php best tutorial-php variables

PHP automatically creates variables for all the data it receives in an HTTP request. This can include GET data, POST data, cookie data, and environment variables. The variables are either in PHP's global symbol table or in one of a number of superglobal arrays, depending on the value of the register_globals setting in your php.ini file. 
 
 
$_GET
GET-method variables. These are the variables supplied directly in the URL. For example, with http://www.test.com/page.php?a=21&b=22, $_GET['a'] and $_GET['b'] are set to 21 and 22, respectively.
$_POST
POST-method variables. Form field data from regular POST-method forms.
$_COOKIE
Any cookies the browser sends end up in this array. The name of the cookie is the key and the cookie value becomes the array value.
$_REQUEST
This array contains all of these variables (i.e., GET, POST, and cookie). If a variable appears in multiple sources, the order in which they are imported into $_REQUEST is given by the setting of the variables_order php.ini directive. The default is 'GPC', which means GET-method variables are imported first, then POST-method variables (overriding any GET-method variables of the same name), and finally cookie variables (overriding the other two).
$_SERVER
These are variables set by your web server. Traditionally things like DOCUMENT_ROOT, REMOTE_ADDR, REMOTE_PORT, SERVER_NAME, SERVER_PORT, and many others. To get a full list, have a look at your phpinfo( ) output, or run a script like the following to have a look:
<?php
  foreach($_SERVER as $key=>$val) {
    echo '$_SERVER['.$key."] = $val<br>\n";
  }
?>
$_ENV
Any environment variables that were set when you started your web server are available in this array.

Web-Based MySQL Administration

Web-Based MySQL Administration

At http://phpwizard.net/phpMyAdmin you will find a PHP Web application that can help you manage MySQL. It enables you to manage a MySQL database using a browser and makes administrative work much simpler.

BlueSQLFree web based Database management. 



After you have installed PHP and MySQL, you are ready to install phpMyAdmin. The work done while preparing for IMP has also prepared the system for phpMyAdmin. You do have to edit one of the . php3 files in phpMyAdmin to enter the MySQL database name and password.
With phpMyAdmin, you can create and drop databases and tables. You can also add and remove fields and perform other administrative chores.

Navicatanother option,
I have found phpMyAdmin to be very useful when trying to create or delete tables. After you have filled out a form that describes the table, it generates the SQL for you. You can use this information to create script files for later use.
For now, phpMyAdmin has some bugs. I have had it crash on me several times. However, its usefulness is good enough for me to ignore the occasional crash.
From a security point of view, phpMyAdmin is terrible. After it is installed, everyone who uses that Web page has unrestricted access to the MySQL database. I strongly recommend that you do not put your server on the Internet with phpMyAdmin active. If you do, you must configure your Web server to serve only the phpMyAdmin Web pages to your local network. You should also protect the Web pages with a password. Be careful!

Adminer

Open Source db manage tool.

HeidiSQL

Open Source 
HeidiSQL is a  Windows based interface for MySQL databases

make website search engine friendly

Website Submission the most important  process of web promotion of any website.


Facebook, Twitter, Pinterest, YouTube, and Google+,facebook page creation,dmoz listing-
This is increase traffic and  visitors to the targeted key place.


Add  Content to article Network.

Make  provide quality content to  improve your rankings.

Make a beautiful website and friendly interface.

Add small images for less loading time.

Add sitemap for the website.

Additional SEO tips-increase traffic,ranking

quality content
Search engines see quality contentand love it.

Keyword research
Keyword research helps you strategically create your site fast listing.
keyword research can help you tremendously.You are a messenger for the
search engines, and therefore, keyword research tools,directory listings,
traffic analysis software that is  price the core range of the small/big business.

Add  an alt tag on every image.

Make LinkedIn profiles -That can be optimized the search.
Make Facebook Pages -That can be optimized for search.
Google+ It helps for getting  visitors.



Article exchanges-
You publish  article on  many site. your article on the top
ten website, with a link back to your site.

Make Each page has a good  meta tag.


Find relevant text & links which Helps engines to indexing.

GET Linls and visitors
Review Posting
Blog commenting
Social Bookmarking Submission
Article directories
Video Submission
Forum posting
Rss Feed Submission
Article submission sites list
Fast Load time
internet users  feel frustrated as they wait for page to load.
Add smaller images for fast load.

built  a powerful Networks
connect with many ppl,website,add Twitter as Twitter tool.

Twitter tools-seo techniques

Twitter tools is very nice seo techniques today.
It  help you find more followers, manage private messages, sends alerts,sharing photos

Twitter Search 
http://search.twitter.com
Twitter search engine 

TweetGrid
http://tweetgrid.com/
Twitter search dashboard

Hashtags
http://hashtags.org/
Directory of hash tags on Twitter

GroupTweet
http://grouptweet.com
Send private messages to a group

TweetBeep
http://tweetbeep.com
This site sends alerts when people are tweeting about you .

TweetDeck
http://tweetdeck.com/beta
 This app allows integrated Twitter and Facebook activities

TweetMeme
http://tweetmeme.com
Tool that tracks most popular links on Twitter

Twellow
http://www.twellow.com
Twitter directory, search etc

Twitpic
http://twitpic.com
This is  for sharing photos on Twitter

MySQL Server Performance

To make things  easier for administrators.
  • Minimal memory, relatively infrequent MySQL usage: my-small.cnf
  • Minimal memory combined with reliance on MySQL, or larger memory for a multipurpose system: my-medium.cnf
  • Large memory server dedicated primarily to MySQL: my-large.cnf
  • Very large memory server completely dedicated to MySQL: my-huge.cnf
It's worth your time to review these files, if for no other reason than to gain some ideas on the optimal ratios between the various server settings.

  • Connectivity
  • Memory management
  • Application control
  • User resource control

PHP variable-related functions

  • Cast a value from one type to other type:- doubleval(), intval(), strval()
  • Set  type of a variable:- settype()
  • Verify  the type of a variable:- is_array(), is_bool(), is_double(), is_float(), is_int(), is_integer(), is_long(), is_null(), is_numeric(), is_object(), is_real()is_scalar(), is_string(),gettype()
  • Destroy variables:- unset()
  • Get info of variables:- empty(), get_defined_vars(), isset(), print_r(), var_dump()

TCP/IP Firewall

The combined set of protocols is called the Transmission Control Protocol and Internet Protocol TCP/IPprotocol suite.

As a network administrator, it is important that you understand the nature of potential attacks on computer security. We'll briefly describe the most important types of attacks so that you can better understand precisely what the Linux IP firewall will protect you against. You should do some additional reading to ensure that you are able to protect your network against other types of attacks. Here are some of the more important methods of attack and ways of protecting yourself against them:

Unauthorized access
This simply means that people who shouldn't be allowed to use your computer services are able to connect to and use them. For example, people outside your company might try to connect to your company accounting host or to your NFS server.
There are various ways to avoid this attack by carefully specifying who can gain access through these services. You can prevent network access to all except the intended users.


A malicious person who gains access to a computer system may guess system passwords or exploit the bugs and idiosyncratic behavior of certain programs to obtain a working account on that host.

Network Security Configuration

Installed your Linux system, you should keep some basic security measures to protect your system
    Firewalls, intrusion protection, encryption, data integrity, and authentication are ways of protecting against such attacks.
    • A firewall prevents any direct unauthorized attempts at access.
    • Intrusion detection checks the state of your system files to see if they have been tampered with by someone who has broken in.
    • Encryption protects transmissions by authorized remote users, providing privacy.
    • Integrity checks such as modification digests guarantee that messages and data have not been intercepted and changed or substituted en route.
    • Authentication methods such as digital signatures can verify that the user claiming to send a message or access your system is actually that person.


      system is also a gateway for a private network, the system's firewall capability can effectively protect the network from outside attacks.

      Linux security- the ones with which every user has experience are passwords and file permissions.

    Linux Software websites

     Linux Software websites
    Internet Sites
    Description
    Red Hat distribution RPM packages
    RPM package repository
    Source Forge open source software repository and development site
    New Linux software
    KDE software applications
    GNOME software applications