Site search

Search results: «SQL»

Found matches: 30

A ready-made social network script with responsive design. Much can be seen in the screenshots. Based on Dcms Social 1.9.9. A fully functional, ready-to-use dating site in the style of VKontakte.

Installation:
Unzip to the root
Upload the database (File Database.sql in the root)
Write the data from the database to /sys/db/config.dat
Register in MySQL in the user table, write yourself as the founder, set level 4 and group_access 15
Installation complete
As a backend dev in 2026 , learn these 11 skills to keep you relevant in this Job market :

1. API Design - REST/gRPC

2. Authentication & Authorization - OAuth2, JWT, OpenID Connect, Passkeys

3. Databases - SQL, NoSQL, sharding, indexing, query tuning

4. Caching - Redis, CDN, edge caching strategies

5. Event-Driven Systems - Kafka, Pulsar, streaming pipelines

6. Concurrency & Async - reactive programming, structured concurrency

7. Distributed Systems - microservices, service mesh, eventual consistency

8. Security - HTTPS, encryption, zero trust, OWASP top 10

9. Observability - logging, tracing, metrics, OpenTelemetry

10. Cloud & Deployment -...
🛡️ Stay ahead in the digital world with the most popular cybersecurity tools every IT professional and ethical hacker should know!

From network security and penetration testing to malware analysis and cloud security — these tools help protect systems, detect threats, and strengthen defenses.

⚠️ Always remember: use cybersecurity tools ethically and only on authorized systems.

🛡️ NETWORK SECURITY
Nmap – Network scanning & port discovery
Wireshark – Packet capture & traffic analysis
Netcat (nc) – Network debugging & data transfer
Snort – Intrusion Detection System (IDS)
Suricata – IDS / IPS engine

🔐 VULNERABILITY ASSESSMENT
Nessus – Vulnerability scanning...
This is a rough but functional prototype of a website rating system. The project contains basic functionality that can be further developed and refined.
Key Features:
Database connection via the config.php file.
Import a clean database from the baza.sql file.
Automatic assignment of admin rights to the first registered user.
A simple admin panel with basic settings.
Graph generation for each connected site.
Collection of standard statistics (when installing a counter on a site).
A review system with a reputation rating for each site.
Project Status
:The project is in an unfinished state: the basic functionality works, but requires further...
Script top rating site ioav. The script allows you to collect site statistics. Written in php 5.6 and uses mysql . Of all the undoubted advantages, this is that it has an adaptive beautiful design.

In the script itself, I fixed a bunch (just a big bunch) of bugs with holes. Corrected the design in some places. The script contains the source code of the counters in psd format. You will be able to change the site on the counters yourself. Also in the top works the purchase of advertising or the purchase of vip for the site. There is...
This module will help you avoid major problems with your website. It not only prevents attacks on the site, but also helps the administrator see which file is being attacked and how, so they can later inspect it for dangerous code. The script prevents many SQL-INJ and XSS attacks. Installation is strictly according to the Readme.txt.
☁️ AWS in Plain English
(so you are never feel lost again):

• EC2 → your computer in the cloud
• S3 → a giant unlimited folder
• RDS → a managed SQL database
• Lambda → code that runs automatically
• API Gateway → doorway to your APIs
• CloudWatch → logs + monitoring
• VPC → your private network
• IAM → security guard of AWS
• CloudFront → global CDN for speed
• DynamoDB → NoSQL database
• SNS → sends notifications
• SQS → message queue that never sleeps

Master these → 80% of AWS suddenly...
SQL Injection Attack — one of the oldest bugs, still one of the most dangerous.

SQL injection happens when user input is treated as executable SQL instead of data. A single unsafe query can expose sensitive data, bypass authentication, or even destroy entire tables.

String interpolation inside raw SQL is a red flag. It allows attackers to inject malicious logic directly into your query. Sanitizing input helps, but it is not enough on its own.

The real fix is parameterized queries.
When parameters are used correctly, the database engine treats input strictly as data — not executable code. No matter...
This PHP script for blogs and magazines features a clean, responsive, and user-friendly design. You can manage advanced settings and contact messages using the powerful admin panel.
* Bootstrap v3.3.7, JavaScript JS, HTML, CSS, PHP, SQL, PHP 8.x, PHP 7.x, MySQL 8.x, MySQL 5.x.