PHP ARRAYS, SUPERGLOBALS, AND WORKING WITH FILES. Prof. Assoc. Lule Ahmedi Course: Internet Programming

Size: px
Start display at page:

Download "PHP ARRAYS, SUPERGLOBALS, AND WORKING WITH FILES. Prof. Assoc. Lule Ahmedi Course: Internet Programming"

Transcription

1 PHP ARRAYS, SUPERGLOBALS, AND WORKING WITH FILES Prof. Assoc. Lule Ahmedi Course: Internet Programming

2 Arrays in PHP An data structure to express a collection of related values Associates each value in the array with a key Not only like other languages arrays, but it is also like their vector, hash table, dictionary, and list collections Keys Must be either integers or strings but need not be sequential Cannot use an array or object as a key Values Can be any object, type, or primitive supported in PHP (not restricted to integers and strings), including arrays You can even have objects of your own types

3 Arrays: Declaration and Access Array constructor Example array declarations / value assignments: Example array declarations / key assignments: Default key values if not explicitly assigned: 0, 1, 2,.., n to create an ascending sequence of numbers in an array:

4 Associative Arrays: Declaration and Access Similar to dictionary or hash table data structures in other languages

5 Multidimensional Arrays When a value in the array is an arrays itself Example two-dimensional array

6 Iterating over Arrays Using,, and loops, assisted by In case of associative arrays (non-sequential integer keys) Can t write a simple loop that uses loop with iterators to move through such an array

7 Iterating over Associative Arrays : an array of information about the array This produces:: Four elements defined for $thing:, : the array subscript, : the array element value

8 Iterating over Multidimensional Arrays

9 Arrays: Adding / Deleting Elements Add an element to an array simply by using a key/index that hasn t been used Delete array elements using (causes gaps in the array) Check if a value for a key is set using

10 More Array Operations Sorting array_keys($somearray); array_values($somearray) array_rand($somearray, $num=1) array_reverse($somearray) array_walk($somearray, $callback, $optionalparam) in_array($needle, $haystack) shuffle($somearray)

11 Multidimensional Arrays: User Defined Sort How to compare arrays within a multidimensional array? : a user-defined sort function User himself defines a comparison function for item(s) in the multidimensional array to sort

12 Loading Arrays from Files

13 Superglobal Arrays Superglobal variables: Special predefined associative arrays Always in scope to access (no need for the keyword) Allow the programmer to easily access HTTP headers, query string parameters, and other commonly needed information Name $_GLOBALS $_COOKIES $_ENV $_FILES $_GET $_POST $_REQUEST $_SESSION $_SERVER Description Array for storing data that needs superglobal scope Array of cookie data passed to page via HTTP request Array of server environment data Array of file items uploaded to the server Array of query string data passed to the server via the URL Array of query string data passed to the server via the HTTP header Array containing the contents of $_GET, $_POST, and $_COOKIES Array that contains session data Array that contains session data

14 $_GET and $_POST Superglobals Access data in a query string sent by client If data sent through HTTP GET request: data accessible by PHP within URL and stored in array, say in and If data sent through HTTP POST request: data not visible by PHP in URL but accessible within HTTP POST request body and stored in array, say in and Greatly simplifies accessing data posted by user: (1) no need to parse query string (2) nor the POST request headers CAUTION: Do not use HTTP GET request for transmitting login data. Use POST instead

15 URL Encoding/Decoding Within query strings, characters such as spaces, punctuation, symbols, accented characters are URL encoded and already decodes them Otherwise, URL encoding/decoding (say, for database storage) using and Don t mix it with

16 Determine if Any Data Sent If using the same file to handle both form display as well as the form input Login form example

17 Accessing Form Array Data HTML forms might have multiple values associated with a single name, like in case of checkboxes if the user selects more than one day and submits the form, will only contain the last value from the list selected Solution: change attribute in form for each checkbox from to

18 Using Query Strings in Hyperlinks Make use of query strings not limited to only form data Combine query strings with anchor tags (hyperlinks) which also use HTTP GET method Common to construct URLs for a series of links by appending data from, say, database Imagine a web page with a list of hyperlinks referring to books Write a separate Web page for each book to display? Not a wise approach if hundreds of books in database Instead write a single Display Book page that receives a query string specifying which book to display in form of a unique identifier (ISBN of a book)

19 Sanitizing Query Strings Distrust all user input - what if user edits the value of query string parameter? User removes the parameter or changes its type - empty screen or error page is displayed Especially worrisome is SQL injection (user tries to gain access to the database) All data values potentially modifiable by the user (query strings, form values, or cookie values) must be sanitized before use: If query string parameter doesn t exist If query string parameter doesn t contain a value If query string parameter value isn t the correct type (e.g., ) If value is required for a database lookup, but provided value doesn t exist in database In case of error, e.g., redirect to the generic error handling page: More secure approach to detect user tampering of query string parameters Encode the query string value with a one-way hash - a math algorithm that takes a variable-length input string and turns it into fixed-length binary sequence to

20 $_POST Example: Form

21 $_SERVER Superglobal Access by knowing the key, e.g.: Values filled by the web server => not every key listed in the PHP doc is available array contains: Information within HTTP request headers sent by client Server settings, i.e., many configuration options for PHP itself (mostly in php.ini)

22 $_SERVER: HTTP Request Header Keys : could be one of,,, : IP of the requestor Useful for audit like in finance trans Online poll might limit each IP to a single vote : mostly used; is encoded Useful for re-direction, or analytics (Google Analytics). will work only if browscap.ini in php.ini to browscap.ini : URL of the outbound page Useful for analytics CAUTION: All header Info can be forged!

23 $_SERVER: Internationalization Example : Checks what language the browser accepts, respond accordingly! REMOTE_ADDR: IP of the requestor Useful for audit like in finance trans Useful for analytics

24 $_FILES Superglobal Access files uploaded from the client to the server HTML form required at the client side to enable file upload Use method since file transmission through URL not possible Add to allow submission of HTTP post body & HTTP file attachment itself Add to create the user interface for file upload will show a browse button for a client to select a file for upload to the server) PHP file specified in attribute of HTML form handles the file upload using array which contains: contains key=value pair for each uploaded file key: attribute in HTML form value: an array containing (1) info about file, (2) file itself; keys in that array are name: includes file extension; no path type: MIME; not reliable since provided by the browser tmp_name: full path where the file is temporarily stored in the server error: error code in integer of the file upload process; UPLOAD_ERR_OK (int 0) if successful size: an integer expressing bytes of the uploaded file

25 $_FILES Superglobal: Example

26 $_FILES: Checking for Errors prior to Upload Error Code Integer Meaning UPLOAD_ERR_OK 0 Upload was successful. UPLOAD_ERR_INI_SIZE 1 The uploaded file exceeds the upload_max_filesize directive in php.ini. UPLOAD_ERR_FORM_SIZE 2 The uploaded file exceeds the max_file_size directive that was specified in the HTML form. UPLOAD_ERR_PART IAL 3 The file was only partially uploaded. UPLOAD_ERR_NO_FILE 4 No file was uploaded. Not always an error, since the user may have simply not chosen a file for this field. UPLOAD_ERR_NO_TMP_DIR 6 Missing the temporary folder. UPLOAD_ERR_CANT_WRITE 7 Failed to write to disk. UPLOAD_ERR_EXTENSION 8 A PHP extension stopped the upload.

27 $_FILES: File Size Limit to Upload File size restrictions via: HTML or JavaScript in the input form, or PHP PHP option preferred due to: Client might easily override the MAX_FILE_SIZE hidden form value Imagine you wait for a large upload to finish, then get an error the uploaded file was too large!

28 $_FILES: File Type Limit to Upload Imagine you wait for an image, a MS Word file is uploaded instead! Check file extension and type field prior to upload: Extension and type transmitted by client => could be forged Remember how easy it is to change a file extension Therefore, check e.g. Exif data (metadata about image)

29 $_FILES: Storing the Uploaded File Move the temporary file to a permanent location on the server Works only if source file exists & server destination location writable Otherwise, false returned and warning message

30 Versions and Originals You can change any PHP variable you can get to! Original values are still available Example: Result:

31 Reading/Writing Files Although Deep Web (Websites with databases at the backend) is prevailing, working with files is still relevant Two basic techniques to read/write files in PHP: Stream access Reads just a small portion of the file at a time Requires more careful programming Is most memory-efficient approach when reading very large files All-In-Memory access Can read the entire file into memory (i.e., into a PHP variable) Not appropriate for large files Makes processing of the file extremely easy

32 Reading Files: Stream Access Old-school like in C:,,,, to open a file for reading/writing Input parameters: file location or URL, and access mode like r for read, rw for read and write, c, to create a new file for writing Returned value: a stream resource, which you can then read sequentially to close a file when finished with processing it to read a single line Returns false if no more lines, otherwise reads a line and advances to the next line to read an arbitrary amount of data (typically for binary files) to read a single character

33 Writing Files: Stream Access to write data to a file, similar to Passing the file handle and the string to write

34 Reading Files: All-In-One Memory In stream access: programming requires care in dealing with streams, file handles, and other low-level issues This approach: easier to use, but no fine-grained control to read file into an array of lines to read file into a string variable

35 Writing Files: All-In-One Memory to write the contents of a string to a file

36 Reading and Writing Files - Directories Reading directories: - Begins reading a directory and returns a reference to it (directory handle) - Read the file names in the referenced directory - Stop reading the directory Example:

37 Working with Files: Summary Example

38 References [2] Fundamentals of Web Development. Randy Connolly, Ricardo Hoar. Pearson, 2014 [1] PHP and MySQL Web Development (4th Edition). Luke Welling, Laura Thompson. Addison-Wesley Professional, 2014 php.net Lecture notes of Tufts University, Web Programming, 2011; Advanced Web Programming, 2007

Web Development using PHP (WD_PHP) Duration 1.5 months

Web Development using PHP (WD_PHP) Duration 1.5 months Duration 1.5 months Our program is a practical knowledge oriented program aimed at learning the techniques of web development using PHP, HTML, CSS & JavaScript. It has some unique features which are as

More information

Perl in a nutshell. First CGI Script and Perl. Creating a Link to a Script. print Function. Parsing Data 4/27/2009. First CGI Script and Perl

Perl in a nutshell. First CGI Script and Perl. Creating a Link to a Script. print Function. Parsing Data 4/27/2009. First CGI Script and Perl First CGI Script and Perl Perl in a nutshell Prof. Rasley shebang line tells the operating system where the Perl interpreter is located necessary on UNIX comment line ignored by the Perl interpreter End

More information

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide Rev: 2013-02-01 Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide A practical guide to creating and managing web

More information

All MySQL and PHP training students receive a copy of Apress' Beginning PHP and MySQL 5: From Novice to Professional and other related courseware.

All MySQL and PHP training students receive a copy of Apress' Beginning PHP and MySQL 5: From Novice to Professional and other related courseware. Course Code: Course Title: Duration Training Objectives PHP-DMV-001 Building Data-Driven PHP Web Sites with Adobe Dreamweaver CS5 2 Days To teach attendees the PHP programming skills they need to successfully

More information

Paynow 3rd Party Shopping Cart or Link Integration Guide

Paynow 3rd Party Shopping Cart or Link Integration Guide Paynow 3rd Party Shopping Cart or Link Integration Guide Version 1.0.5 15 August 2014 A guide outlining merchant integration into Paynow for externally hosted shopping carts or applications. For details

More information

Designing and Implementing Forms 34

Designing and Implementing Forms 34 C H A P T E R 34 Designing and Implementing Forms 34 You can add forms to your site to collect information from site visitors; for example, to survey potential customers, conduct credit-card transactions,

More information

Specialized Programme on Web Application Development using Open Source Tools

Specialized Programme on Web Application Development using Open Source Tools Specialized Programme on Web Application Development using Open Source Tools Objective: At the end of the course, Students will be able to: Understand various open source tools(programming tools and databases)

More information

HP WebInspect Tutorial

HP WebInspect Tutorial HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the

More information

UH CMS Basics. Cascade CMS Basics Class. UH CMS Basics Updated: June,2011! Page 1

UH CMS Basics. Cascade CMS Basics Class. UH CMS Basics Updated: June,2011! Page 1 UH CMS Basics Cascade CMS Basics Class UH CMS Basics Updated: June,2011! Page 1 Introduction I. What is a CMS?! A CMS or Content Management System is a web based piece of software used to create web content,

More information

Bitrix Site Manager 4.1. User Guide

Bitrix Site Manager 4.1. User Guide Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

10CS73:Web Programming

10CS73:Web Programming 10CS73:Web Programming Question Bank Fundamentals of Web: 1.What is WWW? 2. What are domain names? Explain domain name conversion with diagram 3.What are the difference between web browser and web server

More information

Document Management System (DMS) Release 4.5 User Guide

Document Management System (DMS) Release 4.5 User Guide Document Management System (DMS) Release 4.5 User Guide Prepared by: Wendy Murray Issue Date: 20 November 2003 Sapienza Consulting Ltd The Acorn Suite, Guardian House Borough Road, Godalming Surrey GU7

More information

TCP/IP Networking, Part 2: Web-Based Control

TCP/IP Networking, Part 2: Web-Based Control TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next

More information

How to test and debug an ASP.NET application

How to test and debug an ASP.NET application Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult

More information

INFORMATION BROCHURE Certificate Course in Web Design Using PHP/MySQL

INFORMATION BROCHURE Certificate Course in Web Design Using PHP/MySQL INFORMATION BROCHURE OF Certificate Course in Web Design Using PHP/MySQL National Institute of Electronics & Information Technology (An Autonomous Scientific Society of Department of Information Technology,

More information

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing

More information

OpenIMS 4.2. Document Management Server. User manual

OpenIMS 4.2. Document Management Server. User manual OpenIMS 4.2 Document Management Server User manual OpenSesame ICT BV Index 1 INTRODUCTION...4 1.1 Client specifications...4 2 INTRODUCTION OPENIMS DMS...5 2.1 Login...5 2.2 Language choice...5 3 OPENIMS

More information

Check list for web developers

Check list for web developers Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation

More information

Index. AdWords, 182 AJAX Cart, 129 Attribution, 174

Index. AdWords, 182 AJAX Cart, 129 Attribution, 174 Index A AdWords, 182 AJAX Cart, 129 Attribution, 174 B BigQuery, Big Data Analysis create reports, 238 GA-BigQuery integration, 238 GA data, 241 hierarchy structure, 238 query language (see also Data selection,

More information

Advanced Web Development SCOPE OF WEB DEVELOPMENT INDUSTRY

Advanced Web Development SCOPE OF WEB DEVELOPMENT INDUSTRY Advanced Web Development Duration: 6 Months SCOPE OF WEB DEVELOPMENT INDUSTRY Web development jobs have taken thе hot seat when it comes to career opportunities and positions as a Web developer, as every

More information

Facebook Twitter YouTube Google Plus Website Email

Facebook Twitter YouTube Google Plus Website Email PHP MySQL COURSE WITH OOP COURSE COVERS: PHP MySQL OBJECT ORIENTED PROGRAMMING WITH PHP SYLLABUS PHP 1. Writing PHP scripts- Writing PHP scripts, learn about PHP code structure, how to write and execute

More information

Specialized Programme on Web Application Development using Open Source Tools

Specialized Programme on Web Application Development using Open Source Tools Specialized Programme on Web Application Development using Open Source Tools A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION

More information

Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map

Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

ISI ACADEMY Web applications Programming Diploma using PHP& MySQL

ISI ACADEMY Web applications Programming Diploma using PHP& MySQL ISI ACADEMY for PHP& MySQL web applications Programming ISI ACADEMY Web applications Programming Diploma using PHP& MySQL HTML - CSS - JavaScript PHP - MYSQL What You'll Learn Be able to write, deploy,

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Customization & Enhancement Guide. Table of Contents. Index Page. Using This Document

Customization & Enhancement Guide. Table of Contents. Index Page. Using This Document Customization & Enhancement Guide Table of Contents Using This Document This document provides information about using, installing and configuring FTP Attachments applications provided by Enzigma. It also

More information

Form And List. SuperUsers. Configuring Moderation & Feedback Management Setti. Troubleshooting: Feedback Doesn't Send

Form And List. SuperUsers. Configuring Moderation & Feedback Management Setti. Troubleshooting: Feedback Doesn't Send 5. At Repeat Submission Filter, select the type of filtering used to limit repeat submissions by the same user. The following options are available: No Filtering: Skip to Step 7. DotNetNuke User ID: Do

More information

Advanced Tornado TWENTYONE. 21.1 Advanced Tornado. 21.2 Accessing MySQL from Python LAB

Advanced Tornado TWENTYONE. 21.1 Advanced Tornado. 21.2 Accessing MySQL from Python LAB 21.1 Advanced Tornado Advanced Tornado One of the main reasons we might want to use a web framework like Tornado is that they hide a lot of the boilerplate stuff that we don t really care about, like escaping

More information

Presentation Reporting Quick Start

Presentation Reporting Quick Start Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web

More information

Web Application Guidelines

Web Application Guidelines Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security

More information

Integrating VoltDB with Hadoop

Integrating VoltDB with Hadoop The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.

More information

Google Analytics Guide

Google Analytics Guide Google Analytics Guide 1 We re excited that you re implementing Google Analytics to help you make the most of your website and convert more visitors. This deck will go through how to create and configure

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

An Introduction To The Web File Manager

An Introduction To The Web File Manager An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular

More information

Snapt Balancer Manual

Snapt Balancer Manual Snapt Balancer Manual Version 1.2 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 4 Configuration Default Settings... 4 Configuration Performance Tuning... 6 Configuration Snapt

More information

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008 Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether

More information

User Guide to the Content Analysis Tool

User Guide to the Content Analysis Tool User Guide to the Content Analysis Tool User Guide To The Content Analysis Tool 1 Contents Introduction... 3 Setting Up a New Job... 3 The Dashboard... 7 Job Queue... 8 Completed Jobs List... 8 Job Details

More information

Java Application Developer Certificate Program Competencies

Java Application Developer Certificate Program Competencies Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle

More information

Webapps Vulnerability Report

Webapps Vulnerability Report Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during

More information

Performing a Web Application Security Assessment

Performing a Web Application Security Assessment IBM Software Group Performing a Web Application Security Assessment 2007 IBM Corporation Coordinate the Time of the Audit Set up a time window with the application owner Inform your security team Inform

More information

Handling of "Dynamically-Exchanged Session Parameters"

Handling of Dynamically-Exchanged Session Parameters Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com Version 5.0 English Edition 2011 April 1, 2011 Page 1 of 28 Table of Contents 1 Overview... 3 1.1 What are "dynamically-exchanged

More information

Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability

Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability Aras Corporation 2005 Aras Corporation. All rights reserved Notice of Rights All rights reserved. Aras Corporation (Aras) owns this document. No part of this document may be reproduced or transmitted in

More information

Visual COBOL ASP.NET Shopping Cart Demonstration

Visual COBOL ASP.NET Shopping Cart Demonstration Visual COBOL ASP.NET Shopping Cart Demonstration Overview: The original application that was used as the model for this demonstration was the ASP.NET Commerce Starter Kit (CSVS) demo from Microsoft. The

More information

Analytics Configuration Reference

Analytics Configuration Reference Sitecore Online Marketing Suite 1 Analytics Configuration Reference Rev: 2009-10-26 Sitecore Online Marketing Suite 1 Analytics Configuration Reference A Conceptual Overview for Developers and Administrators

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)

More information

IP Phone Services Configuration

IP Phone Services Configuration CHAPTER 96 Using Cisco Unified Communications Manager Administration, you define and maintain the list of IP phone services to which users can subscribe at their site. IP phone services comprise XML applications

More information

WordPress Security Scan Configuration

WordPress Security Scan Configuration WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin

More information

Microsoft Advertising adcenter Campaign Analytics Getting Started Guide

Microsoft Advertising adcenter Campaign Analytics Getting Started Guide Microsoft Advertising adcenter Campaign Analytics Getting Started Guide Contents Introduction... 3 What is Microsoft Advertising adcenter Campaign Analytics?... 3 Useful terms... 3 Overview... 4 Get Started...

More information

EXTENDED FILE SYSTEM FOR F-SERIES PLC

EXTENDED FILE SYSTEM FOR F-SERIES PLC EXTENDED FILE SYSTEM FOR F-SERIES PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip

More information

FileMaker Server 13. Custom Web Publishing with PHP

FileMaker Server 13. Custom Web Publishing with PHP FileMaker Server 13 Custom Web Publishing with PHP 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks

More information

State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009

State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009 State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,

More information

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com info@flexense.com. Flexense Ltd.

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com info@flexense.com. Flexense Ltd. VX Search FILE SEARCH SOLUTION User Manual Version 8.2 Jan 2016 www.vxsearch.com info@flexense.com 1 1 Product Overview...4 2 VX Search Product Versions...8 3 Using Desktop Product Versions...9 3.1 Product

More information

ConvincingMail.com Email Marketing Solution Manual. Contents

ConvincingMail.com Email Marketing Solution Manual. Contents 1 ConvincingMail.com Email Marketing Solution Manual Contents Overview 3 Welcome to ConvincingMail World 3 System Requirements 3 Server Requirements 3 Client Requirements 3 Edition differences 3 Which

More information

Cyber Security Challenge Australia 2014

Cyber Security Challenge Australia 2014 Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web

More information

LICENSE4J LICENSE MANAGER USER GUIDE

LICENSE4J LICENSE MANAGER USER GUIDE LICENSE4J LICENSE MANAGER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 4 Managing Products... 6 Create Product... 6 Edit Product... 7 Refresh, Delete Product...

More information

SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS

SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS White Paper SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling a custom home page 1 Adding webmysqlserver

More information

Working With Virtual Hosts on Pramati Server

Working With Virtual Hosts on Pramati Server Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name

More information

Appendix. Web Command Error Codes. Web Command Error Codes

Appendix. Web Command Error Codes. Web Command Error Codes Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

F-Secure Internet Security 2014 Data Transfer Declaration

F-Secure Internet Security 2014 Data Transfer Declaration F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3

More information

The Smart Forms Web Part allows you to quickly add new forms to SharePoint pages, here s how:

The Smart Forms Web Part allows you to quickly add new forms to SharePoint pages, here s how: User Manual First of all, congratulations on being a person of high standards and fine tastes! The Kintivo Forms web part is loaded with features which provide you with a super easy to use, yet very powerful

More information

Pre-configured AS2 Host Quick-Start Guide

Pre-configured AS2 Host Quick-Start Guide Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

Site Maintenance Using Dreamweaver

Site Maintenance Using Dreamweaver Site Maintenance Using Dreamweaver As you know, it is possible to transfer the files that make up your web site from your local computer to the remote server using FTP (file transfer protocol) or some

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

Basic File Recording

Basic File Recording PART NUMBER: PUBLICATION DATE: 23. October 2015 Copyright 2014 2015 SightLine Applications, Inc. Hood River, OR All Rights Reserved Summary In addition to performing digital video stabilization, object

More information

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase

More information

E-Commerce: Designing And Creating An Online Store

E-Commerce: Designing And Creating An Online Store E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With

More information

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Introduction Client-Side scripting involves using programming technologies to build web pages and applications that are run on the client (i.e.

More information

JAVASCRIPT AND COOKIES

JAVASCRIPT AND COOKIES JAVASCRIPT AND COOKIES http://www.tutorialspoint.com/javascript/javascript_cookies.htm Copyright tutorialspoint.com What are Cookies? Web Browsers and Servers use HTTP protocol to communicate and HTTP

More information

AS DNB banka. DNB Link specification (B2B functional description)

AS DNB banka. DNB Link specification (B2B functional description) AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

LANCOM Techpaper Content Filter

LANCOM Techpaper Content Filter The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for

More information

Workflow Conductor Widgets

Workflow Conductor Widgets Workflow Conductor Widgets Workflow Conductor widgets are the modular building blocks used to create workflows in Workflow Conductor Studio. Some widgets define the flow, or path, of a workflow, and others

More information

OxyClassifieds Installation Handbook

OxyClassifieds Installation Handbook OxyClassifieds Installation Handbook OxyClassifieds Team Email: office@oxyclassifieds.com Web: http://www.oxyclassifieds.com OxyClassifieds Installation Handbook by OxyClassifieds Team Copyright 2006-2011

More information

How to Edit Your Website

How to Edit Your Website How to Edit Your Website A guide to using your Content Management System Overview 2 Accessing the CMS 2 Choosing Your Language 2 Resetting Your Password 3 Sites 4 Favorites 4 Pages 5 Creating Pages 5 Managing

More information

Baidu: Webmaster Tools Overview and Guidelines

Baidu: Webmaster Tools Overview and Guidelines Baidu: Webmaster Tools Overview and Guidelines Agenda Introduction Register Data Submission Domain Transfer Monitor Web Analytics Mobile 2 Introduction What is Baidu Baidu is the leading search engine

More information

Super Resellers // Getting Started Guide. Getting Started Guide. Super Resellers. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Super Resellers // Getting Started Guide. Getting Started Guide. Super Resellers. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1 Getting Started Guide Super Resellers Getting Started Guide Page 1 Getting Started Guide: Super Resellers Version 2.1 (1.6.2012) Copyright 2012 All rights reserved. Distribution of this work or derivative

More information

Copyright 2010 Netbriefings, Inc. Page1 agendalayout-wr2010.doc

Copyright 2010 Netbriefings, Inc. Page1 agendalayout-wr2010.doc Following presents web pages an event viewer (web audience member) will encounter when attending a Netbriefings event: Event Agenda, Event Viewer and Event Registration. (The appearance of the registration

More information

KINETIC SR (Survey and Request)

KINETIC SR (Survey and Request) KINETIC SR (Survey and Request) Installation and Configuration Guide Version 5.0 Revised October 14, 2010 Kinetic SR Installation and Configuration Guide 2007-2010, Kinetic Data, Inc. Kinetic Data, Inc,

More information

BreezingForms Guide. 18 Forms: BreezingForms

BreezingForms Guide. 18 Forms: BreezingForms BreezingForms 8/3/2009 1 BreezingForms Guide GOOGLE TRANSLATE FROM: http://openbook.galileocomputing.de/joomla15/jooml a_18_formulare_neu_001.htm#t2t32 18.1 BreezingForms 18.1.1 Installation and configuration

More information

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 233 INTRODUCTION TO PHP

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 233 INTRODUCTION TO PHP RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 233 INTRODUCTION TO PHP I. Basic Course Information A. Course Number and Title: CISY 233 Introduction to PHP B. New or Modified Course: Modified

More information

HELP DESK MANUAL INSTALLATION GUIDE

HELP DESK MANUAL INSTALLATION GUIDE Help Desk 6.5 Manual Installation Guide HELP DESK MANUAL INSTALLATION GUIDE Version 6.5 MS SQL (SQL Server), My SQL, and MS Access Help Desk 6.5 Page 1 Valid as of: 1/15/2008 Help Desk 6.5 Manual Installation

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

SAP NetWeaver AS Java

SAP NetWeaver AS Java Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is

More information

SQL Injection Attack Lab Using Collabtive

SQL Injection Attack Lab Using Collabtive Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document

More information

Technical Support Set-up Procedure

Technical Support Set-up Procedure Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it

More information

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1 Business Portal for Microsoft Dynamics GP 2010 User s Guide Release 5.1 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and

More information

SIMIAN systems. Setting up a Sitellite development environment on Windows. Sitellite Content Management System

SIMIAN systems. Setting up a Sitellite development environment on Windows. Sitellite Content Management System Setting up a Sitellite development environment on Windows Sitellite Content Management System Introduction For live deployment, it is strongly recommended that Sitellite be installed on a Unix-based operating

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information