.htaccess is a configuration file for use on web servers running the Apache Web Server software. When a .htaccess file is placed in a directory which is in turn 'loaded via the Apache Web Server', then the .htaccess file is detected and executed by the Apache Web Server software. These .htaccess files can be used to alter the configuration of the Apache Web Server software to enable/disable additional functionality and features that the Apache Web Server software has to offer. These facilities include basic redirect functionality, for instance if a 404 file not found error occurs, or for more advanced functions such as content password protection or image hot link prevention.
A set of slides that provides a high-level overview of the W3C Linked Data Platform specification presented at the 4th Linked Data in Architecture and Construction Workshop.
For more detailed and technical version of the presentation, please refer to
http://www.slideshare.net/nandana/learning-w3c-linked-data-platform-with-examples
LDAC 2016 programme
http://smartcity.linkeddata.es/LDAC2016/#programme
The document provides an overview of caching in ASP.NET, including output caching, fragment caching, and data caching. It discusses using the @OutputCache directive and Cache object to cache page output. Fragment caching allows caching regions of a page defined by user controls. Data caching stores application data in memory for faster retrieval. It also covers cache dependencies, scavenging, and callbacks to automatically remove cached items.
MVC stands for Model-View-Controller. The MVC pattern separates an application into three parts: the model, the view, and the controller. The model handles the application's data logic, the view handles presentation logic, and the controller handles business logic and communication between the model and view. MVC is commonly used in PHP frameworks like CodeIgniter to separate an application's logical components.
The document provides an overview of fundamental JavaScript concepts such as variables, data types, operators, control structures, functions, and objects. It also covers DOM manipulation and interacting with HTML elements. Code examples are provided to demonstrate JavaScript syntax and how to define and call functions, work with arrays and objects, and select and modify elements of a web page.
The document provides an introduction to JavaScript, including its history and uses. It discusses how JavaScript is an interpreted programming language used for client-side scripting of web pages to make them dynamic and interactive. The document outlines key JavaScript concepts like variables, functions, operators, and conditional statements. It provides examples of how to write JavaScript programs and embed them in HTML files using the <script> tag.
The document discusses Node.js streams and provides examples of how to create and use streams. It explains that streams are used for operations involving files, TCP sockets, child processes, and more. Examples are given for creating readable and writable streams, piping streams together, gzip compression with streams, and implementing the readable stream interface. Stream classes like Readable, Writable, Duplex and Transform are also briefly explained.
The document discusses Object Relational Mapping (ORM) in Django. It begins by explaining that ORM provides an API that allows accessing databases in an object-oriented style, making the database more transparent. It then provides examples of how to define models by inheriting from Django's Model class and adding fields. Various field types like CharField, IntegerField, DateField are demonstrated. It also shows how to define relationships and primary keys. The document concludes by explaining how to perform CRUD operations on models in an object-oriented way using Django's ORM APIs.
A set of slides that provides a high-level overview of the W3C Linked Data Platform specification presented at the 4th Linked Data in Architecture and Construction Workshop.
For more detailed and technical version of the presentation, please refer to
http://www.slideshare.net/nandana/learning-w3c-linked-data-platform-with-examples
LDAC 2016 programme
http://smartcity.linkeddata.es/LDAC2016/#programme
The document provides an overview of caching in ASP.NET, including output caching, fragment caching, and data caching. It discusses using the @OutputCache directive and Cache object to cache page output. Fragment caching allows caching regions of a page defined by user controls. Data caching stores application data in memory for faster retrieval. It also covers cache dependencies, scavenging, and callbacks to automatically remove cached items.
MVC stands for Model-View-Controller. The MVC pattern separates an application into three parts: the model, the view, and the controller. The model handles the application's data logic, the view handles presentation logic, and the controller handles business logic and communication between the model and view. MVC is commonly used in PHP frameworks like CodeIgniter to separate an application's logical components.
The document provides an overview of fundamental JavaScript concepts such as variables, data types, operators, control structures, functions, and objects. It also covers DOM manipulation and interacting with HTML elements. Code examples are provided to demonstrate JavaScript syntax and how to define and call functions, work with arrays and objects, and select and modify elements of a web page.
The document provides an introduction to JavaScript, including its history and uses. It discusses how JavaScript is an interpreted programming language used for client-side scripting of web pages to make them dynamic and interactive. The document outlines key JavaScript concepts like variables, functions, operators, and conditional statements. It provides examples of how to write JavaScript programs and embed them in HTML files using the <script> tag.
The document discusses Node.js streams and provides examples of how to create and use streams. It explains that streams are used for operations involving files, TCP sockets, child processes, and more. Examples are given for creating readable and writable streams, piping streams together, gzip compression with streams, and implementing the readable stream interface. Stream classes like Readable, Writable, Duplex and Transform are also briefly explained.
The document discusses Object Relational Mapping (ORM) in Django. It begins by explaining that ORM provides an API that allows accessing databases in an object-oriented style, making the database more transparent. It then provides examples of how to define models by inheriting from Django's Model class and adding fields. Various field types like CharField, IntegerField, DateField are demonstrated. It also shows how to define relationships and primary keys. The document concludes by explaining how to perform CRUD operations on models in an object-oriented way using Django's ORM APIs.
This document discusses Sling Models in AEM, including what they are, why they are useful, how to use them, and examples of Sling Model annotations. Sling Models allow mapping of Sling objects like resources and requests to plain Java objects using annotations. They reduce coding efforts and make code more maintainable by avoiding redundant code. The document covers the necessary dependencies, common annotations like @Model, @Inject, @Optional, and examples of injecting resources, child resources, and retrieving values from the request.
How to Convert a Component Design into an MUI React CodeWrapPixel
Material UI or MUI library provides you with robust, customizable, accessible, and advanced components, enabling you to build your own design system and develop React applications faster. That includes a huge list of Material icons, foundational components with MUI Core, advanced and powerful components with MUI X, templates, and design kits!
This document outlines PHP functions including function declaration, arguments, returning values, variable scope, static variables, recursion, and useful built-in functions. Functions are blocks of code that perform tasks and can take arguments. They are declared with the function keyword followed by the name and parameters. Functions can return values and arguments are passed by value by default but can also be passed by reference. Variable scope inside functions refers to the local scope unless specified as global. Static variables retain their value between function calls. Recursion occurs when a function calls itself. Useful built-in functions include function_exists() and get_defined_functions().
This is a presentation on Angular 5 getting started. Angular is the one framework for mobile, desktop and web applications. Checkout the demo application:
https://stackblitz.com/edit/http-service-demo
Practical and conceptual overview of Javascript prototype paradigm, how to use prototypes, how do they work, and how do they differ from classes, and why there are no real classes in Javascript.
The document discusses various control structures in PHP including if/else statements, loops (while, do/while, for, foreach), and jumping in and out of PHP mode. It provides examples of how to use each control structure and also discusses adding comments to PHP scripts.
This document provides an overview of file handling in C++. It discusses the need for data files and the two main types: text files and binary files. Text files store readable character data separated by newline characters, while binary files store data in the same format as memory. The key classes for file input/output in C++ are ifstream, ofstream, and fstream. Functions like open(), read(), write(), get(), put(), and close() are used to work with files. Files can be opened in different modes like append, read, or write and it is important to check if they open successfully.
Caching is a technique to save frequently used data into into temporary location. Improves application performance. Reduce a lot of server resources at peak times.
Spring is a flexible Java framework that provides solutions to commonly occurring problems in Java projects. It uses an inversion of control container and aspect-oriented programming to increase modularity. Spring supports features like dependency injection, MVC web development, and integration with other technologies like JPA, Hibernate and JDBC. Some key benefits of Spring include loose coupling of components, reducing boilerplate code, and aiding testability.
The JavaScript programming language is a multi-paradigm language that is misunderstood due to its name, design errors in early implementations, and use in web browsers. It is a functional language that uses objects, prototypes, and closures. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
In this core java training session, you will learn Collections – Lists, Sets. Topics covered in this session are:
• List – ArrayList, LinkedList
• Set – HashSet, LinkedHashSet, TreeSet
For more information about this course visit on this link: https://www.mindsmapped.com/courses/software-development/learn-java-fundamentals-hands-on-training-on-core-java-concepts/
This document provides an overview of MongoDB, a document-oriented NoSQL database. It discusses how MongoDB can efficiently store and process large amounts of data from companies like Walmart, Facebook, and Twitter. It also describes some of the problems with relational databases and how MongoDB addresses them through its flexible document model and scalable architecture. Key features of MongoDB discussed include storing data as JSON-like documents, dynamic schemas, load balancing across multiple servers, and its CRUD operations for creating, reading, updating, and deleting documents.
Web workers allow JavaScript to run concurrently in the background without blocking the UI. They allow computationally intensive tasks to be offloaded to separate threads. There are two types: dedicated workers run in a separate file while shared workers can be accessed by multiple scripts. Workers communicate with the main thread asynchronously through messages and run independently with some limitations like no direct DOM access. They improve performance for intensive tasks like processing large data or polling web services in the background.
The document provides an introduction to Swing and the MVC architecture in Java. It discusses:
1) Swing components use the MVC architecture, giving them greater functionality than AWT components. MVC separates an object's model, view, and controller.
2) The model stores data, view defines presentation, and controller handles interactions. Changes in one update the others through observer notification.
3) Applets are small Java applications that run in web browsers. They have limited access to resources for security. Applets override lifecycle methods like init(), start(), stop(), and destroy().
JavaScript is a scripting language that adds interactivity to HTML pages. It works in all major browsers and is used to build dynamic web pages. JavaScript can react to events, modify HTML elements, validate forms, detect browsers, and write cookies. It is commonly placed in <script> tags within HTML pages or linked via external .js files. Comments are added to explain JavaScript code and prevent execution.
This document provides an overview of building an institutional repository, including:
- Repository structure with communities, collections, and items
- Metadata standards like Dublin Core
- User roles and permissions
- Item submissions and workflows
- Copyright issues and embargoes
- Gathering usage statistics and registering the repository
- Ensuring quality control of metadata and submissions
Comparison of features between ShEx (Shape Expressions) and SHACL (Shapes Constraint Language)
Changelog:
11/06/17
- Removed slides about compositionality
31/May/2017
- Added slide 30 about validation report
- Added slide 32 about stems
- Changed slides 7 and 8 adapting compact syntax to new operator .
23/05/2017:
Slide 14: Repaired typos in typos in sh:entailment, rdfs:range
21/05/2017:
- Slide 8. Changed the example to be an IRI and a datatype
- Added typically in slide 9
- Slide 10: Removed the phrase: "Target declarations can problematic when reusing/importing shapes"
and created slide 27 to talk about reuability
- Added slide 11 to talk about the differences in triggering validation
- Created slide 14 to talk about inference
- Renamed slide 15 as "Inference and triggering mechanism"
- Added slides 27 and 28 to talk about reuability
- Added slide 29 to talk about annotations
18/05/2017
- Slides 9 now includes an example using ShEx RDF vocabulary
- Slide 10 now says that target declarations are optional
- Slide 13 now says that some RDF Schema terms have special treatment in SHACL
- Example in slide 18 now uses sh:or instead of sh:and
- Added slides 22, 23 and 24 which show some features supported by SHACL but not supported by ShEx (property pair constraints, uniqueLang and owl:imports)
This document discusses Sling Models in AEM, including what they are, why they are useful, how to use them, and examples of Sling Model annotations. Sling Models allow mapping of Sling objects like resources and requests to plain Java objects using annotations. They reduce coding efforts and make code more maintainable by avoiding redundant code. The document covers the necessary dependencies, common annotations like @Model, @Inject, @Optional, and examples of injecting resources, child resources, and properties into Sling Models.
The document provides an introduction to HTML basics including text, images, tables and forms. It covers the structure of an HTML document with the <head> and <body> sections. It describes common tags for headings, paragraphs, hyperlinks and images. It also discusses attributes, comments, and different ways to style and format text in HTML. The document is intended to teach HTML fundamentals.
This document provides an overview of using MongoDB with Python. It introduces pymongo, the official Python driver for MongoDB, and covers connecting to MongoDB, performing CRUD operations, aggregation, GridFS for large files, indexing, and ODM frameworks. The presenter is Norberto Leite, a MongoDB Technical Evangelist based in Madrid, Spain.
Apache2 BootCamp : Getting Started With ApacheWildan Maulana
This document provides an overview of installing and configuring the Apache web server. It describes the basic file structure and directories for Apache on Windows and Unix systems. It explains how configuration files and directives work, including containers and conditional evaluation. It also covers how to control and troubleshoot Apache, such as starting, stopping and restarting the server, and resolving common issues.
This document discusses PHP file upload settings and functions for uploading files through a PHP form. It covers checking PHP settings for file uploads, creating a HTML form with enctype of multipart/form-data, validating the file size and type, moving the uploaded file, generating random filenames, and checking the content type. The document is presented by Vishal Kothari and provides his contact information.
This document discusses Sling Models in AEM, including what they are, why they are useful, how to use them, and examples of Sling Model annotations. Sling Models allow mapping of Sling objects like resources and requests to plain Java objects using annotations. They reduce coding efforts and make code more maintainable by avoiding redundant code. The document covers the necessary dependencies, common annotations like @Model, @Inject, @Optional, and examples of injecting resources, child resources, and retrieving values from the request.
How to Convert a Component Design into an MUI React CodeWrapPixel
Material UI or MUI library provides you with robust, customizable, accessible, and advanced components, enabling you to build your own design system and develop React applications faster. That includes a huge list of Material icons, foundational components with MUI Core, advanced and powerful components with MUI X, templates, and design kits!
This document outlines PHP functions including function declaration, arguments, returning values, variable scope, static variables, recursion, and useful built-in functions. Functions are blocks of code that perform tasks and can take arguments. They are declared with the function keyword followed by the name and parameters. Functions can return values and arguments are passed by value by default but can also be passed by reference. Variable scope inside functions refers to the local scope unless specified as global. Static variables retain their value between function calls. Recursion occurs when a function calls itself. Useful built-in functions include function_exists() and get_defined_functions().
This is a presentation on Angular 5 getting started. Angular is the one framework for mobile, desktop and web applications. Checkout the demo application:
https://stackblitz.com/edit/http-service-demo
Practical and conceptual overview of Javascript prototype paradigm, how to use prototypes, how do they work, and how do they differ from classes, and why there are no real classes in Javascript.
The document discusses various control structures in PHP including if/else statements, loops (while, do/while, for, foreach), and jumping in and out of PHP mode. It provides examples of how to use each control structure and also discusses adding comments to PHP scripts.
This document provides an overview of file handling in C++. It discusses the need for data files and the two main types: text files and binary files. Text files store readable character data separated by newline characters, while binary files store data in the same format as memory. The key classes for file input/output in C++ are ifstream, ofstream, and fstream. Functions like open(), read(), write(), get(), put(), and close() are used to work with files. Files can be opened in different modes like append, read, or write and it is important to check if they open successfully.
Caching is a technique to save frequently used data into into temporary location. Improves application performance. Reduce a lot of server resources at peak times.
Spring is a flexible Java framework that provides solutions to commonly occurring problems in Java projects. It uses an inversion of control container and aspect-oriented programming to increase modularity. Spring supports features like dependency injection, MVC web development, and integration with other technologies like JPA, Hibernate and JDBC. Some key benefits of Spring include loose coupling of components, reducing boilerplate code, and aiding testability.
The JavaScript programming language is a multi-paradigm language that is misunderstood due to its name, design errors in early implementations, and use in web browsers. It is a functional language that uses objects, prototypes, and closures. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
In this core java training session, you will learn Collections – Lists, Sets. Topics covered in this session are:
• List – ArrayList, LinkedList
• Set – HashSet, LinkedHashSet, TreeSet
For more information about this course visit on this link: https://www.mindsmapped.com/courses/software-development/learn-java-fundamentals-hands-on-training-on-core-java-concepts/
This document provides an overview of MongoDB, a document-oriented NoSQL database. It discusses how MongoDB can efficiently store and process large amounts of data from companies like Walmart, Facebook, and Twitter. It also describes some of the problems with relational databases and how MongoDB addresses them through its flexible document model and scalable architecture. Key features of MongoDB discussed include storing data as JSON-like documents, dynamic schemas, load balancing across multiple servers, and its CRUD operations for creating, reading, updating, and deleting documents.
Web workers allow JavaScript to run concurrently in the background without blocking the UI. They allow computationally intensive tasks to be offloaded to separate threads. There are two types: dedicated workers run in a separate file while shared workers can be accessed by multiple scripts. Workers communicate with the main thread asynchronously through messages and run independently with some limitations like no direct DOM access. They improve performance for intensive tasks like processing large data or polling web services in the background.
The document provides an introduction to Swing and the MVC architecture in Java. It discusses:
1) Swing components use the MVC architecture, giving them greater functionality than AWT components. MVC separates an object's model, view, and controller.
2) The model stores data, view defines presentation, and controller handles interactions. Changes in one update the others through observer notification.
3) Applets are small Java applications that run in web browsers. They have limited access to resources for security. Applets override lifecycle methods like init(), start(), stop(), and destroy().
JavaScript is a scripting language that adds interactivity to HTML pages. It works in all major browsers and is used to build dynamic web pages. JavaScript can react to events, modify HTML elements, validate forms, detect browsers, and write cookies. It is commonly placed in <script> tags within HTML pages or linked via external .js files. Comments are added to explain JavaScript code and prevent execution.
This document provides an overview of building an institutional repository, including:
- Repository structure with communities, collections, and items
- Metadata standards like Dublin Core
- User roles and permissions
- Item submissions and workflows
- Copyright issues and embargoes
- Gathering usage statistics and registering the repository
- Ensuring quality control of metadata and submissions
Comparison of features between ShEx (Shape Expressions) and SHACL (Shapes Constraint Language)
Changelog:
11/06/17
- Removed slides about compositionality
31/May/2017
- Added slide 30 about validation report
- Added slide 32 about stems
- Changed slides 7 and 8 adapting compact syntax to new operator .
23/05/2017:
Slide 14: Repaired typos in typos in sh:entailment, rdfs:range
21/05/2017:
- Slide 8. Changed the example to be an IRI and a datatype
- Added typically in slide 9
- Slide 10: Removed the phrase: "Target declarations can problematic when reusing/importing shapes"
and created slide 27 to talk about reuability
- Added slide 11 to talk about the differences in triggering validation
- Created slide 14 to talk about inference
- Renamed slide 15 as "Inference and triggering mechanism"
- Added slides 27 and 28 to talk about reuability
- Added slide 29 to talk about annotations
18/05/2017
- Slides 9 now includes an example using ShEx RDF vocabulary
- Slide 10 now says that target declarations are optional
- Slide 13 now says that some RDF Schema terms have special treatment in SHACL
- Example in slide 18 now uses sh:or instead of sh:and
- Added slides 22, 23 and 24 which show some features supported by SHACL but not supported by ShEx (property pair constraints, uniqueLang and owl:imports)
This document discusses Sling Models in AEM, including what they are, why they are useful, how to use them, and examples of Sling Model annotations. Sling Models allow mapping of Sling objects like resources and requests to plain Java objects using annotations. They reduce coding efforts and make code more maintainable by avoiding redundant code. The document covers the necessary dependencies, common annotations like @Model, @Inject, @Optional, and examples of injecting resources, child resources, and properties into Sling Models.
The document provides an introduction to HTML basics including text, images, tables and forms. It covers the structure of an HTML document with the <head> and <body> sections. It describes common tags for headings, paragraphs, hyperlinks and images. It also discusses attributes, comments, and different ways to style and format text in HTML. The document is intended to teach HTML fundamentals.
This document provides an overview of using MongoDB with Python. It introduces pymongo, the official Python driver for MongoDB, and covers connecting to MongoDB, performing CRUD operations, aggregation, GridFS for large files, indexing, and ODM frameworks. The presenter is Norberto Leite, a MongoDB Technical Evangelist based in Madrid, Spain.
Apache2 BootCamp : Getting Started With ApacheWildan Maulana
This document provides an overview of installing and configuring the Apache web server. It describes the basic file structure and directories for Apache on Windows and Unix systems. It explains how configuration files and directives work, including containers and conditional evaluation. It also covers how to control and troubleshoot Apache, such as starting, stopping and restarting the server, and resolving common issues.
This document discusses PHP file upload settings and functions for uploading files through a PHP form. It covers checking PHP settings for file uploads, creating a HTML form with enctype of multipart/form-data, validating the file size and type, moving the uploaded file, generating random filenames, and checking the content type. The document is presented by Vishal Kothari and provides his contact information.
The document discusses several PHP directives related to file uploading: post_max_size specifies the maximum size of the entire request, upload_max_filesize limits the size of individual uploaded files, and memory_limit affects the buffer used to decode the request. Satisfying the memory limit is important for file uploads, but unrelated to the maximum file sizes. post_max_size should be greater than upload_max_filesize multiplied by the number of files and a factor of 1.3.
This document provides an overview of the HTACCESS file and how it can be used for technical SEO tasks like redirects. It explains that the HTACCESS file allows configuration changes on a per-directory basis. It then gives examples of using the HTACCESS file to fix broken links, redirect between www/non-www versions of a domain, redirect to a new domain during a redesign, and implement WordPress rewrites. It also provides tips on finding the HTACCESS file, using an FTP client to edit it, and alternatives like a redirection plugin for WordPress sites.
The document discusses search engine optimization and how robots.txt and sitemaps are used to help search engines properly index websites. It defines robots.txt as a file that search engines use to see what pages should be indexed or not indexed, and sitemaps as an XML file that provides search engines a list of pages on a website. It also provides examples of robots.txt and sitemap formats and discusses how to dynamically generate robots.txt files and sitemap generators.
The .htaccess file is a configuration file for web servers running the Apache web server software. In this quick tutorial you will see some of the possible uses of the .htaccess file along with examples for each case.
This document provides an introduction to Bootstrap, an open-source front-end framework for building responsive mobile-first websites and web applications. It discusses the basics of web development using HTML, CSS, and JavaScript. It then explains what Bootstrap is, how to add it to a website, and how to use its grid system, forms, buttons, and other common elements. Resources for using, customizing and finding additional components for Bootstrap are also provided.
This document discusses quality control and durability factors in concrete. It defines quality as conformance to requirements and durability as a concrete's ability to resist deterioration when exposed to the environment. Several factors influence concrete durability, including the materials used, water-cement ratio, compaction, curing and the physical and chemical conditions of the service environment. Common durability issues include corrosion, cracking from sulfate attack or alkali-silica reaction, and carbonation reducing alkalinity. Proper quality control of materials and construction processes is needed to produce durable concrete.
PHP is a server-side scripting language used to create dynamic web pages. It allows embedding PHP code within HTML pages and interacting with databases. Key elements of PHP include variables, control structures, functions, and sessions. Sessions store user data on the server instead of the client to avoid cookies and allow tracking users across multiple pages.
The document provides an overview of installing PHP on Windows systems. It discusses choosing between the Windows InstallShield method (for beginners) or manual binary installation. The InstallShield process is demonstrated step-by-step using IIS as an example, covering downloading, choosing options, file extensions, and testing. The manual method requires copying files, setting permissions, and configuring the web server by adding application mappings in IIS. Examples demonstrate including header and footer files to create templates.
This document provides a tutorial on using .htaccess files. It explains that .htaccess files allow you to customize server settings and perform tasks like creating custom error pages, password protecting directories, and redirecting URLs. The tutorial covers how to set up custom error pages, deny or allow access based on IP address, specify alternative index files, redirect URLs, and password protect directories using .htaccess files.
This document provides a tutorial on using .htaccess files. It explains that .htaccess files allow you to customize server settings and perform tasks like creating custom 404 error pages without access to the server configuration. The tutorial covers how to set up .htaccess files, common commands like redirecting URLs and adding password protection, and warns that editing .htaccess improperly could cause problems.
This document provides a tutorial on using .htaccess files. It explains that .htaccess files allow you to customize server settings and perform tasks like creating custom error pages, password protecting directories, and redirecting URLs. The tutorial covers how to set up custom error pages, deny or allow access based on IP address, specify alternative index files, redirect URLs, and password protect directories using .htaccess files.
This document provides a tutorial on using .htaccess files. It explains that .htaccess files allow you to customize server settings and perform tasks like creating custom error pages, password protecting directories, and redirecting URLs. The tutorial covers how to set up custom error pages, deny or allow access based on IP address, specify alternative index files, redirect URLs, and password protect directories using .htaccess files.
Guide 6 - Tapping Into Your Website Configuration File.pdfpersuebusiness
Tapping Into Your Website Configuration File
Getting involved with your website configuration files sound scary if you’ve never done it before in your life. However, if you own a self-hosted website, then you need to get your hands ‘dirty’, so to speak.
If you love the technicalities involved in building websites, then you’d love this guide. If not, well, don’t worry. We’ve made this guide simple and easy to understand, you’ll feel like a pro in no time at all!
With that said, most of the techniques covered here involves editing your site’s .htaccess file, so I’ll define what it is first.
What is .htaccess?
Think of .htaccess as a file that basically tells your web server what it can and can’t serve to people and programs who want to access your files. It’s technically your site’s gatekeeper, however, in order for you to make it work then you need to tell it what to do.
Note that in some cases, you may not even have a .htaccess file, so you need to create one from scratch. Also, some web hosts don’t support
.htaccess especially if they don’t use Apache Web Server software.
It’s important to mention here that .htaccess is the full filename. It’s not “file.htaccess” or “site.htaccess.” You can use a text editor to type in your
.htaccess file instructions and then save it simply as “.htaccess.”
.htaccess files allow customization of configuration settings for specific directories on an Apache server. They are commonly used for authorization, authentication, customized error responses, and rewriting URLs. The .htaccess file must be placed in the directory it applies to and affects that directory and all subdirectories. It can control access, redirect users, handle errors, and more. Care must be taken to ensure the commands don't cause conflicts or security issues.
This document provides a tutorial on how to create and configure .htaccess files to modify the behavior of an Apache web server. It explains how to create friendly URLs, redirect domains and subdomains, disable directory listings, configure error pages, and more. The document provides code examples for common tasks like redirection, rewriting URLs, and hiding file extensions.
7 things every web developer should know about linux administrationZareef Ahmed
Linux system administration is specialized field in itself. In this presentation, I am going to list 7 Linux administration tasks which a programmer should know to be with ease while deploying or planning deployment of applications.
MultiViews is an Apache HTTP Server option that allows content negotiation by serving files with similar names, like index.html and index.gif, based on the client's requirements. This can reveal files that may not be meant for browsing if an invalid MIME type is requested. The vulnerability is remedied by disabling the MultiViews option in the server configuration.
This document provides instructions for installing and configuring Apache HTTP Server on Linux. It describes downloading and extracting the Apache files, editing the configuration files such as httpd.conf to configure settings like the server name, ports, document root, error logs, and supplemental configuration files. It also explains how to set up virtual hosting by editing httpd.conf to include a vhosts.conf file, then creating that file and adding directives to allow multiple websites on different domains to run on the same IP address.
This document provides information about a newly activated website hosting account on the noads.biz server for the domain mocikut.noads.biz. It includes the username, password, and FTP login details needed to access and manage the site. Instructions are provided on adding content, using databases, and .htaccess configuration options. Basic support information is also included.
An exploration into what a WordPress theme is. How does it work and what is it made up of?
If you're interested in getting into theme development this presentation will help you get started on that journey.
This document summarizes techniques for building scalable websites with Perl, including caching whole pages, chunks of HTML/data, and using job queuing. Caching helps performance by reducing workload and scalability by lowering database load. Large sites like Yahoo cache aggressively. Job queuing prevents overloading resources and keeps websites responsive under high demand by lining requests up in a queue.
This document provides instructions for installing Apache, PHP, and MySQL (known as WAMP) on a Windows system to set up a basic web development environment. It explains how to download and install each component, modify configuration files to enable PHP functionality, and ensure the components are configured to work together. Key steps include installing Apache and PHP, editing the Apache configuration file to load PHP and define file types, installing MySQL and setting it up as a service, and modifying the PHP configuration file.
Installing PHP and MySQL locally using XAMPP: If you haven’t worked with PHP and MySQL before using Perch, this tutorial will help you to set up a development environment to easily work with Perch on your own computer.
Drupal 7x Installation - Introduction to Drupal ConceptsMicky Metts
This document provides an overview of a presentation on installing and configuring Drupal 7. It discusses downloading and installing Drupal, creating a database, enabling modules, and navigating the administrative screens. It also recommends modules helpful for administrators and provides resources for learning more about Drupal. The presentation includes labs for attendees to complete hands-on activities like installing modules and enables questions throughout.
This document discusses HTML (Hypertext Markup Language) and how it is used to create websites. It defines HTML and explains how it uses tags to structure and markup web pages. It also defines browsers and lists some major browsers like Internet Explorer, Firefox, Chrome, and Safari, providing their advantages and disadvantages. Finally, it discusses how to open and edit web pages using an HTML editor like Netscape Navigator.
The document provides information about the Apache HTTP Server software. It discusses that Apache is notable for playing a key role in the growth of the World Wide Web. It is the most popular web server software, serving over half of all websites. The document then covers Apache's features, uses, performance capabilities, and how to install and configure it in Linux.
This document discusses the steps to install and configure the Apache web server on a Linux system. It includes downloading and extracting the Apache source files, configuring the files with the ./configure command, building and installing Apache with make and make install, customizing the httpd.conf configuration file, and testing the Apache installation by accessing http://localhost in a web browser. Key configuration directives like AccessConfig, AddDefaultCharset, AllowOverride, and DefaultType are also briefly described.
The Apache HTTP Server is open-source web server software that has played a key role in the growth of the World Wide Web. It became the first web server to serve over 100 million websites in 2009 and currently serves over half of all websites. Apache is highly configurable, modular, and supports a variety of operating systems. It can be customized through configuration files, modules, and .htaccess files placed in directories.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
2. Introduction:
• .htaccess is a configuration file for use on web servers
running the Apache Web Server software. When a .htaccess
file is placed in a directory which is in turn 'loaded via the
Apache Web Server', then the .htaccess file is detected and
executed by the Apache Web Server software. These
.htaccess files can be used to alter the configuration of the
Apache Web Server software to enable/disable additional
functionality and features that the Apache Web Server
software has to offer. These facilities include basic redirect
functionality, for instance if a 404 file not found error occurs,
or for more advanced functions such as content password
protection or image hot link prevention.
• .htaccess isn't difficult to use and is really just made up of a
few simple instructions in a text file.
MemonFaysal 2
3. Will My Host Support It?
• This is probably the hardest question to give a simple answer to.
Many hosts support .htaccess but don't actually publicise it and
many other hosts have the capability but do not allow their users to
have a .htaccess file. As a general rule, if your server runs Unix or
Linux, or any version of the Apache web server it will support
.htaccess, although your host may not allow you to use it.
A good sign of whether your host allows .htaccess files is if they
support password protection of folders. To do this they will need to
offer .htaccess (although in a few cases they will offer password
protection but not let you use .htaccess). The best thing to do if you
are unsure is to either upload your own .htaccess file and see if it
works or e-mail your web host and ask them.
MemonFaysal 3
4. What Can I Do?
• You may be wondering what .htaccess can do, or you
may have read about some of its uses but don't realize
how many things you can actually do with it.
There is a huge range of things .htaccess can do
including: password protecting folders, redirecting users
automatically, custom error pages, changing your file
extensions, banning users with certain IP addresses,
only allowing users with certain IP addresses, stopping
directory listings and using a different file as the index
file.
MemonFaysal 4
5. Creating A .htaccess File
• Creating a .htaccess file may cause you a few problems. Writing the
file is easy, you just need enter the appropriate code into a text
editor (like notepad). You may run into problems with saving the file.
Because .htaccess is a strange file name (the file actually has no
name but a 8 letter file extension) it may not be accepted on certain
systems (e.g. Windows 3.1). With most operating systems, though,
all you need to do is to save the file by entering the name as:
".htaccess"
(including the quotes). If this doesn't work, you will need to name it
something else (e.g. htaccess.txt) and then upload it to the server.
Once you have uploaded the file you can then rename it using an
FTP program.
MemonFaysal 5
6. Warning
• Before beginning using .htaccess, I should give you one
warning. Although using .htaccess on your server is
extremely unlikely to cause you any problems (if
something is wrong it simply won't work), you should be
wary if you are using the Microsoft FrontPage
Extensions. The FrontPage extensions use the .htaccess
file so you should not really edit it to add your own
information. If you do want to (this is not recommended,
but possible) you should download the .htaccess file
from your server first (if it exists) and then add your code
to the beginning.
MemonFaysal 6
7. Custom Error Pages
• The first use of the .htaccess file which I will cover is
custom error pages. These will allow you to have your
own, personal error pages (for example when a file is not
found) instead of using your host's error pages or having
no page. This will make your site seem much more
professional in the unlikely event of an error. It will also
allow you to create scripts to notify you if there is an
error (for example I use a PHP script on Free
Webmaster Help to automatically e-mail me when a
page is not found).
MemonFaysal 7
8. Custom Error Pages (Cont…)
• You can use custom error pages for any error as long as you
know its number (like 404 for page not found) by adding the
following to your .htaccess file:
ErrorDocument errornumber /file.html
For example if I had the file notfound.html in the root directory
of my site and I wanted to use it for a 404 error I would use:
ErrorDocument 404 /notfound.html
If the file is not in the root directory of your site, you just need
to put the path to it:
ErrorDocument 500 /errorpages/500.html
MemonFaysal 8
9. Common Errors
• These are some of the most common errors:
401 - Authorization Required
400 - Bad request
403 - Forbidden
500 - Internal Server Error
404 - Wrong page
Then, all you need to do is to create a file to display
when the error happens and upload it and the .htaccess
file.
MemonFaysal 9
10. Stop A Directory Index From Being Shown
• Sometimes, for one reason or another, you will have no
index file in your directory. This will, of course, mean that
if someone types the directory name into their browser, a
full listing of all the files in that directory will be shown.
This could be a security risk for your site.
To prevent against this (without creating lots of new
'index' files, you can enter a command into your
.htaccess file to stop the directory list from being shown:
Options -Indexes
MemonFaysal 10
11. Deny/Allow Certain IP Addresses
• In some situations, you may want to only allow people
with specific IP addresses to access your site (for
example, only allowing people using a particular ISP to
get into a certain directory) or you may want to ban
certain IP addresses (for example, keeping disruptive
members out of your message boards). Of course, this
will only work if you know the IP addresses you want to
ban and, as most people on the internet now have a
dynamic IP address, so this is not always the best way to
limit usage.
MemonFaysal 11
12. Block an IP address by using:
deny from 000.000.000.000
where 000.000.000.000 is the IP address. If you only specify 1 or 2 of the
groups of numbers, you will block a whole range.
You can allow an IP address by using:
allow from 000.000.000.000
where 000.000.000.000 is the IP address. If you only specify 1 or 2 of the
groups of numbers, you will allow a whole range.
If you want to deny everyone from accessing a directory, you can use:
deny from all
but this will still allow scripts to use the files in the directory.
MemonFaysal 12
13. Alternative Index Files
• You may not always want to use index.htm or index.html as
your index file for a directory, for example if you are using
PHP files in your site, you may want index.php to be the index
file for a directory. You are not limited to 'index' files though.
Using .htaccess you can set foofoo.blah to be your index file if
you want to!
Alternate index files are entered in a list. The server will work
from left to right, checking to see if each file exists, if none of
them exist it will display a directory listing (unless, of course,
you have turned this off).
DirectoryIndex index.php index.html index.htm
MemonFaysal 13
14. Redirection
• One of the most useful functions of the .htaccess file is
to redirect requests to different files, either on the same
server, or on a completely different web site. It can be
extremely useful if you change the name of one of your
files but allow users to still find it. Another use (which I
find very useful) is to redirect to a longer URL, for
example in my newsletters I can use a very short URL
for my affiliate links.
MemonFaysal 14
15. Redirect a specific file:
Redirect /location/from/root/file.ext
http://www.othersite.com/new/file/location.xyz
• In this above example, a file in the root directory called
oldfile.html would be entered as:
/oldfile.html
and a file in the old subdirectory would be entered as:
/old/oldfile.html
MemonFaysal 15
16. Redirect whole directories
You can also redirect whole directories of your site using
the .htaccess file, for example if you had a directory called
olddirectory on your site and you had set up the same files
on a new site at: http://www.newsite.com/newdirectory/ you
could redirect all the files in that directory without having to
specify each one:
Redirect /olddirectory
http://www.newsite.com/newdirectory
MemonFaysal 16
17. Redirect whole directories
Then, any request to your site below /olddirectory will be
redirected to the new site, with the
extra information in the URL added on, for example if someone
typed in:
http://www.youroldsite.com/olddirecotry/oldfiles/images/ima
ge.gif
They would be redirected to:
http://www.newsite.com/newdirectory/oldfiles/images/image
.gif
This can prove to be extremely powerful if used correctly.
MemonFaysal 17
18. Password Protection
• Although there are many uses of the .htaccess file, by far
the most popular, and probably most useful, is being
able to reliably password protect directories on websites.
Although JavaScript etc. can also be used to do this,
only .htaccess has total security (as someone must know
the password to get into the directory, there are no 'back
doors')
MemonFaysal 18
19. The .htaccess File
• Adding password protection to a directory using .htaccess takes two
stages. The first part is to add the appropriate lines to your .htaccess
file in the directory you would like to protect. Everything below this
directory will be password protected:
AuthName "Section Name"
AuthType Basic
AuthUserFile /full/path/to/.htpasswd
Require valid-user
• There are a few parts of this which you will need to change for your site.
You should replace "Section Name" with the name of the part of the site
you are protecting e.g. "Members Area".
The /full/parth/to/.htpasswd should be changed to reflect the full server
path to the .htpasswd file (more on this later). If you do not know what
the full path to your web space is, contact your system administrator for
details.
MemonFaysal 19
20. The .htpasswd File
• Password protecting a directory takes a little more work
than any of the other .htaccess functions because you
must also create a file to contain the usernames and
passwords which are allowed to access the site. These
should be placed in a file which (by default) should be
called .htpasswd. Like the .htaccess file, this is a file with
no name and an 8 letter extension. This can be placed
anywhere within you website (as the passwords are
encrypted) but it is advisable to store it outside the web
root so that it is impossible to access it from the web.
MemonFaysal 20
21. Entering Usernames & Passwords
• Once you have created your .htpasswd file (you can do this in a
standard text editor) you must enter the usernames and passwords
to access the site. They should be entered as follows:
username:password
• where the password is the encrypted format of the password. To
encrypt the password you will either need to use one of the premade
scripts available on the web or write your own. There is a good
username/password service at the KxS site which will allow you to
enter the user name and password and will output it in the correct
format.
• For multiple users, just add extra lines to your .htpasswd file in the
same format as the first. There are even scripts available for free
which will manage the .htpasswd file and will allow automatic
adding/removing of users etc.
MemonFaysal 21
22. Accessing The Site
• When you try to access a site which has been protected
by .htaccess your browser will pop up a standard
username/password dialog box. If you don't like this,
there are certain scripts available which allow you to
embed a username/password box in a website to do the
authentication. You can also send the username and
password (unencrypted) in the URL as follows:
http://username:password@www.website.com/directory/
MemonFaysal 22
23. Summary
• .htaccess is one of the most useful files a webmaster
can use. There are a wide variety of different uses for it
which can save time and increase security on your
website.
MemonFaysal 23