Facebook Twitter

PHP tutorial for beginners.


/packer/ Slim. Behat — BDD for PHP. PHP: a fractal of bad design - fuzzy notepad. (This article has been translated into Thanks!)

PHP: a fractal of bad design - fuzzy notepad

Preface I’m cranky. I complain about a lot of things. There’s a lot in the world of technology I don’t like, and that’s really to be expected—programming is a hilariously young discipline, and none of us have the slightest clue what we’re doing. DeveloperWorks : Open source : Technical library. Top Design Magazine - Web Design and Digital Content - StumbleUpon. Kohana. Laravel. Auth/ACL implementation strategies « Internet Strategy Guide. I’m going to talk more about ACLs than Auth.

Auth/ACL implementation strategies « Internet Strategy Guide

Auth is simple, it’s the ACL that will trip you up. Since both concepts are coupled together when you’re making a login system, I feel it’s appropriate to at least touch on Auth. How to build role-based access control in SQL at Xaprb. The posts I’ve been reading and writing recently have reminded me how Object-Relational Mapping (ORM) systems make it fun and convenient to interact with databases.

How to build role-based access control in SQL at Xaprb

For some of the reasons they’re a developer’s favorite, they can be a database administrator’s nightmare (think surrogate keys). But designing tables with a consistent set of columns has its benefits. Just because the columns are meta-data that have no intrinsic meaning doesn’t mean they have no value. In this series of articles I’ll show you several ways to use such “meaningless” meta-data to enable powerful, efficient application-level role-based access control (RBAC) in the database, with a focus on web applications, though you could do this for any application. The systems I’ve built are complex, so I’ll split this into at least two articles. A lightweight approach to ACL - The 33 lines of Magic » Debuggable Ltd. Ok, I just finished a terrible (extended) weekend that featured 12 hours of CSS coding.

A lightweight approach to ACL - The 33 lines of Magic » Debuggable Ltd

The only reason I didn't loose my sanity was that I finally decided to figure out what the heck is wrong with IE. Those of you who have to do get their hands dirty in the field of graphics, css, and other non-php work from time to time as well, make sure to check out Position is Everything at some point, it really helped me out quite a bit so far. Anyway, that's not really what I want to talk about today. One of the topics I have been very silent about for months is ACL. At the end of May I was somewhat unhappy with some of the things regarding the CakePHP DB ACL implementation. Datenbank-Verwaltung in einer einzigen PHP-Datei.


The Usability of Passwords (by @baekdal) #tips. Security companies and IT people constantly tells us that we should use complex and difficult passwords.

The Usability of Passwords (by @baekdal) #tips

This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms. Getting Real. Here are the 16 chapters and 91 essays that make up the book.

Getting Real

Introduction chapter 1 What is Getting Real?


Security. Tools. Articles. Libraries. Xampp.