Apr 07, 2011 — 3 comments
This topic covers how to setup and generate a live data feed for Google Merchant using PHP and MySQL outputting an xml file on the fly.
Learn to implement a Facebook like comments system in your application using PHP, mySQL, jQuery, and AJAX. A step by step guide to make you understand the system and the code behind it. This system also gives protection against CSRF attacks.
You must be thinking why yet another AJAX comments system when there are plenty available online? The answer is simple. This one is perfect. You must check out this awesome PHP+jQuery+AJAX comments solution which also protects from CSRF/XSRF web attacks.
The first time when i used WordPress and created this site, i didn’t knew the concept of Installing WordPress on localhost as i was learning it through a book (Nice book – Missing Manuals WordPress) and they didn’t taught the same. Now there was no problem in that approach but i could have experiment more if it was my laptop , then on domain of a Web Server. It is so simple through XAMPP on windows machine that anyone can do it. Let begin installing XAMPP on Windows 7 laptop.
Learn about the powerful PDO wrapper for PHP which provides an easy way to access most databases. This tutorial will guide you through using it for several database types.
In this lesson we will cover most of the basic PHP knowledge and will learn how to create a very simple forum by using PHP and MySql database. If you are a PHP beginner this one should be right at your alley and most importantly, experiment and have fun!
Automated spam is wild now-a-days on the internet. Using this very simple method on your own custom made forms will eliminate any automated spam bot and stop spam on your website.
Protecting your WordPress Blog is very important and not so easy as you think. Every day your website suffers of more than hundred attacks that could harm your site. These attacks are often done most of the time by an automatic software, so in this article we will show you the most common dangerous attacks and how to protect your blog from hackers.
The term hacker used to be benevolent, but has since changed to become a term for evil-doers online who use their knowledge of technology to exploit others. Learn how they operate and how to deal with them.
Help us out! More and more tutorials are submitted to Good-Tutorials each day. We could use your help with finding good tutorials. Mind lending a hand?