Amazon recently changed their requirements for sending information back and forth between you and them. This includes the addition of a hash which is used to authenticate your calls with a secret key. Here’s the message from the email: Dear Product Advertising API Developer, We wanted to remind you that all Product Advertising API developers… Read more »
This is a method for compressing files using the ZIP compression and assigning passwords to them on demand. One requirement is that you are on a Linux server (the script executes command line options that aren’t present on a Windows PC).
This is a comprehensive list of words that are ignored by MySQL’s fulltext search by default. This list is known as stopwords and are ignored because they are too common. (Also ignored are words that are three or less characters long).
Originally written by Thomas Hunter as a homework assignment in college. The object of the assignment was to hide data inside of a word document. The Microsoft Word version that I used is 2007 as that is the version that I own. Several months I read an article about Microsoft’s attempt to turn its new… Read more »
How to setup a web application to use a single entry point, reducing code redundancy.
This tutorial explains a method for linking to other websites which will allow you to use an exit counting script without inhibiting SEO.
This is a tutorial regarding cleaning/sanitizing user inputted data using PHP and Regular Expressions. You should always clean data from a user and treat it as if it contains bad characters.