Login   Register  
PHP Classes
elePHPant
Icontem

All package blogs

Recommend this page to a friend!
Stumble It! Stumble It! Bookmark in del.icio.us Bookmark in del.icio.us

Latest posts of all package blogs

  PHP Classes blog PHP Classes blog   Blog All package blogs  
  102 - 93   92 - 83   82 - 73   72 - 63   62 - 53   52 - 43   42 - 33   32 - 23   22 - 13   12 - 3   2 - 1  

1. Operating instructions

Posted on: 2014-12-19
Blog: PHP i81n package blog
Package: PHP i81n

This article provides basic instructions for using PHP i81n class, to translate websites and systems developed in PHP.

Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

6. OAuth Pin Based Authorization for Twitter, LinkedIn, Imgur and Others

Posted on: 2014-11-25
Blog: PHP OAuth API package blog
Package: PHP OAuth API

Some applications need to access OAuth based APIs but since they are not based on regular Web browsers, they need to need to use an alternative method to obtain the user authorization.

Pin based authorization is a method used for instance by applications based on the command line, desktop applications, embedded systems, game consoles, and certain types of mobile apps.

Read this article to learn how the pin based OAuth authorization process works and how can you implement it in your applications using the PHP OAuth API class.


Blog More ...   Post a comment Post a comment   See comments See comments (1)   Trackbacks (0)

1. ...as a generic buffering tool

Posted on: 2014-11-24
Blog: Item Cache package blog
Package: Item Cache

Using itemcache to speed up writes

Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

5. 4 Ways to Access an OAuth API Without User Interaction

Posted on: 2014-11-10
Blog: PHP OAuth API package blog
Package: PHP OAuth API

OAuth is a protocol used to access APIs on behalf of an user but the user does not need to be present when the API is accessed.

There are even ways that allow applications to access APIs using tokens obtained without any user intervention, thus allowing greater application automation.

Read this article to learn about several ways to access a OAuth based API without the user presence.


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

1. PHP MySQL Wrapper Class

Posted on: 2014-11-01
Blog: PHP MySQL Wrapper Class package blog
Package: PHP MySQL Wrapper Class

Usage examples and code snippets.

Blog More ...   Post a comment Post a comment   See comments See comments (1)   Trackbacks (0)

2. What is Horus Framework

Posted on: 2014-08-25
Blog: Horus Framework package blog
Package: Horus Framework

Here is an introduction into one of the micro frameworks in php world
it is smart, lightweight and portable .
This post we are talking about Horus Framework 6.x
Download it from here:
{ http://www.phpclasses.org/horus }


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

1. MySql To Mongo

Posted on: 2014-08-20
Blog: PHP MySQL to Mongo package blog
Package: PHP MySQL to Mongo

Why this class

Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

1. Use configurations in a project

Posted on: 2014-08-01
Blog: Fuse Array package blog
Package: Fuse Array

By using Fuse Array it gets much easier to handle configurations in a project.

Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

1. Why Using Horus Micro Framework ?

Posted on: 2014-07-15
Blog: Horus Framework package blog
Package: Horus Framework

Why using a micro framework, and why horus, is that a wheel reinvention ?

Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

4. Is Your OAuth 2.0 Application Secure?

Posted on: 2014-05-26
Blog: PHP OAuth API package blog
Package: PHP OAuth API

Recently, a security vulnerability named Covert Redirect was discovered in certain implementations of the OAuth 2.0 protocol.

If you have a site that uses OAuth to access the APIs of other sites on behalf of your users, your site may be inadvertently helping attackers to steal your users' data.

Read this article to learn how to check if your application is vulnerable and what you can do to fix it.


Blog More ...   Post a comment Post a comment   See comments See comments (1)   Trackbacks (0)


  102 - 93   92 - 83   82 - 73   72 - 63   62 - 53   52 - 43   42 - 33   32 - 23   22 - 13   12 - 3   2 - 1  
  PHP Classes blog PHP Classes blog   Blog All package blogs