As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
What is the easiest way to set up a page to log a visitors ip address.
I just want to record when the visitor came and from what ip.
Should I be looking at google analytics for this or is there some simple script I can throw on the page to do it.
Any pointers much appreciated,
Just read the web server logs.
Related
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
is there an online tool for MySQL (or just SQL) that lets me quickly test some ideas that come to my mind randomly?
Like JSFiddle for HTML/CSS/JS
Or http://writecodeonline.com/php/ for PHP?
Something like this but for MySQL.
Thanks in advance.
Are you looking for something like this?
http://sqlfiddle.com/ or http://sqltest.net/
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
I am developing a website in MVC3 and EF Connect to Mysql. As requested I have my own permissions and roles tables. and now need to control access to the views of the website. I was thinking that this would have to use static classes or something similar to allow or restrict access, but I think it would be malpractice. what would be the best way to validate each of the views or controllers?
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
Does anyone know when the chrome.identity API will make it to stable?
http://developer.chrome.com/apps/app_identity.html
You can follow https://code.google.com/p/chromium/issues/detail?id=233250 for progress. The API is unlikely to make Chrome 28 stable, but Chrome 29 is a possibility. Using the API in your in-development applications and filing bugs based on your usage are the kind of feedback the team needs to increase the chances of making stable sooner.
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I want to download a zip file from server and save on local machine without any user action (without dialog box).
Not possible. Think about what you're asking, particularly in terms of security.
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 11 years ago.
Last March(2011)
http://techie-buzz.com/tech-news/mysql-com-database-compromised-sql-injection.html
This Month(2011)
http://www.pcworld.com/businesscenter/article/240609/mysqlcom_hacked_to_serve_malware.html
Actually, the database wasn't hacked. The database did exactly what it was supposed to.
The application in front of the database was hacked.
Use any database and put a foul lot of code directly touching tables and you'll end up with a hackable pile.