Ingolme

Moderator
  • Content count

    12,979
  • Joined

  • Last visited

  • Days Won

    317

Ingolme last won the day on June 9

Ingolme had the most liked content!

Community Reputation

781 Excellent

5 Followers

About Ingolme

  • Rank
    Foxy Mod

Previous Fields

  • Languages
    Javascript, PHP, MySQL

Contact Methods

  • Website URL
    http://www.thecodingfox.com/
  • ICQ
    0

Profile Information

  • Gender
    Not Telling
  • Interests
    Web development, drawing, videogames, foxes.

Recent Profile Visitors

159,500 profile views
  1. No, not all text, only paragraphs or sentences. Text should be contained by the HTML element that best describes it. The <p> tag does not allow block elements, such as <h1-6> or <li>, as children. If you try to do it, the browser will implicitly close your paragraph where the next tag starts. If you find yourself writing code like this: <div class="text">Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.</div> <span>It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.</span> Then you should change those to <p> tags.
  2. MD5 and SHA-1 are both considered too weak to be secure these days. The PHP manual itself advises against using them for hashing: http://php.net/sha1 Let PHP use password_hash to handle passwords, it uses much stronger hashing algorithms.
  3. The table in the Wikipedia article states exactly what all the additional bytes are. I'll just copy what's in the article here for you and show your bytes next to them: https://en.wikipedia.org/wiki/Zip_(file_format)#File_headers 2 bytes: Number of this disk 0x0000 2 bytes: Disk where central directory starts 0x0000 2 bytes: Number of central directory records on the disk 0x0002 2 bytes: Total number of central directory records 0x0002 4 bytes: Size of central directory (bytes) 0x0000006F 4 bytes: Offset of start of central directory, relative to start of archive 0x00000984 2 bytes: Comment length (n) 0x0000 n bytes: Comment
  4. According to Wikipedia, 50 4B 05 06 marks the start of the End of central directory header which contains some information about the ZIP file.
  5. The web root is the folder on the server which contains your website. It could be called "www", "htdocs", "html" or a variety of other names. Anything inside that folder can be accessed through HTTP with a URL. If the file is outside the web root, you won't need htaccess to protect it because it's already inaccessible.
  6. CSS and, by extension, W3.CSS take care of styling HTML. How the HTML was generated (using PHP, handwritten or otherwise) isn't really relevant to how it's used. If you're generating HTML with PHP then be sure to give the correct classes to the elements. My recommendation is to separate the HTML from the actual business logic and put it into self-contained template files which are included using PHP after everything has been processed.
  7. There's an :after pseudo-element with a background color the same as the page's background color which is positioned in front of an unsplit border.
  8. I'd have to see your code and what the validation errors say to tell you how to fix it. If you're using microdata attributes it's not going to validate because it's using non-standard attributes. I recommend JSON-LD for structured data.
  9. It says in your editor that the exception occurred in LoginTest.java at line 77. You should check to see if the variable row1 is null.
  10. The console should tell you exactly on what line the exception occurred.
  11. You're going to have to tell me what line its on, but usually that means you tried to use an object that wasn't initialized.
  12. The W3Schools tutorials for PHP and SQL have all the information you need. If you need help with something specific in the code you can ask questions about it here.
  13. The syntax source: availableTags is not proper Javascript. If "source" is meant to be a variable you would write source = availableTags; Even if you do assign something to a variable named "source", you're not using the variable anywhere so it wouldn't do anything.
  14. Unless specifically programmed otherwise, the server will serve the same content to everybody. If you have a PHP file that can manipulate files or the database then it's open for everybody to use and is an easy attack vector on your website, if you want to prevent other people from using it you will have to add some form of authentication. In summary, nothing is stopping me from sending a POST request to your web host.
  15. The superglobal is like any other variable in the PHP process, it only exists during the time the script is running. If you want to store its value permanently somewhere you can use a database or write it to a file. If you want to store something for one user during a browsing session you can use PHP sessions.