Tags and tag cloud in WordPress are terms that quickly tell readers what a post is about and a useful way to group related posts together. A very few years ago I used to thought that tags are tricky things that are placed by bloggers to confuse people (:-D)! But soon I got familiarize with this one and so I thought to write a blog post to let readers and WordPress beginners to be familiar with tags and tag cloud.
event.preventDefault() vs. return false is a very important but confusing topic that which one should be used and for what. When we want to prevent other event handlers from executing after a certain event is fired, we can use one of these two techniques
AJAX is common now a days. People try to implement AJAX but fail to return the response from AJAX call successfully because they misunderstood the concept behind AJAX and the right way to do that.
Here I have tried to explain the flow and restructure the code for AJAX to let your application work. First I have explained the problem then the meaning of AJAX and flow as well followed by the solution.
Saving comma separated values or delimited list in database looks convenient at first but never use them because most and most of the time that’s only a bad idea. I have provided many reasons to avoid them and only one when you can take favour of.
The jQuery AJAX load() method is a very simple and powerful jQuery AJAX method. It loads data from the server and place the returned HTML into the matched element.
Nowadays IT developers is fan of using Ajax due to requirement of time and rendering HTML without page refreshing. Mainly It works on asynchronous mode but we can use it in synchronous mode also.
MySQL has DATETIME and TIMESTAMP fields to store date & time in MySQL database. There are some points that should be keep into mind while choosing data type to store date and time. DATETIME or TIMESTAMP? Let’s compare.
In this article we are presented with few methods and tips to prevent SQL Injection attacks in our web application.
In simple term when an application takes user data as an input, there is an opportunity for a malicious user to enter carefully crafted data that causes the input to be interpreted as part of a SQL query instead of data in our application.
SQL Injection is the hacking technique which attempts to pass SQL commands (statements) through a web application for execution by the backend database. If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection