CSCI110 Exercise 4: Database - MySQL

Size: px
Start display at page:

Download "CSCI110 Exercise 4: Database - MySQL"

Transcription

1 CSCI110 Exercise 4: Database - MySQL The exercise This exercise is to be completed in the laboratory and your completed work is to be shown to the laboratory tutor. The work should be done in week-8 but completion by the end of week-11 is acceptable. (No marks unless demonstrated by end of week 11.) The completed exercise is worth 4 marks. When you have demonstrated your work to the laboratory tutor, you should sign off on the tutor s marking sheet. Overview All realistic web-applications (web-apps) involve a relational database! They may present selected data from the database or may add new data. You just have to learn how to work with databases and the SQL language that is used to manipulate data in the tables of a relational database. This exercise will illustrate just a few simple features of databases and the SQL language. You can find further examples in some of the tutorials that are available on the web: Database and SQL tutorials include Each laboratory computer will be running a copy of the MySQL database server. These servers have accounts set up student1, student2,, student150. You will have been allocated an account, e.g. student13, and a password. You should be able to use any of the database engines. Each is separate; so if you create tables in the database on say mega-pc15 you won t find them on mega-pc11. It s best to consistently use the one machine. The host in the URL for your database will normally be localhost (assuming that works in the lab that depends on how the network has been set up). You can specify the actual machine name (e.g. mega-pc17.cs.uow.edu.au). (In principle, you can access the tables you created on a computer other than the one that you are using by just specifying its URL. However, if that machine is switched off or is in Windows mode that won t work.) Parts of the exercise use the MySQL tools; most parts use PHP to access the tables that you create. Part 1 A baby example (1 mark) 1. Use the MySQL Workbench tool (in the Applications/Programming menu on the Ubuntu systems) to log in to the database.

2 You will need to create a database connection there is a New Connection option in the SQL Development section of the Workbench window. Use the studentxx account that you were allocated with the password that was supplied. The default schema should be specified; its name is the same as the username. (As in the case of Netbeans, the system may hassle you for keyring passwords just remove any keyrings file, and if it asks tell it not to try to save your password in the ring (keychain).) It probably will save the details, and your connection may subsequently appear in the list of known connections. 2. You should then get to the SQL Development view. You will see a variety of schema (databases) that are known to the local database engine. Your studentxxx entry should be there. Select it. (Hopefully, the system will have been configured correctly and you won t be able to use any of the other schema!) Select your schema (database) and set it as the default.

3 You can view your tables. Right-click to create a new table (or in the schema view all those things that look like oil-barrels there will be an add table button ). 3. The example data table is for a Name your Baby web-app. The table will have two columns, both containing string data. The first column is Gender and its values should be Boy or Girl. (You could use a MySQL enum type; but in this demonstration a string (varchar) type is used.) The second column is Name and its values will be popular names for children. Select your schema right-click and get the menu offering create table :

4 4. The first tab pane has options for defining the table name and the Engine. MySQL has a variety of mechanisms for storing relational tables the Engine is really the underlying data representation. The traditional default was MyISAM. The MyISAM scheme doesn t enforce things like foreign key constraints and doesn t support transaction isolation. The alternative InnoDB Engine has these features (at an additional cost of course). Just use the system s default Engine for this simple application. Name the table. MySQL is case sensitive so babynames, Babynames, and BabyNames would all be different tables. You PHP code will have to refer to the table using its correct case sensitive name. 5. Other tabs allow for the definition of the columns (names and data types), indexing, foreign keys, and other more specialised options. In this simple example, you need only define a couple of columns both being string type (varchar() in database jargon). MySQL will start with its default id column it assumes that all records are going to have an integer primary key. You simply overwrite this entry and add a second column you will need to change the size of the varchar (for some reason known only to MySQL developers this defaults to 45 characters).

5 6. MySQL will show the SQL code that it will use to create the table. Run the code. The table definition can be saved to a text file (e.g. one named createtable.sql ). This can be useful in more complex examples as you can then recreate a table by simply running the SQL code from this saved file. In all your real work, you should save the SQL createtable script as a.sql file that is associated with the project. Using the MySQL table creation wizard is useful when you are first starting but you must make the effort to learn how to write your own create table scripts. 7. Data can now be inserted using the Query Tab : (SQL commands are run in Workbench SQL Developer by clicking the lightning bolt button in the command pane:

6 Simple queries can be run: 8. You will often need to populate a table with test data for a web application. Entering the data through something like the Query Tab isn t the best way; quite often you need to restart, deleting the table and re-initializing it for another test. It is better to have the SQL insert into xxx values ( ) statements in a text file: MySQL s Workbench will let you read a file (File/Open script) and execute the statements:

7 9. The SQL Devlopment query browser is however quite useful for testing SQL statements that you propose to use in applications: 10. The NetBeans IDE has a SQL client component that will work with most databases MySQL, DB2, Oracle, Java DB (a simple database engine implemented in Java that comes with NetBeans), etc. This is accessible via the Services tab in NetBeans:

8 11. The code needed to connect to MySQL is in the libraries available to NetBeans. So, it should be possible to right-click on the MySQL entry and ask it to create an actual connection to the database. MySQL is using Port NetBeans should be able to open the connection and will then display it along with its localhost:1527 connections (these relate to a tutorial database system that is included with NetBeans). The new MySQL connection can be opened to show some details of its tables, views, and procedures. The table tab can be opened up to show the tables of course there is only one table: babynames. A right-click View Data on this table will show data from the table.

9 You can run any SQL statements you wish via NetBeans. It s really your choice as to whether you use the MySQL tools or the NetBeans SQL client. (There is a third option use PhpMyAdmin. We will not cover this in CSCI110, but it is a popular choice if your database is hosted on some ISP site and you cannot use the MySQL tools. There are lots of good tutorials on PhpMyAdmin available on the Internet e.g. ) 13. The web project that uses this database should now be constructed. If you connected to MySQL from NetBeans you should close this connection (pick the connection in the services view and right-click Disconnect ) and then switch to the Projects view and create a new project Create a project, Exercise 4, in your public_hml directory. This should have a static HTML form and a PHP script. Create a simple form that will appear something like the following: (I am not giving you the HTML for that form you should be able to write it yourself by now!)

10 14. The processing program, BabyNameService.php, will have to: Check the data. You always have to check the data. Divert hacker attacks to a suitable error response page. Connect to the MySQL database (URL defines machine, usually localhost; user-name and password will be the same studentxx/password combination as used with the MySQL Query Browser; the data base has the same name as the user-name). Prepare a statement that can be run; set parameters from the input data. Retrieve matching names. Display a HTML page with these names. 15. The program will have a block of PHP code defining functions and some main line code, and some HTML with a little embedded PHP: The main line code starts by checking the inputs. If data are missing, or if the value for gender is anything other than Boy or Girl, or if the value in letter is anything other than a single capital case letter then we have a hacker. Dismiss them:

11 If the data appear OK, then a connection to the database must be opened, the query run (the results, possible names, are left in the global array $bnames), and the database connection must be closed. 16. The code for connecting to a database is pretty standard: 17. The search function prepares a SQL select statement, sets the parameters from the inputs, executes the statement, and loops through the retrieved rows adding names to the global array $bnames: 18. The HTML markup for the response page includes some fragments of embedded PHP. These illustrate the use of the alternative syntax form of PHP s

12 conditional statement: 19. Your application should run: Part 2 A more realistic example (3 marks) In this part, you develop an essential part of all student management packages the component that deals with students requests that they be excused from completing particular assessment items. (The version that you implement is somewhat simplified.) There are two classes of users students who submit requests through the web, and reviewers who must first login and who can then review new requests and delete old requests. Use cases We can represent the system using UML (Unified Modelling Language) use case diagrams you will get used to these in your subsequent studies, they are an ubiquitous part of software specifications.

13 Use case 1: Student request for exemption The system shall display a form with fields for the student to enter their identifier, the subject identifier and task identifier for the assessment item, and a text area field for entering the reason why this task should not count toward their assessment. Simple data checks are applied and the data are recorded in the system s database; a simple response page is generated acknowledging receipt of the request. Use case 2: Reviewer login Reviewers must login to gain access to other processing options. Reviewers provide a name and password; these data are checked against a data table holding names and encrypted passwords. Logged in status is maintained using cookies and session data. The system shall also provide a logout option. Use case 3: Review of unassessed requests

14 Logged in reviewers shall be able to see a tabular listing of outstanding requests. They shall be able to mark each as either Approved, or Rejected, or Ignored (ignored requests are left as still outstanding, they will be processed later possibly by a different reviewer). The reviewer shall be able to submit their changes; the submitted changes will be used to update the system s records. A simple acknowledgement page will report how many records were changed. Use case 4: Reviewer deletes old records Logged in reviewers can enter a date and request the deletion of all records that have been given Approved or Rejected status on or before the given date. The system will generate a simple response page detailing the number of records that have been deleted. Storyboard walkthrough Another typical design element for an application is a storyboard walkthrough. This will show rough designs for the forms and responses for the different uses of the system and will provide clients with an idea of what it will be like to use the system. These walkthroughs serve as a mechanism for getting initial feedback from clients; the client may object to the proposed approach and suggest alternatives such refinements of the requirements are best acquired at this early stage when little work has been done, and little needs to be undone if the initial approach was wrong. Walkthroughs use invented data. They must be convincing to clients, so the invented data should be typical of the real data in the problem domain (don t use text like abcde or excuse 1 invent realistic text). The walkthrough here uses screenshots from my implementation of the code that you will be creating.

15 Student use:

16 Reviewer login: Login page is displayed. If the combination of username and password is invalid, the same page is re-displayed. If a valid username/password combination is given, the response is the reviewer s options page. Reviewer s options page

17 Reviewer deletes old records: The reviewer enters a date. Records processed on or before this date are deleted. The response page shows the number of records deleted. Review of open requests The system provides a form page containing details of all open requests. The data are shown in a HTML table that also contains controls that allow individual requests to be accepted, rejected, or left for future processing (ignored). The selection of processing choices can be submitted to the system which will then update its records. The generated response page shows the number of records updated.

18 Tasks 1. Create a new NetBeans project E4New. The project will eventually have a number of PHP scripts, CSS, and Javascript. SQL files with the SQL statements needed to create and populate the tables can be included in the project. (Of course, such files would not be deployed onto the real server! It s just convenient to make them part of the project while doing development).

19 The project will use Lea Smarts Javascript calendar, as used in earlier exercises. Copy the Javascript, CSS, and image files for the calendar into your new project (do this at Linux command level using cp and mv commands). 2. Create and populate a MySQL table for reviewers names and passwords. You can continue to use the MySQL wizard to help compose the create table commands but transfer the generated SQL statements to a SQL file, and run them via NetBeans. (This way you can easily recreate your tables in a standard state after doing inserts, updates, or deletions; or you can create them on a different machine from the one that you originally used.) The reviewers table (creation and population) will be in the file createreviewers.sql (don t use stud0000 s database use your own!): (MySQL s insert statement allows for function calls in the values part here we request that the MD5 hash algorithm be applied to the clear text passwords, making the password data stored difficult for hackers to exploit.) Use Netbeans to connect to your MySQL process and run these commands to create the reviewers table (the mechanisms are illustrated in steps 11 and 12 of part 1 above). Similarly create and populate the excuses table:

20 (The insert statements have a NULL for the primary key idexcuses MySQL is providing these values through its auto-increment primary key mechanism.) 3. Create a simple stylesheet for the web pages (Lea Smart s calendar comes with its own stylesheet, you need a separate one to define the overall appearance of the pages). Your stylesheet doesn t need to be too elaborate for this little example:

21 4. Create the submitexcuse.php script. This handles get requests by displaying a form. Data submitted via this form is posted back to the same script. The post handling will create a new record in the data table. The connecttomysql() function is used in most of the scripts just copy-&-

22 paste the code as needed: The showform() function uses a block of HTML text as a here document to define the data entry form used by students. The action attribute of the form is set to post data back to the same script: The dologrequest() function creates a new entry in the database (if data are missing, it sends the user back to the data entry step):

23 It generates a simple acknowledgement page: You should be able to run this part of the application now. You can check that it works by using MySQL WorkBench SQL Developer options to check the contents of the updated table:

24 5. You need reviewerlogin.php and reviewerlogout.php scripts. The application uses PHP sessions to manage logins. PHP code from its library will use a cookie that it sets in the client browser. The cookie keys into PHP s session state storage (actually using temporary files). Session storage is used to keep a record of the reviewer who has logged in. Reviewerlogin This has the connecttomysql code shown above and the following: The code starts by establishing a session (the PHP library code will add a cookie to the response and create necessary $_SESSION data). If a reviewer is already logged in, the script diverts the user directly to the page displaying options for reviewers. Otherwise, it determines whether the request is a GET or a POST. If the request is a GET, the user needs to receive the login form.

25 If the request is a POST, submitted username and password data must be checked: The code applies the md5() hash function to the password to match the data table where the passwords are encrypted. It then connects to the MySQL server and runs a request to verify that the combination of name and (encrypted)

26 password does actually exist. If there is no match, the user is again shown the login form. If there is a match, the user is shown the page with reviewer options. ReviewerLogout This script must clear the session records from browser and server. The code is standardised resume work on session, destroy all data. Then, some acknowledgement is returned: 6. The reviewers.php script. This must check that it is being used by a logged in reviewer (otherwise some smart aleck student might guess the script name and enter it into their browser and so get the ability to approve their own requests for exemptions). If the script is not being used by a logged in user, it redirects the user to the login page. (Why does it use array_key_exists( reviewer, $_SESSION) instead of something like isset($_session[ reviewer ]? Well, any code that involves $_SESSION[ reviewer ] when this does not exist will result in an error message in the log file; these error messages can obscure more important information such as evidence for a hacker attack.)

27 The showform function has an <a href= > link that invokes the script showing current outstanding requests, and a small data entry form that posts data to the record deletion script. The data entry form makes use of Lea Smart s Javascript calendar it s much like the example in exercise 2.

28 7. The deletold.php script uses the posted date value in a SQL statement that deletes processed records:

29

30 Your application should now allow you to delete old records; you should check by examining the tables in MySQL Workbench: Before After deletion (and some further updates): 8. Finally, you need the reviewopenrequest.php script.

31 Like the other scripts used by reviewers, this needs to re-establish a session, and check that the user is properly logged in. As usual, it handles GET requests by showing a form, and handles POST requests by processing submitted data. The printpageheader() function simply outputs some canned HTML that gets used in all the responses from this script: The form generated by this script is a little more elaborate than usual. It s going

32 to have a table with rows used for entering processing options for some arbitrary number of items. Each item has a distinct group of 3 radio buttons (its own approve, reject, and ignore options). The button selected must identify the record that is to be processed and its disposition. The form code will show a table, or a message saying that there aren t any records to process. The code to actually generate the table is hidden in a fold of this part of the script which shows only the database handling needed to get the records, and the final part of the HTML output: The loop that runs through the retrieved records will generate a HTML table row for each one; the first record processed also needs to output the table header row.

33 Different radio button groups are generated for each row (the row count is used as part of the name of the radio button group, it s going to be group_1, group_2 etc). The identifier for the database record (its auto-index primary key) is embedded in the values that will be returned from a selected radio-button e.g. for record 6, the value returned will be A6 if the approve button is selected, or R6 or I6 for the other options. (The code also generates unique ids for the <label> elements.) The actual HTML generated is something like: The code for handling submitted update data is:

34 This function loops through all data in the $_POST[ ] array. Values of interest are those of the form Add or Rdd where dd is a string of digits that correspond to a record identifier. The code uses a simple regex test to identify these values; the regex extracts the processing choice A : approve, R : reject and the record identifier. The choice and record identifier are used in the prepared SQL statement to update the table. The identifier of the reviewer and the current date are inserted into the table as part of this update. Your application is now complete. Test all parts. Show it to your tutor.

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

DIPLOMA IN WEBDEVELOPMENT

DIPLOMA IN WEBDEVELOPMENT DIPLOMA IN WEBDEVELOPMENT Prerequisite skills Basic programming knowledge on C Language or Core Java is must. # Module 1 Basics and introduction to HTML Basic HTML training. Different HTML elements, tags

More information

Developing SQL and PL/SQL with JDeveloper

Developing SQL and PL/SQL with JDeveloper Seite 1 von 23 Developing SQL and PL/SQL with JDeveloper Oracle JDeveloper 10g Preview Technologies used: SQL, PL/SQL An Oracle JDeveloper Tutorial September 2003 Content This tutorial walks through the

More information

ODBC Client Driver Help. 2015 Kepware, Inc.

ODBC Client Driver Help. 2015 Kepware, Inc. 2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table

More information

Setting Up Specify to use a Shared Workstation as a Database Server

Setting Up Specify to use a Shared Workstation as a Database Server Specify Software Project www.specifysoftware.org Setting Up Specify to use a Shared Workstation as a Database Server This installation documentation is intended for workstations that include an installation

More information

Oracle Database 10g Express

Oracle Database 10g Express Oracle Database 10g Express This tutorial prepares the Oracle Database 10g Express Edition Developer to perform common development and administrative tasks of Oracle Database 10g Express Edition. Objectives

More information

Web Development using PHP (WD_PHP) Duration 1.5 months

Web Development using PHP (WD_PHP) Duration 1.5 months Duration 1.5 months Our program is a practical knowledge oriented program aimed at learning the techniques of web development using PHP, HTML, CSS & JavaScript. It has some unique features which are as

More information

CPE111 COMPUTER EXPLORATION

CPE111 COMPUTER EXPLORATION CPE111 COMPUTER EXPLORATION BUILDING A WEB SERVER ASSIGNMENT You will create your own web application on your local web server in your newly installed Ubuntu Desktop on Oracle VM VirtualBox. This is a

More information

Video Administration Backup and Restore Procedures

Video Administration Backup and Restore Procedures CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

G563 Quantitative Paleontology. SQL databases. An introduction. Department of Geological Sciences Indiana University. (c) 2012, P.

G563 Quantitative Paleontology. SQL databases. An introduction. Department of Geological Sciences Indiana University. (c) 2012, P. SQL databases An introduction AMP: Apache, mysql, PHP This installations installs the Apache webserver, the PHP scripting language, and the mysql database on your computer: Apache: runs in the background

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information

Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2.

Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2. Testing Dynamic Web Applications How To You can use XML Path Language (XPath) queries and URL format rules to test web sites or applications that contain dynamic content that changes on a regular basis.

More information

IBM Operational Decision Manager Version 8 Release 5. Getting Started with Business Rules

IBM Operational Decision Manager Version 8 Release 5. Getting Started with Business Rules IBM Operational Decision Manager Version 8 Release 5 Getting Started with Business Rules Note Before using this information and the product it supports, read the information in Notices on page 43. This

More information

CEFNS Web Hosting a Guide for CS212

CEFNS Web Hosting a Guide for CS212 CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things

More information

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD) USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To

More information

Short notes on webpage programming languages

Short notes on webpage programming languages Short notes on webpage programming languages What is HTML? HTML is a language for describing web pages. HTML stands for Hyper Text Markup Language HTML is a markup language A markup language is a set of

More information

CSCI110: Examination information.

CSCI110: Examination information. CSCI110: Examination information. The exam for CSCI110 will consist of short answer questions. Most of them will require a couple of sentences of explanation of a concept covered in lectures or practical

More information

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL

More information

Oracle E-Business Suite - Oracle Business Intelligence Enterprise Edition 11g Integration

Oracle E-Business Suite - Oracle Business Intelligence Enterprise Edition 11g Integration Specialized. Recognized. Preferred. The right partner makes all the difference. Oracle E-Business Suite - Oracle Business Intelligence Enterprise Edition 11g Integration By: Arun Chaturvedi, Business Intelligence

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org

More information

Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation

Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation Credit-By-Assessment (CBA) Competency List Written Assessment Competency List Introduction to the Internet

More information

Online shopping store

Online shopping store Online shopping store 1. Research projects: A physical shop can only serves the people locally. An online shopping store can resolve the geometrical boundary faced by the physical shop. It has other advantages,

More information

AJ Matrix V5. Installation Manual

AJ Matrix V5. Installation Manual AJ Matrix V5 Installation Manual AJ Square Consultancy Services (p) Ltd., The Lord's Garden, #1-12, Vilacheri Main Road, Vilacheri, Madurai-625 006.TN.INDIA, Ph:+91-452-3917717, 3917790. Fax : 2484600

More information

Certified PHP/MySQL Web Developer Course

Certified PHP/MySQL Web Developer Course Course Duration : 3 Months (120 Hours) Day 1 Introduction to PHP 1.PHP web architecture 2.PHP wamp server installation 3.First PHP program 4.HTML with php 5.Comments and PHP manual usage Day 2 Variables,

More information

Welcome to Collage (Draft v0.1)

Welcome to Collage (Draft v0.1) Welcome to Collage (Draft v0.1) Table of Contents Welcome to Collage (Draft v0.1)... 1 Table of Contents... 1 Overview... 2 What is Collage?... 3 Getting started... 4 Searching for Images in Collage...

More information

RDS Migration Tool Customer FAQ Updated 7/23/2015

RDS Migration Tool Customer FAQ Updated 7/23/2015 RDS Migration Tool Customer FAQ Updated 7/23/2015 Amazon Web Services is now offering the Amazon RDS Migration Tool a powerful utility for migrating data with minimal downtime from on-premise and EC2-based

More information

Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject!

Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject! Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject! Justin Swanhart Percona Live, April 2013 INTRODUCTION 2 Introduction 3 Who am I? What do I do? Why am I here? The tools

More information

Ulteo Open Virtual Desktop Installation

Ulteo Open Virtual Desktop Installation Ulteo Open Virtual Desktop Installation Copyright 2008 Ulteo SAS - CONTENTS CONTENTS Contents 1 Prerequisites 2 1.1 Installation of MySQL....................................... 2 2 Session Manager (sm.ulteo.com)

More information

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab

More information

MySQL Quick Start Guide

MySQL Quick Start Guide Fasthosts Customer Support MySQL Quick Start Guide This guide will help you: Add a MySQL database to your account. Find your database. Add additional users. Use the MySQL command-line tools through ssh.

More information

Installation Instructions

Installation Instructions Installation Instructions 25 February 2014 SIAM AST Installation Instructions 2 Table of Contents Server Software Requirements... 3 Summary of the Installation Steps... 3 Application Access Levels... 3

More information

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code. Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...

More information

Secure Web Development Teaching Modules 1. Threat Assessment

Secure Web Development Teaching Modules 1. Threat Assessment Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security

More information

Version of this tutorial: 1.06a (this tutorial will going to evolve with versions of NWNX4)

Version of this tutorial: 1.06a (this tutorial will going to evolve with versions of NWNX4) Version of this tutorial: 1.06a (this tutorial will going to evolve with versions of NWNX4) The purpose of this document is to help a beginner to install all the elements necessary to use NWNX4. Throughout

More information

Moving the Web Security Log Database

Moving the Web Security Log Database Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server

More information

Setting up the Oracle Warehouse Builder Project. Topics. Overview. Purpose

Setting up the Oracle Warehouse Builder Project. Topics. Overview. Purpose Setting up the Oracle Warehouse Builder Project Purpose In this tutorial, you setup and configure the project environment for Oracle Warehouse Builder 10g Release 2. You create a Warehouse Builder repository

More information

How-To: MySQL as a linked server in MS SQL Server

How-To: MySQL as a linked server in MS SQL Server How-To: MySQL as a linked server in MS SQL Server 1 Introduction... 2 2 Why do I want to do this?... 3 3 How?... 4 3.1 Step 1: Create table in SQL Server... 4 3.2 Step 2: Create an identical table in MySQL...

More information

Project 2: Web Security Pitfalls

Project 2: Web Security Pitfalls EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course

More information

D61830GC30. MySQL for Developers. Summary. Introduction. Prerequisites. At Course completion After completing this course, students will be able to:

D61830GC30. MySQL for Developers. Summary. Introduction. Prerequisites. At Course completion After completing this course, students will be able to: D61830GC30 for Developers Summary Duration Vendor Audience 5 Days Oracle Database Administrators, Developers, Web Administrators Level Technology Professional Oracle 5.6 Delivery Method Instructor-led

More information

Advanced Tornado TWENTYONE. 21.1 Advanced Tornado. 21.2 Accessing MySQL from Python LAB

Advanced Tornado TWENTYONE. 21.1 Advanced Tornado. 21.2 Accessing MySQL from Python LAB 21.1 Advanced Tornado Advanced Tornado One of the main reasons we might want to use a web framework like Tornado is that they hide a lot of the boilerplate stuff that we don t really care about, like escaping

More information

PHP Authentication Schemes

PHP Authentication Schemes 7 PHP Authentication Schemes IN THIS CHAPTER Overview Generating Passwords Authenticating User Against Text Files Authenticating Users by IP Address Authenticating Users Using HTTP Authentication Authenticating

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

An Email Newsletter Using ASP Smart Mailer and Advanced HTML Editor

An Email Newsletter Using ASP Smart Mailer and Advanced HTML Editor An Email Newsletter Using ASP Smart Mailer and Advanced HTML Editor This tutorial is going to take you through creating a mailing list application to send out a newsletter for your site. We'll be using

More information

LICENSE4J LICENSE MANAGER USER GUIDE

LICENSE4J LICENSE MANAGER USER GUIDE LICENSE4J LICENSE MANAGER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 4 Managing Products... 6 Create Product... 6 Edit Product... 7 Refresh, Delete Product...

More information

How To Install Amyshelf On Windows 2000 Or Later

How To Install Amyshelf On Windows 2000 Or Later Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III Setup 4 1 Download & Installation... 4 2 Configure MySQL... Server 6 Windows XP... Firewall Settings 13 3 Additional

More information

Getting Started with Dynamic Web Sites

Getting Started with Dynamic Web Sites PHP Tutorial 1 Getting Started with Dynamic Web Sites Setting Up Your Computer To follow this tutorial, you ll need to have PHP, MySQL and a Web server up and running on your computer. This will be your

More information

Using ODBC with MDaemon 6.5

Using ODBC with MDaemon 6.5 Using ODBC with MDaemon 6.5 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Other product and company names

More information

Perceptive Intelligent Capture Solution Configration Manager

Perceptive Intelligent Capture Solution Configration Manager Perceptive Intelligent Capture Solution Configration Manager Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: February 2016 2015 Lexmark International Technology, S.A.

More information

SoftwarePlanner Active Directory Authentication

SoftwarePlanner Active Directory Authentication User s Guide SoftwarePlanner Active Directory Authentication This document provides an explanation of using Active Directory with SoftwarePlanner. 1 Narrative In some situations, it may be preferable to

More information

Using the Query Analyzer

Using the Query Analyzer Using the Query Analyzer Using the Query Analyzer Objectives Explore the Query Analyzer user interface. Learn how to use the menu items and toolbars to work with SQL Server data and objects. Use object

More information

Database Setup. Coding, Understanding, & Executing the SQL Database Creation Script

Database Setup. Coding, Understanding, & Executing the SQL Database Creation Script Overview @author R.L. Martinez, Ph.D. We need a database to perform the data-related work in the subsequent tutorials. Begin by creating the falconnight database in phpmyadmin using the SQL script below.

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

Asia Web Services Ltd. (vpshosting.com.hk)

Asia Web Services Ltd. (vpshosting.com.hk) . (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk

More information

VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007

VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 Rocksalt International Pty Ltd support@vpasp.com www.vpasp.com Table of Contents 1 INTRODUCTION... 3 2 FEATURES... 4 3 WHAT

More information

LabVIEW Internet Toolkit User Guide

LabVIEW Internet Toolkit User Guide LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

FileMaker Server 9. Custom Web Publishing with PHP

FileMaker Server 9. Custom Web Publishing with PHP FileMaker Server 9 Custom Web Publishing with PHP 2007 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker,

More information

Expresso Quick Install

Expresso Quick Install Expresso Quick Install 1. Considerations 2. Basic requirements to install 3. Install 4. Expresso set up 5. Registering users 6. Expresso first access 7. Uninstall 8. Reinstall 1. Considerations Before

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information

SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases.

SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases. SQL Databases Course by Applied Technology Research Center. 23 September 2015 This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases. Oracle Topics This Oracle Database: SQL

More information

TestTrack Test Case Management Quick Start Guide

TestTrack Test Case Management Quick Start Guide TestTrack Test Case Management Quick Start Guide This guide is provided to help you get started with TestTrack test case management and answer common questions about working with test cases and test runs.

More information

User-password application scripting guide

User-password application scripting guide Chapter 2 User-password application scripting guide You can use the generic user-password application template (described in Creating a generic user-password application profile) to add a user-password

More information

Log Analyzer Reference

Log Analyzer Reference IceWarp Unified Communications Log Analyzer Reference Version 10.4 Printed on 27 February, 2012 Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 3 Advanced Configuration...

More information

ConvincingMail.com Email Marketing Solution Manual. Contents

ConvincingMail.com Email Marketing Solution Manual. Contents 1 ConvincingMail.com Email Marketing Solution Manual Contents Overview 3 Welcome to ConvincingMail World 3 System Requirements 3 Server Requirements 3 Client Requirements 3 Edition differences 3 Which

More information

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should

More information

IceWarp Server. Log Analyzer. Version 10

IceWarp Server. Log Analyzer. Version 10 IceWarp Server Log Analyzer Version 10 Printed on 23 June, 2009 i Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 2 Advanced Configuration... 5 Log Importer... 6 General...

More information

Cyber Security Workshop Ethical Web Hacking

Cyber Security Workshop Ethical Web Hacking Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

MySQL for Beginners Ed 3

MySQL for Beginners Ed 3 Oracle University Contact Us: 1.800.529.0165 MySQL for Beginners Ed 3 Duration: 4 Days What you will learn The MySQL for Beginners course helps you learn about the world's most popular open source database.

More information

SerialMailer Manual. For SerialMailer 7.2. Copyright 2010-2011 Falko Axmann. All rights reserved.

SerialMailer Manual. For SerialMailer 7.2. Copyright 2010-2011 Falko Axmann. All rights reserved. 1 SerialMailer Manual For SerialMailer 7.2 Copyright 2010-2011 Falko Axmann. All rights reserved. 2 Contents 1 Getting Started 4 1.1 Configuring SerialMailer 4 1.2 Your First Serial Mail 7 1.2.1 Database

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

1. Building Testing Environment

1. Building Testing Environment The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,

More information

Setting up SQL Translation Framework OBE for Database 12cR1

Setting up SQL Translation Framework OBE for Database 12cR1 Setting up SQL Translation Framework OBE for Database 12cR1 Overview Purpose This tutorial shows you how to use have an environment ready to demo the new Oracle Database 12c feature, SQL Translation Framework,

More information

WebCruiser Web Vulnerability Scanner User Guide

WebCruiser Web Vulnerability Scanner User Guide WebCruiser Web Vulnerability Scanner User Guide Content 1. Software Introduction... 3 2. Main Function... 4 2.1. Web Vulnerability Scanner... 4 2.2. SQL Injection Tool... 6 2.3. Cross Site Scripting...

More information

A Brief Introduction to MySQL

A Brief Introduction to MySQL A Brief Introduction to MySQL by Derek Schuurman Introduction to Databases A database is a structured collection of logically related data. One common type of database is the relational database, a term

More information

Install MS SQL Server 2012 Express Edition

Install MS SQL Server 2012 Express Edition Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other

More information

SQL Injection January 23, 2013

SQL Injection January 23, 2013 Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2

More information

Query JD Edwards EnterpriseOne Customer Credit using Oracle BPEL Process Manager

Query JD Edwards EnterpriseOne Customer Credit using Oracle BPEL Process Manager Query JD Edwards EnterpriseOne Customer Credit using Oracle BPEL Process Manager 1 Overview In this tutorial you will be querying JD Edwards EnterpriseOne for Customer Credit information. This is a two

More information

Upgrading MySQL from 32-bit to 64-bit

Upgrading MySQL from 32-bit to 64-bit Upgrading MySQL from 32-bit to 64-bit UPGRADING MYSQL FROM 32-BIT TO 64-BIT... 1 Overview... 1 Upgrading MySQL from 32-bit to 64-bit... 1 Document Revision History... 21 Overview This document will walk

More information

Facebook Twitter YouTube Google Plus Website Email

Facebook Twitter YouTube Google Plus Website Email PHP MySQL COURSE WITH OOP COURSE COVERS: PHP MySQL OBJECT ORIENTED PROGRAMMING WITH PHP SYLLABUS PHP 1. Writing PHP scripts- Writing PHP scripts, learn about PHP code structure, how to write and execute

More information

OLH: Oracle Loader for Hadoop OSCH: Oracle SQL Connector for Hadoop Distributed File System (HDFS)

OLH: Oracle Loader for Hadoop OSCH: Oracle SQL Connector for Hadoop Distributed File System (HDFS) Use Data from a Hadoop Cluster with Oracle Database Hands-On Lab Lab Structure Acronyms: OLH: Oracle Loader for Hadoop OSCH: Oracle SQL Connector for Hadoop Distributed File System (HDFS) All files are

More information

Changing Passwords in Cisco Unity 8.x

Changing Passwords in Cisco Unity 8.x CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords

More information

Expert PHP and MySQL. Application Desscpi and Development. Apress" Marc Rochkind

Expert PHP and MySQL. Application Desscpi and Development. Apress Marc Rochkind Expert PHP and MySQL Application Desscpi and Development Marc Rochkind Apress" Contents About the Author About the Technical Reviewer Acknowledgments Introduction xvii xix xxi xxiii -Chapter 1: Project

More information

Once logged in you will have two options to access your e mails

Once logged in you will have two options to access your e mails How do I access Webmail? Webmail You can access web mail at:- http://stu.utt.edu.tt:2095 or https://stu.utt.edu.tt:2096 Enter email address i.e. user name (full email address needed eg. fn.ln@stu.utt.edu.tt

More information

LICENSE4J FLOATING LICENSE SERVER USER GUIDE

LICENSE4J FLOATING LICENSE SERVER USER GUIDE LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux

More information

How to utilize Administration and Monitoring Console (AMC) in your TDI solution

How to utilize Administration and Monitoring Console (AMC) in your TDI solution How to utilize Administration and Monitoring Console (AMC) in your TDI solution An overview of the basic functions of Tivoli Directory Integrator's Administration and Monitoring Console and how it can

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET

More information

MySQL Manager. User Guide. July 2012

MySQL Manager. User Guide. July 2012 July 2012 MySQL Manager User Guide Welcome to AT&T Website Solutions SM We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain a successful

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET

More information

Customer Bank Account Management System Technical Specification Document

Customer Bank Account Management System Technical Specification Document Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6

More information

FileMaker Security Guide The Key to Securing Your Apps

FileMaker Security Guide The Key to Securing Your Apps FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account

More information

Aradial Installation Guide

Aradial Installation Guide Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document

More information

Advanced Web Security, Lab

Advanced Web Security, Lab Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,

More information

SQL Injection Attack Lab Using Collabtive

SQL Injection Attack Lab Using Collabtive Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information