PHP

Preventing MySQL Injection in PHP

Security issues like MySQL injection can only be corrected by using two functions mysql_real_escape_string (php manual) and stripslashes (php manual).   Example: $safe_string = mysql_real_escape_string(stripslashes($tainted_string));$safe_string = mysql_real_escape_string(stripslashes($tainted_string));   To make your life a little easier just create a suitable function for this line of code: function checkString($value) {       return mysql_real_escape_string(stripslashes($value));   }function checkString($value) …

Tor

How to surf the web anonymously

One of the easiest and most effective ways to keep your identity secret while you are surfing the internet is by using the TOR network. Tor tools are available for Windows, Linux, BSD, Unix, Mac OS X, Android, iOS and Maemo. The great thing about Tor except from its effectiveness, you really surf the web …

HTML & CSS, WEB

Regular Expressions in HTML

In HTML5 there is a new input field attribute called pattern. This attribute specifies a regular expression that the <input> element’s value is checked against. The pattern attribute is available for text, search, url, tel, email, and password field. If you would like to describe the pattern, to help the user fill the field correctly …