|Website hosting nowsadays is very competitive. Many web hosting companies offer tonnes of features at very competitive prices. With so many choices in mind, how do you choose the right host? I have tried many hosts over the years and finally landed on one that I feel has the most complete features that I need at the best possible price, ie BlueHost.|
BlueHost provides hosting features thatÂ surpass the needs ofÂ large commercial websites:10 Gigabyte Hosting Space
Host 6 Domains on 1 Account!!!
2,500 POP/Imap Email Accounts
250 GIGS of Transfer
SSL, FTP, Stats
CGI, PHP, MySQL
2000/2002/2003 Front Page Extensions
Free Domain Forever!
Superb/Responsive Support EngineersÂ
Reliability and Performance
|You must have heard of the term “Quality Links”. How about “Quality Traffic”? “Quality links” means that the one way links coming to your website are from reliable sources and the content is related to yours. For example, if your website is about web design and a link pointing to your site from the web design section of msn website is considered as a quality link. “Quality Traffic” means that the people who come to your website via whatever channels are actually looking for something and have better chances of using your services. They are looking for something specific and your website can provide the answer and make them stay longer. Quality links are important in search engine optimisation as to Quality Traffic to sales generation.|
|Forum / Blog
By participating in forums, you are exposing your url to anyone who is reading your post. For example, if you provide web design service, you might want to be more active in the web design section of the forum because you know that the people who are reading your post are people who are interested in web design. The clicks from these people are usually more valuable than clicks from any other tom, dick and harry. I would recommend using only one link in your signature to avoid confusion. Some people use alot of links in their signature for SEO purposes and that actually defeats the whole idea of getting quality traffic.
Many people leave their urls when participating in blog discussions. Like forums, people who take time to read the blog are interested in the topic. Depending on the popularity of the blog, your url in the blog comments may provide you with quality traffic.
Online Advertisement / PPC Programs
There are other ways to get traffic but most of them are not really effective. I will list 2 commonlyÂ used techniques nowsadays:
Guaranteed Targeted Hits
Hits Exchange Network
|Almost every website nowsadays will have some sort of a login system. If you decide to write a login script yourself in PHP, this article will provide some important pointers on the security of the script you are writing. This article will talk on a common login hacking technique known as The SQL Injection Attack. This is not new in the programmer’s world but worth taking note especially when you are new to programming.There are hackers everywhere, so beware!Â|
|When the user submits a form consisting of the username and password, all the variables will be store in the $_POST array after submitting. You can get the values of the array easily using:
$usr = $_POST[‘username’];
Where “username” and “password”Â are the names of the textfields in your form.
How do you deal with these values?
SELECT * FROM `user_table`Â where username=’$usr’ AND password=’$pwd’
Re-looking at theÂ SQL statement, if someone leaves username empty and writesÂ “Â ‘Â OR username LIKE ‘%”Â in theÂ password field, then your wholeÂ SQL statement becomes:
SELECT * FROM `user_table`Â where username=’ ‘ AND password=’Â ‘ OR username LIKEÂ ‘ %Â ‘
This statement means selecting all the records in the table.Â If your criteria of lettingÂ the user proceedÂ is thatÂ the return number of records is more than 0 (at least one user found), then this SQL statement will return all records, meaning that the user will be able to slip passÂ through the verification process. This type of hacking is famously known as The SQL injection attacks.
One good way to prevent this from happening is to make sure the $_POST array is safe from escape strings such asÂ ‘ and “. You can filter your $_POST array using
$usr = mysql_real_escape_string($_POST[‘username’]);
There are of course other ways to do it but the idea is to let you know that youÂ have to be very carefulÂ in handling the dataÂ retrieved from forms, epecially more so for usernames and passwords.
|There are many variants of Linux used in different computer systems today. Luckily, most Linux developers employ a common naming and utilization scheme that makes different variants of Linux easy to use and maintain. This article will discuss some important and common directories in many popular Linux distributions.|
Each user of a Linux system is assigned a special directory, called “home” direectory, that represents their private space on the system. For example, if a user of the system is called tom, the home directory of tom will be /home/tom. Tom has the right to create any files and directories under his home directory. This is also the default locationÂ when tom logs into the system.
/bin and /usr/bin
/sbin and /usr/sbin
This will be my blog site. There is nothing in here yet. I will add something in the next few days. Thanks everyone.Â