Posted by & filed under PHP.

Amazon recently changed their requirements for sending information back and forth between you and them. This includes the addition of a hash which is used to authenticate your calls with a secret key. Here’s the message from the email: Dear Product Advertising API Developer, We wanted to remind you that all Product Advertising API developers… Read more »

Posted by & filed under MySQL.

This is a comprehensive list of words that are ignored by MySQL’s fulltext search by default. This list is known as stopwords and are ignored because they are too common. (Also ignored are words that are three or less characters long).

Posted by & filed under Security.

Originally written by Thomas Hunter as a homework assignment in college. The object of the assignment was to hide data inside of a word document. The Microsoft Word version that I used is 2007 as that is the version that I own. Several months I read an article about Microsoft’s attempt to turn its new… Read more »