one very experienced strobist, who told and showed me so much that I immediately understood that I have to do.
I am going to give you a list of things where you can find something new for yourself. For example, it will explain how to use some photoflash features, and if at least you can find one feature useful for you, then I will consider that my task is done well. Please note that the material is related only to the Canon cameras and its flashes in the technical parts of the special features. For other brands the general idea of using is the same, but the specifics are slightly different.
It is known that any system reliability is determined by its weakest link. Now we take a good look at the protection from copying of one popular toy that was released a few days ago for OS X and the way of its bypass. In addition, we just look at one of the options for implementing the protection from copying. Of course, this research was conducted in the study purposes, and you still should buy the good software and games.
Let’s run the game and see the registration form or purchase. The registration is done online by entering a serial number, or manually by entering a name and the key in accordance with the displayed identifier of a specific computer. Next, we run gdb and get program exited with code 055.
A Canadian game developer, Christopher Albeluhn that has seven years of experience lost his job, but he did not lose his optimism. In his spare time he began to make a new project that was supposed to strengthen his portfolio, namely it is a model of the Earth that is powered by the Unreal engine.
It would be true to say that everything new is well forgotten old.
A feature to embed remote resources (such as images from other websites) on the page of your website is a very bad practice that at some point may lead to quite serious consequences for the website. As far back as 10 years ago, I was surprised to read about that possibility. Now after 10 years nothing changed, and it seems that it hardly ever will change.
Many people have faced the DDoS attacks and HTTP flooding. No, this is not just another tutorial on setting up nginx, but I would like to introduce my module that works as a quick filter between the bots and backend during L7 DDoS attacks, as well it allows filtering the garbage requests.
The module can do:
• To set cookies in a standard way through HTTP header Set-Cookie. After the cookies are set it redirects the user using the response code 301 and Location header.
• After the cookies are set it redirects the user using the response code 200 and HTML tag Meta refresh.
• To count the number of attempts to set the cookies and to direct the user to a specified URL after exceeding the maximum number of unsuccessful attempts.
The second quarter of 2012 is in a full swing, and the number of rumors is growing around IPO of number 1 social network. Let's recall what happened to this network and try to calculate how much it really costs. Where did the figure of $ 100 billion come from? And why is it overstated?
IP-address (v4) is consisted of 32 bits. Any self-respecting administrator or IT specialist should answer correctly the question: "How many bits are in an IP-address?" Of course, It is desirable to know about IPv6: 128 bits.
Here is a first case. Theoretically IPv4-addresses can be:
232 =210*210*210*22 = 1024*1024*1024*4 ≈ 1000*1000*1000*4 = 4 billion
Below we could see that a lot of them are "eaten up" by any garbage.
I think everyone knows how IPv4-address is written. The four octets (it is the same as byte) in decimal with no leading zeros, separated by dots: “192.168.11.10”.