IT

Anything related to information technologies and information systems


How to protect web pages from email harvesting

How to protect web pages from email harvesting is the question that every webmaster should ask. While the very original techniques for building web sites were sufficient in the early stages of internet, they open door to hackers and spammers today. How your web pages are coded and designed plays a very important role in your web security. So, how can we protect web pages from email harvesting?

.


PHP loop through string

PHP loop through string - If you made it to this page, you probably want to know how to loop through a string in PHP and evaluate its every character. Let's say you have a string $string = "abcde", and you want to evaluate its every character and perhaps replace it with something. Looping through strings is very easy in PHP.

.


Order allow,deny

Order allow,deny is a setting in your Apache web server configuration that is used to restrict access to certain directories (folders) or even globally. Configuring who can access your directories is very important for your web site security. Order allow,deny is one way to restrict who can see what.

.


IndexIgnore

IndexIgnore is an important security setting in your Apache configuration files which commands what gets displayed to the visitor coming to your website. IndexIgnore is a simple setting which is often forgotten or neglected. Not having IndexIgnore set properly can have negative consequences and compromise your website server security.

.


PHP display array content

How to display PHP array content is something that every developer asks sooner or later when playing and working with arrays in PHP. Displaying content of array in PHP is not so complicated for simple arrays, let's say for a single-dimensional array, but it can get nasty for multi-dimensional arrays. So, how to display content of a multi-dimensional PHP array?

.


How to check if string contains substring PHP

Once in a while we need to check whether a string contains substring, some other string or characters or a value. Checking for existence of a string (or substring) inside another string is easier than it might seem. The following article describes how to check for whether a string contains string in PHP, or simply said how to find string within string in PHP.

.


Difference between symbolic link and hard link

What is the difference between symbolic link and hard link? Explaining the difference between a symbolic link or a symlink and a hard link is easy and vital to knowing about how Linux/Unix environments work. Understanding the difference between a symbolic link and a hard link is also important for web server maintenance and understanding how modern websites work.

.


FollowSymLinks

FollowSymLinks is a directive in your web server configuration that tells your web server to follow so called symbolic links. As one would expect, FollowSymLinks is an acronym for Follow Symbolic Links. FollowSymLinks is a very important setting that plays a role in your website security.

.


ISO 27001 (ISO/IEC 27001:2005)

ISO 27001 is a standard providing model for an implementation of an effective Information Security Management System (ISMS). ISO 27001 is also known under its more precise name ISO/IEC 27001:2005 and is closely related to another norm known under the name ISO 27002. Both ISO 27001 and ISO 27002 are together the standards that are used by organizations to implement systems to improve the security of their information and data.

.


Grid computing - distributed computing

Grid computing can be defined as a type of parallel and distributed system that enables sharing, selection, and aggregation of geographically distributed autonomous resources. Grid resources are assigned dynamically at runtime depending on their availability and capability.

.
.