Website Domain fundamental


Electronic mail Email is a big topic. Chapters 5 and 6 talked a little about the SMTP port 25 used for mail transfer, and they briefly mentioned Postfix and qmail, the two most viable mail transfer agents (MTAs) available now. There's more behind the MTA: for example, if you want to run an IMAP - Internet Message Access Protocol server, you probably want the Cyrus package.

Domain Name Service-DNS  setting up a DNS server is trickier. The most common DNS server is BIND - Berkeley Internet Name Domain, but a newer DNS server named djbdns is also gaining popularity.

Web servers In the Unix world, Web server usually means Apache, the most popular Web server in the world. However, many scripting languages and other tools have embedded Web server features that can aid debugging, status monitoring, and other tasks not directly related to serving Web pages to the general public.

Virtual private networks -VPNs A VPN allows you to connect several widely dispersed machines in a virtual network  for instance, a single subnet. Administrators typically create a VPN in conjunction with the IPSec protocol so that they  can disperse sensitive data that might otherwise be behind a network firewall through an encrypted network channel across a possibly insecure link.

The screen program Did you ever want to take your shell session wherever you go? You can do it with the screen program, a terminal multiplexer that supports multiple shells, disconnection, reconnection, scrollback, cut and paste, and more. This utility is a perennial favorite among seasoned Unix wizards. If you want some of the same functionality with a windowing system, check out VNC Virtual Network Computing.

DB files and DBM files When using many larger servers, you will encounter binary DB and DBM files.
 These files are very small databases that store blocks of data keyed by small strings, usually as
 some kind of hash table. For whatever reason, there are an absurd number of different DB/DBM file formats DB, GDBM, NDBM, and SDBM, to name a few. Most packages that use DBM-style files come with their own manipulation utilities for example, the postalias command that comes with Postfix, but scripting languages such as Perl include powerful interfaces that you can use if you need to do something beyond the ordinary with these database files.

Relational databases You can run the powerful MySQL and PostgreSQL database servers on Linux.
There are several commercial servers as well, but this book intentionally avoids talk of commercial software products.

RCS and CVS The Revision Control System RCS is a way to track file revisions. Originally meant for software development, many systems administrators use RCS to control important system files so that they have a record of who made each change and in theory, so that they can back out of harmful changes, though this rarely comes up in practice. The Concurrent Versions System CVS is a network-extensible revision control system that can handle several versions of the same package at once.

Pluggable Authentication Modules-PAM If you don't like the system of passwords in /etc/passwd, you can replace it  with a PAM module that supports some other scheme.

Network Information Service - NIS: NIS is a terrifying combination of RPC and DBM files, used by many systems to provide networked information such as passwd and group. It is an old system that isn't particularly robust, secure,  or pleasant, but it is supported by most Unix platforms.

Kerberos This is a powerful network authentication system.

Lightweight Directory Access Protocol -LDAP: LDAP serves a bunch of data entries to network clients as NIS does, except that where NIS allows only a single key per data entry, LDAP supports a hierarchy of keys for entries. LDAP is very extensible; OpenLDAP is a popular open source LDAP server.

Network File System NFS This is the traditional method of sharing files across a network on a Unix cluster.
NFS is a somewhat clunky system that is still in use because most Unix systems support it. Plus, the alternatives  such as AFS Andrew File System, DFS Distributed File System, and 9P are too expensive, difficult to configure, and not terribly well understood.

Secure Sockets Layer-SSL: Many network servers now offer SSL support to authenticate and encrypt individual TCP connections with the same technology used for secure Web sessions. If you want to set up a server that supports SSL, be prepared to learn all about public keys, private keys, certificates, signing, and more.
seo marketing plan
Free SEO Analysis Tools
Mobile Seo Checklist
Seo algorithm
SEO Success Factors
seo marketing news
SEO Directory
SEO Spamming
seo marketing youtube
seo marketing term
Off-Page SEO Strategies
Top Google SEO Tips
Right sense SEO practices
classfied site in seo
SEO Companies USA
SEO Companies India
SEO Company New York
promoting web pages-seo
Seo Articles
Advanced SEO
SEO Research and Analysis
SEO Tips for Google
Create SEO Friendly URLs
Ranking Fluctuations-SEO
SEO marketing tips
video blogging for SEO
SEO and SEM strategy
Wp SEO advantages
Tips of Internet Marketing
Top ranking with Yahoo
SEO Keyword
SMO is Effective for SEO
magic-seoTips
Video Search Optimizing
Examining SEO and SMO
SEO tips-Adding Your Links
SEO strategies
SEO fanda-The nofollow
Mobile SEO optimizing
Internet Marketing for B2B
Ranking Factors
Internal link architecture
Search Engine Indexing
Seo Traffic Sources
seo tips for wordpress
Top Blog Tips
What SEO tools do you use
Business With SEO
Link metrics
Facebook Custom seo
What is SEO Writing
Optimize Site Speed
Search Marketing Metrics
sitemap SEO
Domain Name Keywords
Cracker Seo Tips
Drupal's SEO tips
Bing Webmaster-seo-tools
Black Hat SEO
Small budget advertising
Additional SEO tips
eCommerce Tips
Twitter tools-seo

cost effective-vps

Vps hosting, windows vps, linux vps, managed vps hosting  sherweb
high performance vps bring you the control of a dedicated server with the
 affordability, flexibility, and simplicity of shared hosting.

Virtual private server :: nethosting.com afterburst previously fanatical vps
 specializes in unmetered vps solutions for all situations.

 Afterburst - awesome unmetered vps airport route map and statistical information valparaiso,
 ft walton beach vps. Vps the login details are case sensitive.

Copahost - shared hosting, dedicated servers and vps hosting if you are looking for cheap
vps hosting, hostforweb is your best choice, offering fully managed vps, cpanel vps
hosting and linux vps hosting.

http://www.godaddy.com/hosting/vps-hosting.aspx

http://vps.net

https://www.ovh.co.uk/vps

http://www.hostgator.com/vps-hosting

http://www.vpspecialists.co.uk
http://www.dreamhost.com/servers/vps

http://glistenworld.com
http://domain-seller.biz
http://xanaresellerhosting.com
http://www.micfo.com
http://buyurl.net
http://physicaltherapycptcodes.com
http://www.bulkmailserverindia.com

http://www.hostbreak.com
nethosting.com vps hosting services openvz vps, xen & kvm virtual machines with cpanel
 unmanaged and fully managed virtual private servers with 24/7 support by host color.
Vps hosting - vps web hosting rating intovps provides reliable unmanaged vps hosting
at decent prices vps web hosting packages are available in us and europe.

Turbovps.com - cheap vps,linux vps, cheap windows vps, xen our virtual private server vps
 offering includes the rock solid performance our customers expect along with the
exclusive environment.

100webspace - free web hosting service and web space vps hosting solution for advanced
users the virtual private server actually represents a small dedicated server coming
at an affordable price you can manage your.

Linux vps, windows vps and xen vds hosting :: nqhost.com definition of vps hosting
vps web hosting is probably the most flexible and versatile, web hosting solution
available today it can be used for practically any web.

Virpus is a leader in cheap xen vps hosting as well as cloud vps hosting for both
linux and windows. Vps hosting, windows vps hosting, linux vps by dotblock the
northwest florida regional



Find the best virtual private server hosting for your business use a vps hosting to resell
 web hosting or to host multiple high traffic websites.


Vps swvps offer one of the most cost effective virtual private server vps solutions
 available on the internet all packages include a web based stop/start/restart utility.


Php Form Example


Since you'll need a place for the user to enter a search query, let's begin by building a form to handle the user's input. Every form must have these basic components:

The submission type defined with the method keyword

One or more input elements defined with the input tag

The destination to go to when submitted defined with the action keyword

A simple form with a text input field called search and a submit button.


<html>
 <head>
  <title>Test a Form</title>
 </head>
  <body>
  <form action="<?php echo($_SERVER['PHP_SELF']); ?>"
         method="get">
    <label>
          Search: <input type="text" name="search" />
     </label>
       <input type="submit" value="Add" />
   </form>
  </body>
  </html>









Strictly speaking, forms are defined purely by HTML, but we're using some
PHP code on line 6 to reference the super global PHP_SELF. This provides a
 shortcut to the name of the current PHP file that handles the submission
 of the form data.

SEO Tips on Conducting


From the most high-level perspective, user researchis the science of observing and
monitoring how we and our customers interact with everyday things such as websites
or software or hardware, and to then draw conclusions about how to improve those
customer experiences. Sometimes we do this in a lab environment (complete with
one-way mirrors and cameras pointed at the participants), other times we do this in
people’s native environments offices, homes, and still other times we use
surveys to monitor key metrics such as customer satisfaction and task completion rates.
The greatest benefit of user research is that it allows all of us to get really close
to our customers and get a real-world feel for their needs, wants, and perceptions of
interactions with our websites.

UCD methodologies represent the purest sense of customer centricity because
they allow you to engage in a dialogue with your customers in a way that you can’t
when using other methodologies. The UCD methodologies outlined in this chapter
empower you to reach a level of Why understanding that is missing from many other
methodologies. They move you from talking the talk to being able to walk the walk
when it comes to focusing your company/products/websites around customer centricity.

Lab Usability Testing
Lab usability testsmeasure a user’s ability to complete tasks. Usability tests are best for
optimizing User Interface (UI) designs and work flows, understanding the customer’s
voice, and understanding what customers really do. In a typical usability test, a user
attempts to complete a task or set of tasks by using a website or software or a product.
Each of these tasks has a specified goal with effectiveness, efficiency, and satisfaction
identified in a specified usage context.

A typical study will have eight to twelve participants. Early on during these tests,
patterns begin to emerge with as few as five users that highlight which parts of the
customer experience or process are working well and which are causing problems.

smo is effective for seo
creating outbound links seo tips
seo keyword tuning with ppc testing
top 10 e-commerce seo tips
tips for optimizing css
seo research and analysis
seo articles targeted clients
advanced techniques for seo

Analyzing the Data
1. As soon as possible, hold a debriefing session with all the observers so that
everyone can share their thoughts and observations.

2. Take time to note trends and patterns.

3. Do a deep dive analysis with a goal of identifying the root causes of failures based
on actual observations. (For example: The FAQ answers on the website were too
long. The Contact Us link was not apparent and hidden “below the fold.” It was
not clear that they could not contact us via phone. Or almost everyone complained
that their expectations were not set about when to expect a reply.) The moderator
is responsible for tallying successes and failures by each participant for each task.

4. Make recommendations to fix the problems identified. Usually you create a
PowerPoint deck that collects all the scores. Then for each critical task identify
the points of failure, make concrete recommendations that will improve the customer experience,
 and categorize the recommendations into Urgent, Important.

Features of MySQL Database server

MySQL is a relational database management system. Whether you’re involved with a Web site that processes millions of requests a day like eBay or Yahoo!, or a smaller site such as your own online shop or training course, the data must be stored in an organized and structured way for easy access and processing. This is handled by a database management system such as MySQL where the data is stored in tables rather than in a flat file.

MySQL uses the client/server model; that is, a database server (MySQL) that serves (communicates) with multiple clients application programs, where the clients may or may not be on the same computer. It also supports SQL, the structured query language, a standardized language used by most modern databases for working with data and administering the database.
MySQL software is open source. As discussed earlierin this chapter, open source means that it is possible for anyone to download MySQL from the Internet, and use and modify the software without paying anything. The MySQL software uses the GPL GNU General Public License, http://www.fsf.org/licenses/, to define what you may and may not do with the software in different situations. If you need to use MySQL code in a commercial application, you can buy a
commercially licensed version. See the MySQL Licensing Overview for more information
http://www.mysql.com/company/legal/licensing.
The MySQL Database Server is very fast, reliable, and easy to use. MySQL Server was originally developed to handle large databases much faster than existing solutions and has been successfully used in highly demanding production environments for several years. Its connectivity, speed, and security make MySQL Server highly suited for accessing databases on the Internet.
MySQL serves as a back end for all kinds of information such as e-mail, Web images and content, games, log files, and so on. The vps server can be embedded in applications such as cell phones, electronic devices, public kiosks, and more


Advantages of MySQL and PHP
Certain technologies play together better than others. PHP, a simple and powerful scripting language, and MySQL, a
solid and reliable database server, make a perfect marriage between two modern technologies for building databasedriven, dynamic Web sites. Some of the advantages of both PHP and MySQL are:
•  High performance
•  Built-in libraries
•  Extensibility
•  Relatively low cost
•  Portability
•  Developer community
•  Ease of learning
High Performance
PHP is no longer considered just a grassroots scripting language, but now with PHP 5, and its highly efficient built-in
Zend engine, PHP accommodates developers and IT decision makers in the business trend to rapidly release and update
software on the Web faster than conventional programming cycles have allowed.
MySQL, a highly optimized database server, provides the response time and throughput to meet the most demanding applications.
With PHP scripts connected to a MySQL database, millions of pages can be served on a single inexpensive server.
Built-In Libraries
PHP comes with many built-in functions addressing common Web development tasks. Problems encountered by other
programmers have been solved and packaged into a library of routines, made available to the PHP community. The
official PHP Web site at http://www.php.netprovides excellent documentation explaining how to use all of the
functions currently available.
Extensibility
PHP and MySQL are both extensible, meaning that developers around the world are contributing add-on modules to
extend the functionality and power of the languages to stay current with the growing market needs and standards of the
day. You can also obtain the source code for both PHP and MySQL. Source code is the code that a program consists of
before theprogram is compiled; that is, the original building instructions of a program.
Relatively Low Cost
As a Web developer you can demand a lot more money for your time if you can master PHP and MySQL. Because they
are open source projects, there is no licensefee associated with using PHP or MySQL. Because both applications run on
almost any platform, you also have a wide range of hardware choices lowering the total cost of ownership. With so
many qualified PHP developers sharing information on the Web, and excellent online documentation, you can get the
most up-to-date, reliable information without paying for it.
Portability
PHP and MySQL run on almost any platform, including Linux, Windows, Mac OS X, FreeBSD, Solaris, and so on. If
well written, you can simply copy the code from one server to another and expect the same results, perhaps with some
minor adjustments.
Developer Community
Both PHP and MySQL have a huge following in the development community. If you run into a problem, you can
usually very quickly find support on the Web, where your problem can be posted, identified, and resolved by other
users and developers sharing your problem. Developers worldwide are constantly finding and resolving bugs and
security holes, while working to keep these languagesup-to-date and optimized.
Ease of Learning
PHP and MySQL are relatively easy to learn. Most of the PHP constructs are similar to other languages, specifically
Perl, making it familiar to most developers. MySQL uses the SQL query language and English-like language used by
most modern database management systems today. If you have had any experience with SQL, you will find using it
with MySQL an easy transition.

What is Software?

One way to describe the hardware of a computer system is that it provides
a framework for executing programs and storing files. The kinds of programs
 that run on Linux platforms vary widely in size and complexity, but tend to
 share certain common characteristics. Here is a list of useful facts
concerning Linux programs and files.

A file is a collection of data that is usually stored on disk, although some
files are stored on tape. Linux treats peripherals as special files, so that terminals,
 printers, and other devices are accessible in the same way as disk-based files.

A program is a collection of bytes representing code and data that are stored in a file.

When a program is started, it is loaded from disk into RAM actually, only parts of
it are loaded, but we'll come to that later. When a program is running it is called
 a process.

Most processes read and write data from files.

Processes and files have an owner and may be protected against unauthorized access.

Linux supports a hierarchical directory structure.

Files and processes have a "location" within the directory hierarchy.
A process may change its own location and/or the location of a file.

Linux provides services for the creation, modification, and destruction
of programs, processes, and files.

Computers Basics for Beginners



Computers Basics for Beginners

Hardware
Computer systems, whether large or small, multi-user or single-user, expensive or cheap,
include most of the following pieces of hardware:

 Central Processing Unit-CPU
This reads machine code instructions in a form that a computer can understand from
 memory and executes it. A CPU is often likened to the "brain" of a computer.

 Bus
This is the connection, or data path, between the CPU and the system memory and devices
 of a computer system. All data that moves from a disk drive into memory, or from memory
 to the CPU, travels across the system's bus.

Random Access Memory-RAM
This holds the machine code and data that are accessed by the CPU. RAM normally
forgets everything it holds when the power is turned off.

Read-Only Memory ROM
This holds both machine code and data. Its contents may not be changed and are
remembered even when the power is turned off.

Disks
These hold large amounts of data and code on a magnetic or optical medium, and
remember it all even when the power is turned off. Floppy disks are generally removable,
 whereas hard disks are not. Hard disks can hold a lot more information than floppy disks.

CD-ROM Drive
These allow digitally published information on a compact disc to be read by the computer.
 The information may be in a data stream or may constitute a file system that the
operating system can read as if it were on a hard disk drive.

Monitors
These display information and come in two flavors: monochrome and color. Monochrome
monitors are rare in newer computer systems.

Graphics Card
These allow the CPU to display information on a monitor. Many graphics cards have
on-board processors to decrease the load on the system processor.

 Keyboard
This allows a user to enter alphanumeric information. There are several different
kinds of keyboards available, depending partly on the language of the user. For example,
 Japanese keyboards are much larger than Western keyboards, as their alphabet is much
 larger. The Western keyboards are often referred to as QWERTY keyboards, as these are
the first six letters on the upper left-hand side of the keyboard.

Mouse
This allows a user to position things easily on the screen using short movements
 of the hand. Most mice have tails that connect them to the computer, but some
have radio or infrared connections that make the tail unnecessary.

 Printer
These allow a user to obtain hard copies of information. Some printers print characters
only, whereas others may print graphics.

Tape
These are generally used for making backup copies of information stored on disks.
They are slower than disks but store large amounts of data in a fairly cheap way.

Modem
A modem allows you to communicate with other computers across a telephone line.
 Different modems allow different rates of communication. Most modems even correct
 for errors that are caused by a poor telephone connection.

 Network Interface
A network interface card NIC allows your computer to communicate with other
computers across a high-speed link.

Other Peripherals
There are many other kinds of peripherals that computer systems can support,
including graphics tablets, optical scanners, array processors, sound cards,
voice recognition cards, and synthesizers to name a few.


TCP/IP Network Addresses-hosting



This kind of address is still in wide use and is what people commonly refer to as an IP address. Part of an IP address is used for the network address, and the other part is used to identify a particular interface on a host in that network. You should realize that IP addresses are assigned to interfaces-such as Ethernet cards or modems-and not to the host computer. Usually a computer has only one interface and is accessed using only that interface's IP address. In that regard, an IP address can be thought of as identifying a particular host system on a network, and so the IP address is usually referred to as the host address.





In fact, though, a host system could have several interfaces, each with its own IP address. This is the case for computers that operate as gateways and firewalls from the local network to the Internet. One interface usually connects to the LAN and another to the Internet, as by two Ethernet cards. Each interface (such as an Ethernet card) has its own IP address. For example, when you use the Red Hat Network Configuration tool to specify an IP address for an Ethernet card on your system, the Devices panel lists an entry for each Ethernet card installed on your computer, beginning with eth0 for the first. Opening up a Device window, you can select the TCP protocol in the Protocols panel to open a TCP/IP setting window where you can enter the card's IP address. Other Ethernet cards have their own IP addresses. Currently, the Linux kernel can support up to four network adapters. If you use a modem to connect to an ISP.

Originally, IP addresses were organized according to classes. On the Internet, networks are organized into three classes depending on their size-classes A, B, and C. A class A network uses only the first segment for the network address and the remaining three for the host, allowing a great many computers to be connected to the same network. Most IP addresses reference smaller, class C, networks. For a class C network, the first three segments are used to identify the network, and only the last segment identifies the host. Altogether, this forms a unique address with which to identify any network interface on computers in a TCP/IP network. For example, in the IP address 192.168.1.72, the network part is 192.168.1 and the interface/host part is 72. The interface/host is a part of a network whose own address is 192.168.1.0.

In a class C network, the first three numbers identify the network part of the IP address. This part is divided into three network numbers, each identifying a subnet. Networks on the Internet are organized into subnets, beginning with the largest and narrowing to small subnetworks. The last number is used to identify a particular computer, referred to as a host. You can think of the Internet as a series of networks with subnetworks; these subnetworks have their own subnetworks. The rightmost number identifies the host computer, and the number preceding it identifies the subnetwork of which the computer is a part. The number to the left of that identifies the network the subnetwork is part of, and so on. The Internet address 192.168.187.4 references the fourth computer connected to the network identified by the number 187.

An IPv6 address is written as 8 segments representing 16 bits each 128 bits total. To more easily represent 16 bit binary numbers, hexadecimal numbers are used. Hexadecimal numbers use 16 unique numbers, instead of the 8 used in octal numbering. These are 0 through 9, continuing with the characters A through F.
In the following example, the first four segments represent the network part of the IPv6 address, and the following four segments represent the interface (host) address.
FEC0:0000:0000:0000:0008:0800:200C:417A
You can cut any preceding zeros, but not trailing zeros in any given segment. Segments with all zeros can be reduced to a single zero.
FEC0:0:0:0:8:800:200C:417A
The loopback address used for locahost addressing can be written with seven preceding zeros and a 1.
0:0:0:0:0:0:0:1
Many addresses will have sequences of zeros. IPv6 supports a shorthand symbol for representing a sequence of several zeros in adjacent fields. This consists of a double colon ::. There can be only one use of the :: symbol per address.
FEC0::8:800:200C:417A

 

mysql_query-executes query



mysql_query function  executes query on the default database, set using mysql_select_db() or by a previous query using mysql_db_query(), on the MySQL server connection referenced by connection . If no connection handle is specified in the connection argument, the last connection opened is used by default. If no connection is open, mysql_query() attempts to connect to a MySQL database by calling mysql_connect() without arguments.


The value returned depends on the query. SELECT, DESCRIBE, EXPLAIN, and SHOW queries return a MySQL result handle if successful and FALSE if they fail. Note that these types of queries are considered to have failed only if they're malformed. Other query types return TRUE on success and FALSE on failure.


To find the number of rows affected by a query:

mysql_num_rows() 
To set the default database:
mysql_select_db() 
To retrieve data from a query:
mysql_fetch_array() 
mysql_fetch_assoc() 
mysql_fetch_object() 
mysql_fetch_row() 
mysql_result() 
To query a specific database:
mysql_db_query() 
 
 

mysql_result() fetches a single field from a MySQL result set. The function accepts two or three arguments.

The first argument should be a MySQL result handle returned by mysql_db_query() or mysql_query().
The second argument should be the row from which to fetch the field, specified as an offset. Row offsets start at 0.

The optional last argument can contain a field offset or a field name. If the argument is not set, a field offset of 0 is assumed. Field offsets start at 0, while field names are based on an alias, a column name, or an expression.

PHP's variable-related functions


PHP's variable-related functions are a key part of the language. Skilled programmers rely on them extensively to build robust code that uses type-checking. Functions like var_dump() and print_r() are also invaluable when debugging.
Here is a quick, task-based overview of the function group:
  • Cast a value from one type to another: doubleval(), intval(), strval()
  • Set the type of a variable: settype()
  • Determine the type of a variable: is_array(), is_bool(), is_double(), is_float(), is_int(), is_integer(), is_long(), is_null(), is_numeric(), is_object(), is_real(), is_resource(), is_scalar(), is_string(), get_resource_type(), gettype()
  • Destroy variables: unset()
  • Gather information about variables: empty(), get_defined_vars(), isset(), print_r(), var_dump()
  • Serialize and unserialize variables: serialize(), unserialize()


    Print the entire $GLOBALS array using PHP's functions for processing associative arrays:

    <?php
    reset($GLOBALS);
    while (list($key, $var) = each($GLOBALS)) {
        print "$key => $var\ n<br>\ n";
    }
    ?>
    

    The example uses PHP's list functions and each  functions to iteratively process the $GLOBALS array. It then prints the keys (names of the variables stored in the $GLOBALS array) and their corresponding values.

     PHP debugging
    var_dump functions displays information about variables in a simple, readable format. This function is very useful when debugging—providing a simple and easy way to display the current contents of one or more variables.
    For simple scalar variables such as booleans, integers, strings, and doubles, the type of the variable is printed, followed by an opening bracket, the value contained in the variable, and a closing bracket.
PHP Functions
Php tutorial - imagemagick
php.ini Basics
PHP Sessions
Cookies Versus Sessions
PHP Web-Related Variables
PHP ERRORS
maximum size of a file uploaded
Php Image upload
php file_get_contents
MySQL Data on the Web
What are GET and POST
php and pdf
$_ENV and $_SERVER
PEAR with php
SELECTING DATA PHP
prevent hijacking with PHP
LAMP
PHP MySQL Functions
PHP Zip File Functions
Substrings PHP
PHP Variable names
PHP magic methods
How to get current session id
Add variables into a session
$_GET , $_POST,$_COOKIE
different tables present in mysql
PHP CURL
php Sessions page
PHP-sorting an array
PHP-count the elements of array
Operators for If/Else Statements
PHP file uploading code
PHP global variables
Testing working using phpinfo
PHP Code for a Valid Number
PHP-Associative Arrays
PHP mvc tutorial
PHP get_meta_tags-Extracts
difference between print and echo
PHP best tutorial-PHP variables
Reading DOC file in PHP
PHP interview questions
convert time PHP
PHP implode array elements
header function-PHP
PHP-Renaming Files Directories
PHP Classes
in_array function in PHP
keep your session secure PHP
Web Application with PHP
What is SQL Injection
PHP-extract part of a string
PHP urlencode
PHP- know browser properties
PHP- Extracting Substrings
Checking Variable Values /Types
PHP-best 20 Open Source cms
IP AddressPHP
PHP-Scope Resolution Operator
how create new instance of object
how eliminate an object
PHP- ob_start
XML file using the DOM API
PHP- MVC
PHP- CAPTCHA
PHP- Position of a Value in an Array
PHP-Mail Functions
PHP-difference include vs require
calculate the sum of values in an array
PHP-total number of rows
Show unique records mysql
MySQL Triggers
MySQL data directory
MySQL Subqueries
PHP- Networking Functions
PHP- Operators
Restore database
Conditional Functions mysql
PHP-function overloading
Friend function
mysql_connect /mysql_pconnect
PHP-Error Control Operators
what is IMAP
Apache-Specific Functions
Send Email from a PHP Script
SQL inherently
WAMP, MAMP, LAMP
Php tutorial-SYMBOLS
Table Types-MySQL
PHP-Encryption data management
PHP Array
Running MySQL on Windows
Maximum Performance MySQL
XML-RPC
PHP-static variables
Advanced Database Techniques
FTP
Codeigniter
Apache Pool Size
Why NoSQL
MySQL Server Performance
Database software
SQL Interview Answers
PHP Redirect
PHP Interview Questions with Answers
Advanced PHP

Multi material 3d printers

3d systems offers high speed multi-material printer 3d  the new projet
 5500x by 3d systems was created for serious designers working in grand
scales with multiple materials in mind according to 3d systems, the new
printer. Multi-material 3d printing technology popular 3d printers what
appears to be a first in 3d printer technology for rapid prototyping is
 the ability to fabricate parts and assemblies made of multiple materials-such
 as hard and. Connex 500 multi-material 3d printer multi-material
composite materials 3d printer large, high-quality multi-material parts
 in a single build 3d systems projet 5500x delivers the highest quality.


Stratasys 3d printing technology creates lifelike multi multi-material 3d printer
 what appears to be a first in 3d printer technology for rapid prototyping building
 a part one layer at a time using a method of. 3d printer tx com multi color 3d
printers, costs rendering models using a variety of materials allows a finished
object to be viewed and analyzed before committing to cutting wood or printing
 plastic.

Nargis Fakhri-gr8 dasi actress



Nargis Fakhri is now gr8 Bollywood actress.

She is an American model and actress.

Set Google Reader Offline-new data

Google Gears is a Google-powered open source project aiming to allow  web site publishers to make a part of their application available offline.

 Not too many web sites have this feature enabled yet, but those that do allow you to use some parts of their application even when you're not connected to the Internet. Google Reader is one of the applications that is partially Gears-enabled.

To give this feature a try, log in to Google Reader at http://reader.google.com.
 You need to have the Firefox 1.5+ browser to get this to work, or, on Windows XP/ Vista,
 you can use Internet Explorer 6+ as well. In Reader, click the Offline link on top.
You will be taken through a Google Gears installation.


You will notice a new green arrow in the top navigation bar. This means that
you're in online mode—click the arrow to go into offline mode. The first time
you switch into offline mode, up to 2,000 articles from your subscribed Google
Reader feeds will be downloaded for you. After the download is done, you can
 disconnect from the Internet and still read some of your feeds.

Note that because Google Gears is a browser extension and not just a feature
of the web site, you need to install Gears on every computer on which you
want to use these offline capabilities.

Sends a message via mail function in PHP

mail function allows you to send email directly from a PHP script. recipient can be
 either a single email address or a comma-delimited list of addresses.
 If you want to set extra headers—for instance, in order to use Cc: or
 Bcc:—these may be placed in a newline-delimited string in the extra_headers
 parameter. As of PHP  you can also specify extra arguments to the
 system mail program in the extra_arguments parameter.

<?php

$to = "example@gmail.com";
$subject = "example test";
$body = "test message test message  test message test message.";
$headers = "From:Deba\r\n";
$headers .= "Reply-To: example@testsite.com\r\n";
$headers .= "Return-Path: example@testsite.com\r\n";
$headers .= "X-Mailer: PHP5\n";
$headers .= 'MIME-Version: 1.0' . "\n";
$headers .= 'Content-type: text/html; charset=iso-8859-1' . "\r\n";
mail($to,$subject,$body,$headers);
?>


TRUE is returned if the function completes successfully;
 otherwise, FALSE is returned. However, this gives no indication as to
 whether the email ever reached its destination. This function fails
if any of recipient , subject , or message is left out, or if the
system's mail program fails for some reason.

Domain squatting-Host a subdomain


Most web users would arguethat purchasing a domain name in the hopes that one day somebody
might want to use that domain name and then buy it from them for a
large amount of money is a little unethical. On the other hand, there
are times when you might come up with a brilliant idea for a site, or
what you think is a brilliant name, but you don’t have time to use it
immediately; still, you want to register it before someone else comes
up with the same brilliant idea.

 If you have a network-available backup system, putting in a dedicated network for hosts that will use it can be a big win. Some systems may eventually need to go to Gigabit Ethernet or trunked Ethernet. Backup systems, high-throughput NFS servers, and databases are common applications that end up being network bound on 100Mb Ethernet networks. Some Web systems, such as static image servers running high-speed Web servers such as Tux or thttpd can be network bound on Ethernet networks.


 Whatever your reason for purchasing
extra domain names, when you purchase them, redirecting them either
to your main website or another site of your choice is generally a better
idea than leaving them doing nothing.

Services by Full Descriptive Names
Another good design principal that is particularly essential for safe code cohabitation is to reference services by full descriptive names. I often see application designs that reference a database called dbhost and then rely on dbhost to be specified in the /etc/hosts file on the machine. As long as there is only a single database host, this method won't cause any problems.

So web users who type in the
domain name are automatically redirected to your primary domain. If
you want the domain name to redirect somewhere other than the root of
your primary domain, then click Manage Redirection.

You may be wondering now if I’m suggesting that you should spend all your
hard-earned cash on every domain name that you can think of. Don’t worry;
that’s not exactly what I’m suggesting. It is good to think about your visitors
and try and put yourself in their shoes for a moment and consider whether
purchasing additional domain names would be useful to both them and you.
You don’t need to bankrupt yourself on just-in-case domain names, though.
Exactly how you redirect the domain name differs depending on the facilities
your domain name registrar gives you. If the registrar does not give you the
right facilities, it then depends which control panel is used for your hosting.
As an example, I show you how to redirect domain names using cPanel and,
regardless of which system you use, the basic concept is the same.

Host a subdomain on a separate server


reasons for using subdomains and sometimes a subdomain in itself may
take up so much server resources that it needs to be on its own server.
For example, if you have a support site at support.yourdomain.com,
that site might provide downloads and other forms of resource-intensive
assistance. You can use the DNS to point users to your primary server
for your main website and then to a secondary server for your support
site even though they have the same domain name .


some performance issues and creates a number of hurdles that developers must overcome to write compatible code. In practice, it is most useful in hosted serving environments to ensure that users do not violate each other's privacy and security. 
Top 50 free web hosting site

Internet Protocol Security



Several projects currently provide development and implementation of IPsec tools. The original IPsec tools are provided by the KAME project, www.kame.net. Current versions can be obtained from souceforge.net/projects/ipsectools. RPM packages can be obtained from rpmfind.net. Other IPsec tool projects include the Free Secure/Wide Area Network project (FreeS/WAN) at www.freeeswan.org, which provides a Linux implementation of IPsec tools, and VPN Consortium (VPNC) at www.vpnc.org, which supports Windows and Macintosh versions. FreeS/WAN provides both Red Hat RPM packages and source code for their tools.


IPsec is made up of several protocols that provide authentication (AH), encryption (ESP), and the secure exchange of encryption keys (IKE). The Authentication Header protocol (AH) confirms that the packet was sent by the sender, and not by someone else. IPsec also includes an integrity check to detect any tampering in transit. Packets are encrypted using the Encapsulating Security Payload (ESP). Encryption and decryption are performed using secret keys shared by the sender and the receiver. These keys are themselves transmitted using the Internet Key Exchange protocol, which provides a secure exchange. ESP encryption can degrade certain compression transmission methods like PPP for dialup Internet connections. To accommodate these compression methods, IPsec provides the IP Payload Compression Protocol (IPComp), with which packets can be compressed before being sent.
The AH, ESP, and IPComp protocols are incorporated into the Linux kernel. The IKE protocol is implemented as a separate daemon. It simply provides a way to share secret keys, and can be replaced by other sharing methods.


Alia Bhatt-the Prince

Alia Bhatt-the Prince







tips Harm Prevention pc


Harm Prevention pc

You may use any of these methods to remove
unwanted programs:
•  Use Windows’ add/remove programs .
•  Use the PC Decrapifier .
•  Use Revo Uninstaller best.
Using only one of these methods is sufficient.
Use Windows’ Add/Remove Programs
The easiest way to remove programs is to use Windows’
Add/Remove programs. While this method is the easiest, it is
not the best because programs, even after removal, leave junk
on your hard drive. I recommend Revo Uninstaller if you want
to completely remove a program. To remove a program:
1.  Click Start > Run or use Winkey+R.
2.  Type appwiz.cpl and press Enter.
3.  Click the program you want to remove.
4.  Click Uninstall and follow the on-screen prompts.
Use the PC Decrapifier
If you have a newer PC, there may be a lot of trial software,
coined “bloatware”. The PC Decrapifier is designed to remove a
specific list of unwanted software in an unattended fashion.
The PC does not need to be new; however, the older the PC is,
the less likely it will have any of the software it can detect.


Simply download PC Decrapifier, and run the EXE. There is no
installation necessary. Your anti-virus software may complain
about this program; however, these warnings can be safely
ignored.
When it runs, you will be presented with a wizard-style dialog
box that steps you through the entire process. You will be able
to pick and choose what programs you want to remove. The
program will not remove anything, without prompting you first.
Click the Next button and it will begin cleaning your PC. If it
does not find anything, a pop-up box will notify you of this and
the program will exit and not modify your PC.
Use Revo Uninstaller
The final, and most thorough method, of software removal is to
use Revo Uninstaller. Revo Uninstaller is primarily designed to
ensure programs are properly removed from your computer.
Revo is freeware and is available to all those who want to
ensure their computer is clean and working at its best.
Download Revo Uninstaller.
Installing Revo is a simple as any other program. Once you’ve
installed and started Revo, you are presented with a list of
currently installed programs:

Learn PhP By Code

PHP - Echo example

           <?php
             $myString = "Hi! This is a test";
              echo $myString;
             echo "<h1>PHP!</h1>";
           ?>


PHP - Strings example
    
    <?php
    $test_string = "tips-tech";
    echo "tech tips- php";
    echo $test_string;
    ?>


PHP - Syntax  example

     <?php
     ?>

    Hi this  is php

     <?
     ?>

PHP - Include File example

      <?php include("test.php"); ?>
          <p>How test.php include  to  a  php page </p>
          

PHP- Defines Constants

             <?php
              define("MYTEXT", "hi!frnd");
             echo MYTEXT;
            ?>

PHP If...Else loop

      <?php
             $k=1;
          if ($k==1)
          {
          echo "k is 1";
          }
          else
          {
          echo "k  is  not 1!";
          }
     ?>           

PHP  Switch loop

       <?php
             $txt="read";
            switch ($txt)
            {
              case "read":
               echo "Your are reading!";
                break;

              case "Writing":
               echo "Your are Writing!";
               break;
           
             default:
               echo "Your are seeping!";
        }
       ?>

PHP File demo code

   <?php
       $ft = fopen("testfile.txt", "r");
    ?>

    

   <?php
      $tsFile = "File.txt";
      $ft = fopen($tsFile, 'r');
      $fData = fread($ft, 5);
       fclose($ft);
      echo $fData;
   ?>


PHP File Upload

    <form enctype="multipart/form-data" action="upload_page.php" method="POST">
        <input type="hidden" name="MAX_FILE_SIZE" value="100000" />
         file to upload:
           <input name="loadedfile" type="file" /><br />
          <input type="submit" value="Upload" />
      </form>

    
   
    multipart/form-data is used when a form requires binary data, like the contents of a file for uploader
  
     <?php
        
         $target_path = "upload-store/";
         $target_path = $target_path . basename( $_FILES['loadedfile']['name']);
         $_FILES['loadedfile']['tmp_name'];
     ?>    
  
    <?php
    if(move_uploaded_file($_FILES['loadedfile']['tmp_name'], $target_path))
     {
     echo "The file ". basename( $_FILES['loadedfile']['name'])." uploaded Successfully";
     }
     else
      {
       echo "error!!!!!";
       }

     ?>



PHP Session
  
    session_start() function is used for start the session.
   
    <?php
     session_start();
     $_SESSION['testname'] = "Lisa"; // records the session data
      echo "Hi! = ". $_SESSION['testname']; //get session data of $_SESSION['testname']
      ?>

iball Andi5-E7

The new

iball andi 4

5z is a bang on in the mobile market with a powerful
 processor and a gorgeous camera quality that will enhance the experience
of having a smartphone.

Powered by Android, the stylish iBall Andi Smart Phone keeps you a step ahead.
 If that's not enough, don't miss the large touch screen, excellent sound,
long battery life and much more

    12.7cm (5.0"), (854x480) FWVGA High Quality Display
    Beautiful Sleek & Slim design of 10.1mm thickness
    Powerful Dual Core 1.3GHz Cortex A7 Advanced Processor
    512MB RAM
    Android 4.2.2, Jellybean

5.0MP Enhanced rear Camera with LED flash Light
Android 4.2.2 Jelly Bean

Top 10 Online screen sharing app

  Online screen sharing

  free and safe  web base app.
Free Screen Sharing and Online Meetings.Instant Screen Sharing. web-based screen sharing.

http://www.screenleap.com
http://screenhero.com
http://www.crossloop.com/download.htm
http://www.showmypc.com
https://join.me            
http://mingleview.com
http://shop.livelook.com                 
http://vyew.com/s
http://www.showscreen.com
http://seeyell.com