In a previous article here on PHPMaster, you saw how to create watermarks with Imagick using an overlay image. In this article, you’ll see you how to achieve a similar effect using plain text.
Role Based Access Control is a model in which roles are created for various job functions and permissions to perform operations are then tied to them. A user can be assigned to one or multiple roles which restricts their system access to the permissions for which they have been authorized. In this article you’ll learn more about RBAC, and how to enhance your existing authentication system with it.
A problem that has plagued web developers for years is how to add real-time information to their applications, such a progress bar for file uploads. Users are impatient; they don’t want to sit and wait while the browser is doing something and wonder whether it has frozen or if they have a slow connection. Providing a progress indicator gives users useful information and lets them know exactly what’s going on. Learn how a new feature in PHP 5.4 can be used to create a dynamic upload progress bar without any external libraries or browser dependencies.
MySQL events (also known as temporal triggers) were added in MySQL 5.1.6 and offer an alternative to scheduled tasks and cron jobs for database activities. This article will teach you what you need to know to create and manage events of your own.
This is the second article in the two part series showing you how to create a photo blog that can updated on the go from your mobile device. You’ll bring together the database schema and POP3 class from the previous part and toss in a little cron magic to finish the project.
The convenience of being able to access the Internet from anywhere at any time has made sharing messages and pictures very popular. This is the first article in a two-part series in which you’ll learn how to create a photo blog as part of your personal website which you can update from your mobile phone simply by sending an email.
CSRF is a serious exploit where a user is tricked into performing an action he didn’t explicitly intend to do. Learn exactly how CSRF attacks work and what you can do to protect yourself and your users because, as the old saying goes, “an ounce of prevention is worth a pound of cure.”
How would you know if something is modified or deleted from your website, be it either maliciously or unintentionally? This article teaches you how to create a profile of your site’s file structure using hashes which then can be used to monitor the site’s integrity.