Rubusinessjobindex Php Search Results

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up an open wifi with the same name displaying a very similar web page asking for credentials? Usually if there are multiple wifi networks with the same name and encryption, devices only display the one with the highest sign...

How To: Install custom ROM's on a rooted Motorola Droid smartphone

The Motorola Droid is the reigning king of the Android family, but it's getting a little old and you're probably looking for a way to improve your phone's performance if you own one. Why not root the dang thing and install a custom ROM on it so it'll at least be organized the way you want it to be! This video will show you how to install custom ROM's (basically phone UI's) on a rooted Motorola Droid phone, allowing you nearly limitless customization options for your awesome phone. The ROM in ...

How To: Add Shaders and Pixel Bender to Away3D Lite in Adobe Flash Builder

In this clip, you'll learn how to add Shaders and Pixel Bender to Away3D Lite in Adobe Flash Builder. Whether you're new to the PHP: Hypertext Preprocessor scripting language or are a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free video programming lesson. For more information, including detailed, step-by-step instructions, take a look.

How To: Create a MySQL database for Celtx media pre-production application

In this clip, you'll learn how to generate a basic MySQL database for use with Celtx. Whether you're new to the PHP: Hypertext Preprocessor scripting language or are a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free video programming lesson. For more information, including detailed, step-by-step instructions, take a look.

How To: Install the PHP5 GD Library for Moodle

Interested in teaching an online course using your own server but can't quite figure out how to install everything you'll need? This video demonstrates how to sinstall the PHP GD Library for Moodle, the free, open source course management utility, via SSH. For exhaustive, step-by-step instructions, take a look.

How To: Build a web form in Dreamweaver

Learn how to build a web-based form using HTML. This tutorial covers using Labels, Text Fields, Text Boxes, Radio Button Groups, Checkboxes, The Clear and Submit buttons, Drop down Menus, as well as many of the properties you can edit while building the form. The form will be ready to be linked with a PHP file for use when you are finished.

How To: Build an analog internet meter out of an Arduino Ethernet Shield

The internet has created amazing new standards for how closely information can be followed. If you want a portable analog unit that will monitor one important piece of online info continuously and have some DIY electrical knowhow, watch this video. It will show you how to use an Arduino Ethernet Shield to make an internet meter to monitor email, stocks, and other online info on a simple analog display. You will need to know some PHP to make this work.

How To: Make your own lipstick bullet

With thousands of beauty companies out there, we can generally find at least one lipstick shade that makes us look more dazzling than New Year's Eve. But sometimes, whether you need to match your lipstick to your dress or just can't seem to find The One, you need a specific color that no brand carries.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.