1. CSS
  2. Flash
  3. HTML
  4. Illustrator
  5. Java
  6. JavaScript
  7. Maya
  8. Photography
  9. Photoshop
  10. PHP
  11. Ruby
  12. Ruby on Rails
  13. 3ds Max

Newest Tutorials

PHP » Security — over 8 years ago
A cryptographic hash function is a procedure that takes in a variable amount of data and returns a fixed-size bit string known as the data' signature or hash value.Among the hash functions the most widely used is by far MD5, but currently it's days are numbered because of breakthroughs in cracking it.
PHP » Database Interactions — over 8 years ago — reviewed, not listed
As of MySQL 5.0 built-in (native) functions, user-defined functions and stored functions are now supported by the mysql engine. Although these functions are widely available to the developer their use isn’t fully exploited. In this article I am going to present the top MySQL functions that come in handy.
PHP » Database Interactions — over 8 years ago — reviewed, not listed
Many sites need to get some random values from the database, for example to show a random imagine, quote or in case of online stores to show random products.
PHP » Basics — almost 9 years ago
Events enable a class or object to notify other classes or objects when something of interest occurs. The class that sends (or raises) the event is called the dispatcher and the classes that receive (or handle) the event are called event listeners.
PHP » Security — almost 9 years ago
XOR Encryption is a simple symmetric cipher in use in many applications where security is not a defined requirement. Exclusive-OR ( XOR ) encryption is almost unbreakable through brute force methods, although it is susceptible to patterns, it requires that both encryptor and decryptor have access to the encryption key, but the encryption algorithm although very simple is nearly unbreakable.
Help us out! More and more tutorials are submitted to Good-Tutorials each day. We could use your help with finding good tutorials. Mind lending a hand?