DROP TABLE IF EXISTS `code`;
@@@CREATE TABLE `code` (
`codeid` mediumint(9) NOT NULL AUTO_INCREMENT,
`code` text NOT NULL,
`title` varchar(70) NOT NULL,
`keywords` varchar(100) NOT NULL,
`application` varchar(35) NOT NULL,
`languageid` tinyint(4) NOT NULL,
`operationid` mediumint(9) NOT NULL,
`show_html` tinyint(4) NOT NULL,
`show_iframe` tinyint(4) NOT NULL,
`make_public` tinyint(4) NOT NULL,
`viewed` mediumint(9) NOT NULL,
`viewed_date` date NOT NULL,
PRIMARY KEY (`codeid`),
KEY `languageid` (`languageid`),
KEY `operationid` (`operationid`),
KEY `application` (`application`)
) ENGINE=MyISAM AUTO_INCREMENT=375 DEFAULT CHARSET=latin1;
@@@INSERT INTO `code` VALUES (1,'My current page is: $PHP_SELF \r\n\r\n$ref=$_SERVER[\\\'HTTP_REFERER\\\']; page they came from\r\n\r\n$ip=$_SERVER[\\\'REMOTE_ADDR\\\']; get their ipaddress\r\n\r\necho $_SERVER[\\\'HTTP_USER_AGENT\\\'] . \\\"\\\\n\\\\n\\\";\r\n\r\n$browser = get_browser(null, true);\r\nprint_r($browser);\r\n?> \r\nThe above example will output something similar to:\r\n\r\n\r\nMozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040803 Firefox/0.9.3\r\n\r\nArray\r\n(\r\n [browser_name_regex] => ^mozilla/5\\\\.0 (windows; .; windows nt 5\\\\.1; .*rv:.*) gecko/.* firefox/0\\\\.9.*$\r\n [browser_name_pattern] => Mozilla/5.0 (Windows; ?; Windows NT 5.1; *rv:*) Gecko/* Firefox/0.9*\r\n [parent] => Firefox 0.9\r\n [platform] => WinXP\r\n [browser] => Firefox\r\n [version] => 0.9\r\n [majorver] => 0\r\n [minorver] => 9\r\n [css] => 2\r\n [frames] => 1\r\n [iframes] => 1\r\n [tables] => 1\r\n [cookies] => 1\r\n [backgroundsounds] =>\r\n [vbscript] =>\r\n [javascript] => 1\r\n [javaapplets] => 1\r\n [activexcontrols] =>\r\n [cdf] =>\r\n [aol] =>\r\n [beta] => 1\r\n [win16] =>\r\n [crawler] =>\r\n [stripper] =>\r\n [wap] =>\r\n [netclr] =>\r\n)','Get Information About Your User','page refer php self','',1,2,1,0,1,1500,'2023-09-09'),(2,'To read your\r\nserver\'s internal IP address in PHP, you should use the $_SERVER[\'SERVER_ADDR\'] superglobal. For the server\'s external (public) IP address, the most reliable way is to query an external service. \r\nInternal Server IP Address\r\nThe $_SERVER superglobal array contains various server and request-related information. The SERVER_ADDR key typically holds the IP address of the host server running the script. \r\nphp\r\n\r\n\r\n\r\nNote: This may return 127.0.0.1 (localhost) in some configurations or if running from a command line interface (CLI). \r\nExternal Server IP Address\r\nTo get the IP address that your server uses to communicate with the internet (its public IP), you generally need to make a request to an external service that simply echoes back the IP address it sees. \r\nA common and reliable method is to use Amazon\'s check IP service via file_get_contents() or curl. \r\nphp\r\n\r\n\r\n\r\nAlternative Methods\r\n\r\n Using DNS: If your server has a domain name, you can use PHP\'s gethostbyname() function to find the IP associated with that hostname.\r\n php\r\n\r\n\r\n\r\nUsing Sockets (Linux/Unix): A more robust dynamic method, especially useful in CLI environments, involves connecting to a public DNS server (like Google\'s 8.8.8.8) to determine the outgoing interface IP address.\r\nphp\r\n\r\n\r\n\r\n \r\n
\r\n$ip=$_SERVER[\\\'REMOTE_ADDR\\\']; \r\n\r\nif($_SERVER[\\\'REMOTE_ADDR\\\']==\\\"208.73.252.147\\\"){\r\n\r\n function get_ip() {\r\n if ( ! empty( $_SERVER[\'HTTP_CLIENT_IP\'] ) ) {\r\n //check ip from share internet\r\n $ip = $_SERVER[\'HTTP_CLIENT_IP\'];\r\n } elseif ( ! empty( $_SERVER[\'HTTP_X_FORWARDED_FOR\'] ) ) {\r\n //to check ip is pass from proxy\r\n $ip = $_SERVER[\'HTTP_X_FORWARDED_FOR\'];\r\n } else {\r\n $ip = $_SERVER[\'REMOTE_ADDR\'];\r\n }\r\n return $ip;\r\n }','Get Ipaddress','ipaddress','Reading Serve Ip',1,2,1,0,1,1190,'2023-09-09'),(3,'!NOTE pLACE IN THIS ORDER TO KEEP HOVER WORKING ON VISITED LINKS\r\n#steve a:link { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #FFFFFF; text-decoration: underline; text-align: center;}\r\n#steve a:visited { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold;color: yellow; text-decoration: underline; text-align: center;}\r\n#steve a:hover { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold;color: #000000; text-decoration: underline; text-align: center;}\r\n\r\n\r\n\r\na:link { color: rgb(0, 0, 153) } /* for unvisited links */\r\n a:visited { color: rgb(153, 0, 153) } /* for visited links */\r\n a:active { color: rgb(255, 0, 102) } /* when link is clicked */\r\n a:hover { color: rgb(0, 96, 255) } /* when mouse is over link */\r\n********\r\n<a href=\\"http://http://www.time.gov/\\" class=\\"link\\">Example of class=\\"link\\" Link</a> \r\n(font : 12px Verdana, Geneva, Arial, Helvetica, sans-serif\r\n a.link:link {text-decoration : underline; color : #996600\r\n a.link:hover {color : #999999; text-decoration : none\r\n a.link:visited {text-decoration: underline; color : #333333\r\n a.link:visited:hover {text-decoration: none; color : #666666)\r\n*************************\r\n\r\nA:link {Text-decoration:none;color:red}\r\nA:visited {Text-decoration:none;color:red}\r\nA:hover {Text-decoration:underline;color:olive}\r\nA:active {Text-decoration:none;color:gray}\r\nUL {margin-left:15px;margin-bottom:0in;margin-top:0in;}\r\nLI {margin:1px 1px 1px 1px}\r\n\r\n<A style=\\"color : blue\\">\r\n\r\n\r\nSometimes you may want to show hypertext links without them being underlined. You can do this by setting the text-decoration property to none, for example:\r\n\r\n a.plain { text-decoration: none }\r\n\r\nWhich would suppress underlining for a link such as:\r\n\r\nThis is not underlined\r\n\r\nPrint #3, \"\"','Hyperlink','hyperlink decoration color A','',4,3,0,0,1,1640,'2023-09-09'),(4,'5.6.3 \\\'list-style-type\\\'\r\nValue: disc | circle | square | decimal | lower-roman | upper-roman | lower-alpha | upper-alpha | none\r\nInitial: disc\r\nApplies to: elements with \\\'display\\\' value \\\'list-item\\\'\r\nInherited: yes\r\nPercentage values: N/A\r\n\r\n\r\nThis property is used to determine the appearance of the list-item marker if \\\'list-style-image\\\' is \\\'none\\\' or if the image pointed to by the URL cannot be displayed. \r\n\r\nOL { list-style-type: decimal } /* 1 2 3 4 5 etc. */\r\nOL { list-style-type: lower-alpha } /* a b c d e etc. */\r\nOL { list-style-type: lower-roman } /* i ii iii iv v etc. */\r\n\r\n5.6.4 \\\'list-style-image\\\'\r\nValue: | none\r\nInitial: none\r\nApplies to: elements with \\\'display\\\' value \\\'list-item\\\'\r\nInherited: yes\r\nPercentage values: N/A\r\n\r\n\r\nThis property sets the image that will be used as the list-item marker. When the image is available it will replace the marker set with the \\\'list-style-type\\\' marker. \r\n\r\nUL { list-style-image: url(http://png.com/ellipse.png) }\r\n\r\n5.6.5 \\\'list-style-position\\\'\r\nValue: inside | outside\r\nInitial: outside\r\nApplies to: elements with \\\'display\\\' value \\\'list-item\\\'\r\nInherited: yes\r\nPercentage values: N/A\r\n\r\n\r\nThe value of \\\'list-style-position\\\' determines how the list-item marker is drawn with regard to the content. For a formatting example see section 4.1.3. \r\n\r\n5.6.6 \\\'list-style\\\'\r\nValue: [disc | circle | square | decimal | lower-roman | upper-roman | lower-alpha | upper-alpha | none] || [inside | outside] || [ | none]\r\nInitial: not defined for shorthand properties\r\nApplies to: elements with \\\'display\\\' value \\\'list-item\\\'\r\nInherited: yes\r\nPercentage values: N/A\r\n\r\n\r\nThe \\\'list-style\\\' property is a shorthand notation for setting the three properties \\\'list-style-type\\\', \\\'list-style-image\\\' and \\\'list-style-position\\\' at the same place in the style sheet. \r\n\r\nUL { list-style: upper-roman inside }\r\nUL UL { list-style: circle outside }\r\nLI.square { list-style: square }\r\n\r\nSetting \\\'list-style\\\' directly on \\\'LI\\\' elements can have unexpected results. Consider: \r\n\r\n \r\n \r\n \r\n
level 1\r\n
\r\n
level 2\r\n
\r\n
\r\n \r\n\r\nSince the specificity (as defined in the cascading order) is higher for the first rule in the style sheet in the example above, it will override the second rule on all \\\'LI\\\' elements and only \\\'lower-alpha\\\' list styles will be used. It is therefore recommended to set \\\'list-style\\\' only on the list type elements: \r\n\r\nOL.alpha { list-style: lower-alpha }\r\nUL { list-style: disc }\r\n\r\nIn the above example, inheritance will transfer the \\\'list-style\\\' values from \\\'OL\\\' and \\\'UL\\\' elements to \\\'LI\\\' elements. \r\n\r\nA URL value can be combined with any other value: \r\n\r\nUL { list-style: url(http://png.com/ellipse.png) disc }\r\n\r\nIn the example above, the \\\'disc\\\' will be used when the image is unavailable.','Bullets And Numbering','bullets li ul ol','',4,3,0,0,1,2134,'2023-09-09'),(5,'\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n
\r\n\r\n
\r\n\r\n\r\n','Input - First Caps','capital first onblur','',2,4,0,0,1,1596,'2023-09-09'),(6,'$newstring=substr($teaser,25,1);$acii=ord($newstring);\r\n echo \\\"
\";\r\n\r\nforeach ($iterator as $fileinfo) {\r\n $pathName = $fileinfo->getPathname();\r\n $fileName = $fileinfo->getFilename();\r\n $pathNameClean=str_replace(\".\",\"\",$pathName); $pathNameClean=str_replace(\"/\",\"_\",$pathNameClean);\r\n // Skip the root path entry itself to avoid redundancy\r\n if ($fileinfo->getFilename() === basename($directory_path)) continue;\r\n //if ($fileinfo->getFilename() === basename($pathName)) continue;\r\n if ($fileinfo->isDir()) {\r\n echo \"
$pathName
\\n\\n\\n\\n
\";\r\n $directory=$pathName;\r\n //echo \"
[DIR] {$pathName}
\";\r\n } else {\r\n if(strpos(\"/\".$pathName,$directory)>0){ echo \"$fileName \"; }\r\n //echo \"$pathName $fileName $directory \";\r\n }\r\n}\r\n/*\r\n$all_files = listAllFiles($current_dir);$repeat=1;\r\nforeach($all_files as $k=>$value) {\r\n if(is_array($value)==true){ readsubdir($value,$repeat); continue; }\r\n echo \"shit\".$value.\" \";\r\n}*/\r\n//$repeated_char = str_repeat($char, $n);\r\n?>\r\n================================ END EXAMPLE ============================\r\nStep 1\r\nPlace this code between the tags in your webpage.\r\n\r\n\r\n\r\nStep2\r\nThis is example html you can use, this goes inside your html body.\r\n\r\n
Jean-Paul Sartre, (1905-1980) born in Paris in 1905, studied at the �cole \r\n Normale Sup�rieure from 1924 to 1929 and became Professor of Philosophy at Le Havre\r\n in 1931. With the help of a stipend from the Institut Fran�ais he studied in Berlin\r\n (1932) the philosophies of Edmund Husserl and Martin Heidegger. After further teaching\r\n at Le Havre, and then in Laon, he taught at the Lyc�e Pasteur in Paris from 1937 to 1939.\r\n Since the end of the Second World War, Sartre has been living as an independent writer.
\r\n
\r\n\r\n
\r\n
More on JPS
\r\n
The conclusions a writer must draw from this position were set forth in \r\n \\\"Qu\\\'est-ce que la litt�rature?\\\" (What Is Literature?), 1948: literature is\r\n no longer an activity for itself, nor primarily descriptive of characters \r\n and situations, but is concerned with human freedom and its (and the author\\\'s)\r\n commitment. Literature is committed; artistic creation is a moral activity.
\r\n \r\n
\r\n\r\n
\r\n\r\n \r\n
Yet more content. This can be anything in here, html, pictures.. flash ...
\r\n
\r\n \r\n
\r\n
This content is in a div with id \\\"thicanbeanything\\\"
\r\n
Sartre is one of those writers for whom a determined philosophical position is the \r\n centre of their artistic being. Although drawn from many sources, for example, \r\n Husserl\\\'s idea of a free, fully intentional consciousness and Heidegger\\\'s existentialism,\r\n the existentialism Sartre formulated and popularized is profoundly original. \r\n Its popularity and that of its author reached a climax in the forties, and Sartre\\\'s \r\n theoretical writings as well as his novels and plays constitute one of the main inspirational\r\n sources of modern literature. In his philosophical view atheism is taken for granted; the\r\n \\\"loss of God\\\" is not mourned. Man is condemned to freedom, a freedom from all authority,\r\n which he may seek to evade, distort, and deny but which he will have to face if he is to\r\n become a moral being. The meaning of man\\\'s life is not established before his existence.\r\n Once the terrible freedom is acknowledged, man has to make this meaning himself, has to \r\n commit himself to a role in this world, has to commit his freedom. And this attempt to\r\n make oneself is futile without the \\\"solidarity\\\" of others.
\r\n
\r\n
Classes
\r\n if it is a class.\r\n\r\n\r\ncompared to if it is an id.\r\n','Div - Hide A Layer','hide div layer class getElementById getElementsByClassName example','Create Folder-file List',2,3,0,0,1,1878,'2026-03-11'),(9,'[url location]\r\nparent.frame_name.location= url \\\"send url into a frame\\\"\r\n\r\n[Integer]\r\nvar pop=parseInt(1000*Math.random());\r\n\r\n[decimal only]\r\nvar fracPart = 123456 % 1000;\r\n\r\nanchor() Creates an HTML anchor 1 3 \r\nbig() Displays a string in a big font 1 3 \r\nblink() Displays a blinking string 1 \r\nbold() Displays a string in bold 1 3 \r\ncharAt() Returns the character at a specified position 1 3 \r\ncharCodeAt() Returns the Unicode of the character at a specified position 1 4 \r\nconcat() Joins two or more strings 1 4 \r\nfixed() Displays a string as teletype text 1 3 \r\nfontcolor() Displays a string in a specified color 1 3 \r\nfontsize() Displays a string in a specified size 1 3 \r\nfromCharCode() Takes the specified Unicode values and returns a string 1 4 \r\nindexOf() Returns the position of the first occurrence of a specified string value in a string 1 3 \r\nitalics() Displays a string in italic 1 3 \r\nlastIndexOf() Returns the position of the last occurrence of a specified string value, searching backwards from the specified position in a string 1 3 \r\nlink() Displays a string as a hyperlink 1 3 \r\nmatch() Searches for a specified value in a string 1 4 \r\nreplace() Replaces some characters with some other characters in a string 1 4 \r\nsearch() Searches a string for a specified value 1 4 \r\nslice() Extracts a part of a string and returns the extracted part in a new string 1 4 \r\nsmall() Displays a string in a small font 1 3 \r\nsplit() Splits a string into an array of strings 1 4 \r\nstrike() Displays a string with a strikethrough 1 3 \r\nsub() Displays a string as subscript 1 3 \r\nsubstr() Extracts a specified number of characters in a string, from a start index 1 4 \r\nsubstring() Extracts the characters in a string between two specified indices 1 3 \r\nsup() Displays a string as superscript 1 3 \r\ntoLowerCase() Displays a string in lowercase letters 1 3 \r\ntoUpperCase() Displays a string in uppercase letters 1 3 \r\ntoSource() Represents the source code of an object 1 - \r\nvalueOf() Returns the primitive value of a String object \r\n\r\n\r\nDefinition and Usage\r\n\r\nThe substr() method extracts a specified number of characters in a string, from a start index.\r\nSyntax stringObject.substr(start,length)\r\n\r\nParameter Description\r\nstart Required. Where to start the extraction. Must be a numeric value\r\nlength Optional. How many characters to extract. Must be a numeric value.\r\n\r\nTips and Notes\r\n\r\nNote: To extract characters from the end of the string, use a negative start number (This does not work in IE).\r\n\r\nNote: The start index starts at 0.\r\n\r\nNote: If the length parameter is omitted, this method extracts to the end of the string.\r\nExample 1\r\n\r\nIn this example we will use substr() to extract some characters from a string:\r\n\r\n\r\nThe output of the code above will be:\r\nlo world!','List Of Functions','javascript functions','',2,7,0,0,1,2025,'2023-09-09'),(129,'Even though it is cool using the bricks in the start menu I still like putting my favorite apps on the windows task bar without pinning. It takes up a lot less space.\r\n\r\nTo do this:\r\n
Right click on the desk top and create a new folder. Give it a Short name so it does not take up much space on the tool bar
\r\n
I like my desk top clean so I just dragged and dumped everything I use a lot on this folder. You will need to copy and paste if you want an icon to stay on the desk top.
\r\n
Leave the folder on your desktop.
\r\n
Right click on the task bar and click on toolbars-new toolbar.
\r\n
From the dialogue box select the Desktop. Select the file folder that you named.
\r\n
You now have all your favorites on the task bar. After you reboot the will be list by alpha.
Note: Not all major browsers support all the new input types. However, you can already start using them; If they are not supported, they will behave as regular text fields.
Input Type: color
The color type is used for input fields that should contain a color.
','New Html Types','color','',17,3,1,0,1,1208,'2023-09-09'),(352,'CREATE TABLE `cash` (\r\n `cashid` mediumint(9) NOT NULL AUTO_INCREMENT,\r\n `amount_total` smallint(6) NOT NULL,\r\n `amount_split` smallint(6) NOT NULL,\r\n `caleb` smallint(6) NOT NULL,\r\n `jarrod` smallint(6) NOT NULL,\r\n `received_on` datetime NOT NULL,\r\n `farm` tinyint(4) NOT NULL,\r\n `cutting` tinyint(4) NOT NULL,\r\n `chk_cash` tinyint(4) NOT NULL,\r\n `bale_count` smallint(6) NOT NULL,\r\n `comment` varchar(50) NOT NULL,\r\n `ave_price` decimal(8,2) NOT NULL,\r\n PRIMARY KEY (`cashid`),\r\n KEY `received_on` (`received_on`)\r\n) ENGINE=MyISAM AUTO_INCREMENT=1683 DEFAULT CHARSET=latin1\r\n\r\nCREATE TABLE `lastbackup` (\r\n `backupid` mediumint(9) NOT NULL AUTO_INCREMENT,\r\n `to` tinyint(4) NOT NULL,\r\n `type` tinyint(4) NOT NULL,\r\n `method` tinyint(4) NOT NULL, \r\n `device` varchar(30) NOT NULL, \r\n `table_name` varchar(30) NOT NULL,\r\n ` database_name` varchar(30) NOT NULL,\r\n `destination` varchar(50) NOT NULL, \r\n `received_on` datetime NOT NULL,\r\n PRIMARY KEY (`backupid`),\r\n KEY `received_on` (`received_on`)\r\n) ENGINE=MyISAM AUTO_INCREMENT=1 DEFAULT CHARSET=latin1\r\n\r\n\r\n\r\nProgrammatically with PHP\r\nYou can write a PHP script to connect to your MySQL database and execute queries to generate the CREATE TABLE statements. This is useful for building custom backup tools. \r\nThe following approach involves fetching table metadata and reconstructing the SQL, or leveraging PHP\'s ability to execute shell commands like mysqldump for simplicity: \r\n\r\n Executing mysqldump from PHP: This method executes the command-line utility within your PHP script, which is often the most reliable way to get a perfect SQL structure dump. \r\n\r\nphp\r\n\r\n=?php\r\n$db_user = \"your_username\";\r\n$db_pass = \"your_password\";\r\n$db_name = \"your_database\";\r\n$table_name = \"your_table\";\r\n$output_file = \"structure_export.sql\";\r\n\r\n// Command to export only the structure (--no-data)\r\n$command = \"mysqldump -u\" . $db_user . \" -p\" . $db_pass . \" \" . $db_name . \" \" . $table_name . \" --no-data > \" . $output_file;\r\n\r\n// Execute the command\r\nexec($command, $output, $return_var);\r\n\r\nif ($return_var === 0) {\r\n echo \"Table structure exported successfully to \" . $output_file;\r\n} else {\r\n echo \"Error exporting table structure.\";\r\n}\r\n?=\r\n\r\n=?php\r\nALL TABLES\r\nfunction backup_mysql_database($host, $user, $pass, $dbname, $filename) {\r\n // Ensure the output file has a .sql extension for clarity\r\n if (substr($filename, -4) !== \'.sql\') {\r\n $filename .= \'.sql\';\r\n }\r\n\r\n // Command to execute mysqldump: \r\n // --opt is enabled by default and is recommended for speed and size\r\n // --single-transaction allows a consistent backup without locking tables for InnoDB tables\r\n $command = sprintf(\r\n \'mysqldump -h%s -u%s -p%s --opt --single-transaction %s > %s\',\r\n escapeshellarg($host),\r\n escapeshellarg($user),\r\n escapeshellarg($pass),\r\n escapeshellarg($dbname),\r\n escapeshellarg($filename)\r\n );\r\n\r\n $output = [];\r\n $result_code = 0;\r\n \r\n // Execute the command\r\n exec($command, $output, $result_code);\r\n\r\n if ($result_code === 0) {\r\n return \"Database dump successful. File saved as: $filename\";\r\n } else {\r\n return \"Error creating database dump. Command output: \" . implode(\"\\n\", $output);\r\n }\r\n}\r\n\r\n// Configuration variables\r\n$DBHOST = \'localhost\';\r\n$DBUSER = \'your_username\';\r\n$DBPASS = \'your_password\';\r\n$DBNAME = \'your_database_name\';\r\n$BACKUP_FILE = \'backup_\' . date(\'Y-m-d_H-i-s\') . \'.sql\';\r\n\r\n// Run the backup function\r\n$message = backup_mysql_database($DBHOST, $DBUSER, $DBPASS, $DBNAME, $BACKUP_FILE);\r\n\r\necho $message;\r\n?=\r\n\r\n\r\n=?php\r\n$command = \"ls -l\"; // Command to list files and directories (on Unix-like systems)\r\n$output_lines = [];\r\n$return_status;\r\n\r\n// Execute the command, capture output lines into $output_lines, \r\n// and capture the exit code into $return_status\r\nexec($command, $output_lines, $return_status);\r\n\r\necho \"Command Executed:\";\r\necho \"$command\";\r\n\r\necho \"Output Lines:\";\r\n\r\nprint_r($output_lines);\r\necho \"Return Status:\";\r\necho \"$return_status\"; // 0 usually means success\r\n?=','Generate The CREATE TABLE Statements','table create exec(','Table Dump',11,12,1,0,1,1,'2025-12-19'),(115,'HTML5 New Form Attributes\r\nHTML5 has several new attributes for \r\n and \r\n.\r\nNew attributes for \r\n:\r\nautocomplete\r\nnovalidate\r\nNew attributes for :\r\n\r\nautocomplete\r\nautofocus\r\nform\r\nformaction\r\nformenctype\r\nformmethod\r\nformnovalidate\r\nformtarget\r\nheight and width\r\nlist\r\nmin and max\r\nmultiple\r\npattern (regexp)\r\nplaceholder\r\nrequired\r\nstep\r\n\r\n\r\n / \r\n autocomplete Attribute\r\nThe autocomplete attribute specifies whether a form or input field should have autocomplete on or off.\r\nWhen autocomplete is on, the browser automatically complete values based on values that the user has entered before.\r\nTip:\r\n It is possible to have autocomplete \\\"on\\\" for the form, and \\\"off\\\" for specific input fields, or vice versa.\r\nNote:\r\n The autocomplete attribute works with \r\n and the following \r\n types: text, search, url, tel, email, password, datepickers, range, and color.\r\nExample\r\nAn HTML form with autocomplete on (and off for one input field):\r\n First name:\r\n Last name: \r\n E-mail: \r\n\r\nTry it yourself �\r\nTip:\r\n In some browsers you may need to activate the autocomplete function for this to work.\r\n novalidate Attribute\r\nThe novalidate attribute is a boolean attribute.\r\nWhen present, it specifies that the form-data (input) should not be validated when submitted.\r\nExample\r\nIndicates that the form is not to be validated on submit:\r\n E-mail: \r\n\r\nTry it yourself �\r\n autofocus Attribute\r\nThe autofocus attribute is a boolean attribute.\r\nWhen present, it specifies that an \r\n element should automatically get focus when the page loads.\r\nExample\r\nLet the \\\"First name\\\" input field automatically get focus when the page loads:\r\nFirst name:\r\nTry it yourself �\r\n form Attribute\r\nThe form attribute specifies one or more forms an \r\n element belongs to.\r\nTip:\r\n To refer to more than one form, use a space-separated list of form ids.\r\nExample\r\nAn input field located outside the HTML form (but still a part of the form):\r\n First name: \r\n\r\nLast name: \r\nTry it yourself �\r\n formaction Attribute\r\nThe formaction attribute specifies the URL of a file that will process the input control when the form is submitted.\r\nThe formaction attribute overrides the action attribute of the \r\n element.\r\nNote: \r\nThe formaction attribute is used with type=\\\"submit\\\" and type=\\\"image\\\".\r\nExample\r\nAn HTML form with two submit buttons, with different actions:\r\n First name: \r\n Last name: \r\n\r\n\r\nTry it yourself �\r\n formenctype Attribute\r\nThe formenctype attribute specifies how the form-data should be encoded when submitting it to the server (only for forms with method=\\\"post\\\")\r\nThe formenctype attribute overrides the enctype attribute of the \r\n element.\r\nNote: \r\nThe formenctype attribute is used with type=\\\"submit\\\" and type=\\\"image\\\".\r\nExample\r\nSend form-data that is default encoded (the first submit button), and encoded as \\\"multipart/form-data\\\" (the second submit button):\r\n First name: \r\n\r\n\r\nTry it yourself �\r\n formmethod Attribute\r\nThe formmethod attribute defines the HTTP method for sending form-data to the action URL.\r\nThe formmethod attribute overrides the method attribute of the \r\n element.\r\nNote:\r\n The formmethod attribute can be used with type=\\\"submit\\\" and type=\\\"image\\\".\r\nExample\r\nThe second submit button overrides the HTTP method of the form:\r\n First name: \r\n Last name: \r\n\r\n\r\nTry it yourself �\r\n formnovalidate Attribute\r\nThe novalidate attribute is a boolean attribute.\r\nWhen present, it specifies that the \r\n element should not be validated when submitted.\r\nThe formnovalidate attribute overrides the novalidate attribute of the \r\n element.\r\nNote:\r\n The formnovalidate attribute can be used with type=\\\"submit\\\".\r\nExample\r\nA form with two submit buttons (with and without validation):\r\n E-mail: \r\n\r\nTry it yourself �\r\n formtarget Attribute\r\nThe formtarget attribute specifies a name or a keyword that indicates where to display the response that is received after submitting the form.\r\nThe formtarget attribute overrides the target attribute of the \r\n element.\r\nNote:\r\n The formtarget attribute can be used with type=\\\"submit\\\" and type=\\\"image\\\".\r\nExample\r\nA form with two submit buttons, with different target windows:\r\n First name: \r\n Last name: \r\n\r\n\r\nTry it yourself �\r\n height and width Attributes\r\nThe height and width attributes specify the height and width of an \r\n element.\r\nNote:\r\n The height and width attributes are only used with \r\n.\r\nTip:\r\n Always specify both the height and width attributes for images. If height and width are set, the space required for the image is reserved when the page is loaded. However, without these attributes, the browser does not know the size of the image, and cannot reserve the appropriate space to it. The effect will be that the page layout will change during loading (while the images load).\r\nExample\r\nDefine an image as the submit button, with height and width attributes:\r\n\r\nTry it yourself �\r\n list Attribute\r\nThe list attribute refers to a \r\n element that contains pre-defined options for an \r\n element.\r\nExample\r\nAn \r\n element with pre-defined values in a \r\n:\r\n\r\n\r\nTry it yourself �\r\n min and max Attributes\r\nThe min and max attributes specify the minimum and maximum value for an \r\n element. The \r\nTYPE MUST BE NUMBER NOT TEXT\r\nNote:\r\n The min and max attributes works with the following input types: number, range, date, datetime, datetime-local, month, time and week.\r\nExample\r\n elements with min and max values:\r\nEnter a date before 1980-01-01:\r\n Enter a date after 2000-01-01:\r\n Quantity (between 1 and 5):\r\nTry it yourself �\r\n multiple Attribute\r\nThe multiple attribute is a boolean attribute.\r\nWhen present, it specifies that the user is allowed to enter more than one value in the \r\n element.\r\nNote:\r\n The multiple attribute works with the following input types: email, and file.\r\nExample\r\nA file upload field that accepts multiple values:\r\nSelect images: \r\nTry it yourself �\r\n pattern Attribute\r\nThe pattern attribute specifies a regular expression that the \r\n element\\\'s value is checked against.\r\nNote:\r\n The pattern attribute works with the following input types: text, search, url, tel, email, and password.\r\nTip:\r\n Use the global \r\ntitle\r\n attribute to describe the pattern to help the user.\r\nTip:\r\n Learn more about \r\nregular expressions\r\n in our JavaScript tutorial.\r\nExample\r\nAn input field that can contain only three letters (no numbers or special characters):\r\nCountry code: \r\nTry it yourself �\r\n placeholder Attribute\r\nThe placeholder attribute specifies a short hint that describes the expected value of an input field (e.g. a sample value or a short description of the expected format).\r\nThe short hint is displayed in the input field before the user enters a value.\r\nNote:\r\n The placeholder attribute works with the following input types: text, search, url, tel, email, and password.\r\nExample\r\nAn input field with a placeholder text:\r\n\r\nTry it yourself �\r\n required Attribute\r\nThe required attribute is a boolean attribute.\r\nWhen present, it specifies that an input field must be filled out before submitting the form.\r\nNote:\r\n The required attribute works with the following input types: text, search, url, tel, email, password, date pickers, number, checkbox, radio, and file.\r\nExample\r\nA required input field:\r\nUsername: \r\nTry it yourself �\r\n step Attribute\r\nThe step attribute specifies the legal number intervals for an \r\n element.\r\nExample: if step=\\\"3\\\", legal numbers could be -3, 0, 3, 6, etc.\r\nTip:\r\n The step attribute can be used together with the max and min attributes to create a range of legal values.\r\nNote:\r\n The step attribute works with the following input types: number, range, date, datetime, datetime-local, month, time and week.\r\nExample\r\nAn input field with a specified legal number intervals:\r\n\r\nTry it yourself �\r\nHTML5 \r\n Tag\r\nTag\r\nDescription\r\nDefines an HTML form for user input\r\nDefines an input control','Form Attributes','required min max pattern','Html Forms',17,4,1,0,1,1831,'2023-09-09'),(360,'How to Export Audio ONLY in Davinci Resolve (+ Best Format)\r\n\r\nBy\r\nJens Trimmer\r\nMay 3, 2022\r\nUPDATED\r\nJanuary 14, 2023\r\nExport\r\nIn this article, you will learn how to export audio ONLY from Davinci Resolve.\r\n\r\nThis is actually quite simple so let’s get to it:\r\n\r\nOpen the “Deliver†page inside Davinci Resolve.\r\nIn the “Render Settings†window, open the “Video†tab and uncheck “Export Video“.\r\nClick on “Audio†to open the tab, and change “Format†to “MP3†or “Wave“.\r\nClick on “Add to Render Queue“.\r\nClick on “Render All†on the right-hand side of the screen.\r\nThat’s the straightforward answer on how to do it!\r\n\r\nFor a more detailed explanation of this, and whether “MP3†or “Wave†is best, read on!\r\n\r\n(You’ll also learn how to render only one audio track).\r\n\r\nHow to Export Audio Only From Davinci Resolve! (Detailed Guide)\r\nSo let’s explain what was discussed above with a bit more details (and pictures!).\r\n\r\nIt does not matter if it’s a video or simply a song you have added to the timeline.\r\n\r\nYour final product will end up how you set the export settings anyways.\r\n\r\nBelow, you can see that I’ve added a normal MP4 file to the timeline, which I’m going to export as an MP3 file:\r\n\r\nNormal click in timeline\r\nThe next step is to go to the “Deliver†page in Davinci Resolve:\r\n\r\ndeliever page\r\nInside the “Deliver†page you should be able to see the “Render Setting†in the top corner on the left-hand side. Watch the picture below if you can’t see it.\r\n\r\nInside the “Render Setting“, the first thing you see is some pre-made render settings. Which is awesome, and something we are going to use!\r\n\r\nBy default this one is set to “Custom Export“, we want to change this one to “Audio Only“.\r\n\r\nTo find this option you have to scroll sideways:','Export Audio','DaVinci resolve audio','Sound Editor',19,25,1,0,1,0,'2026-01-07'),(361,'\r\n\r\n
\r\n Persistent background text\r\n \r\n
','??????Keeping Place Holders','placeholder','',4,3,1,0,1,0,'2026-01-07'),(362,'ini_set(\'display_errors\',\'Off\');\r\nini_set(\'error_reporting\', E_ALL & ~E_WARNING & ~E_NOTICE & ~E_DEPRECATED & ~E_STRICT);\r\ndefine(\'WP_DEBUG\', false);\r\ndefine(\'WP_DEBUG_DISPLAY\', false);\r\ndefine(\'WP_DEBUG_LOG\', true); // Still logs critical errors to debug.log\r\n\r\nfunction wp_debug_mode() {\r\n /**\r\n * Filters whether to allow the debug mode check to occur.\r\n *\r\n * This filter runs before it can be used by plugins. It is designed for\r\n * non-web runtimes. Returning false causes the `WP_DEBUG` and related\r\n * constants to not be checked and the default PHP values for errors\r\n * will be used unless you take care to update them yourself.\r\n *\r\n * To use this filter you must define a `$wp_filter` global before\r\n * WordPress loads, usually in `wp-config.php`.\r\n *\r\n * Example:\r\n *\r\n * $GLOBALS[\'wp_filter\'] = array(\r\n * \'enable_wp_debug_mode_checks\' => array(\r\n * 10 => array(\r\n * array(\r\n * \'accepted_args\' => 0,\r\n * \'function\' => function() {\r\n * return false;\r\n * },\r\n * ),\r\n * ),\r\n * ),\r\n * );\r\n *\r\n * @since 4.6.0\r\n *\r\n * @param bool $enable_debug_mode Whether to enable debug mode checks to occur. Default true.\r\n */\r\n if ( ! apply_filters( \'enable_wp_debug_mode_checks\', true ) ) {\r\n return;\r\n }\r\n\r\n\r\n\r\nif ( WP_DEBUG ) {\r\n error_reporting( E_ALL );\r\n\r\n if ( WP_DEBUG_DISPLAY ) {\r\n ini_set( \'display_errors\', 1 );\r\n } elseif ( null !== WP_DEBUG_DISPLAY ) {\r\n ini_set( \'display_errors\', 0 );\r\n }\r\n\r\n if ( in_array( strtolower( (string) WP_DEBUG_LOG ), array( \'true\', \'1\' ), true ) ) {\r\n $log_path = WP_CONTENT_DIR . \'/debug.log\';\r\n } elseif ( is_string( WP_DEBUG_LOG ) ) {\r\n $log_path = WP_DEBUG_LOG;\r\n } else {\r\n $log_path = false;\r\n }\r\n\r\n if ( $log_path ) {\r\n ini_set( \'log_errors\', 1 );\r\n ini_set( \'error_log\', $log_path );\r\n }\r\n } else {\r\n error_reporting( E_CORE_ERROR | E_CORE_WARNING | E_COMPILE_ERROR | E_ERROR | E_WARNING | E_PARSE | E_USER_ERROR | E_USER_WARNING | E_RECOVERABLE_ERROR );\r\n }\r\n\r\n /*\r\n * The \'REST_REQUEST\' check here is optimistic as the constant is most\r\n * likely not set at this point even if it is in fact a REST request.\r\n */\r\n if ( defined( \'XMLRPC_REQUEST\' ) || defined( \'REST_REQUEST\' ) || defined( \'MS_FILES_REQUEST\' )\r\n || ( defined( \'WP_INSTALLING\' ) && WP_INSTALLING )\r\n || wp_doing_ajax() || wp_is_json_request()\r\n ) {\r\n ini_set( \'display_errors\', 0 );\r\n }\r\n}','Code That Displays Errors','error','Error Traping',22,7,0,0,1,1,'2026-01-08'),(363,'To add\r\nsession_start() using a WordPress hook, the recommended approach is to hook into the init action with an early priority in your theme\'s functions.php file or a custom plugin. \r\nRecommended Code Snippet\r\nAdd the following code to your active theme\'s functions.php file: \r\nphp\r\n\r\nfunction register_my_session() {\r\n if (!session_id()) {\r\n session_start();\r\n }\r\n}\r\nadd_action(\'init\', \'register_my_session\', 1);','Adding Sessions To Wordpress','session function','Wordpress Apps',22,19,1,0,1,1,'2026-01-09'),(364,'Got it — you want to embed an iFrame inside the WordPress admin area (not just in posts or pages). This is a bit different from front-end embedding because it involves customizing the WordPress dashboard or admin pages.\r\n\r\nHere’s how you can do it safely and cleanly:\r\n\r\n1. Add an iFrame to a Custom Admin Page\r\nYou can create a new admin menu item and load your iFrame inside it.\r\n\r\nPhp\r\nCopy code\r\n// Add this to your theme\'s functions.php or a custom plugin\r\nfunction my_custom_admin_page() {\r\n add_menu_page(\r\n \'My iFrame Page\', // Page title\r\n \'iFrame Page\', // Menu title\r\n \'manage_options\', // Capability\r\n \'my-iframe-page\', // Menu slug\r\n \'my_iframe_page_html\', // Callback function\r\n \'dashicons-admin-site\', // Icon\r\n 20 // Position\r\n );\r\n}\r\nadd_action(\'admin_menu\', \'my_custom_admin_page\');\r\n\r\nfunction my_iframe_page_html() {\r\n ?>\r\n {div class=\"wrap\">\r\n {h1>Embedded iFrame{/h1>\r\n {iframe src=\"https://example.com\" width=\"100%\" height=\"600\" style=\"border:0;\">{/iframe>\r\n {/div>\r\n {?php\r\n}\r\n2. Embed iFrame in an Existing Admin Page via Hook\r\nIf you want to insert it into an existing settings page, you can hook into the page’s output:\r\n\r\nPhp\r\nCopy code\r\nfunction my_iframe_in_settings_page() {\r\n echo \'{iframe src=\"https://example.com\" width=\"100%\" height=\"500\" style=\"border:0;\">{/iframe>\';\r\n}\r\nadd_action(\'admin_notices\', \'my_iframe_in_settings_page\');\r\n(Note: This will show at the top of all admin pages — you can conditionally check $_GET[\'page\'] to target specific ones.)\r\n\r\n3. Use a Dashboard Widget with iFrame\r\nThis is great if you want the iFrame right on the WordPress Dashboard.\r\n\r\nPhp\r\nCopy code\r\nfunction my_iframe_dashboard_widget() {\r\n wp_add_dashboard_widget(\r\n \'my_iframe_widget\',\r\n \'My iFrame Widget\',\r\n function() {\r\n echo \'{iframe src=\"https://example.com\" width=\"100%\" height=\"400\" style=\"border:0;\">{/iframe>\';\r\n }\r\n );\r\n}\r\nadd_action(\'wp_dashboard_setup\', \'my_iframe_dashboard_widget\');\r\n???? Tips for Safety & Compatibility\r\n\r\nOnly embed trusted URLs to avoid security risks.\r\nSome sites block embedding via X-Frame-Options. If your iFrame doesn’t load, that’s likely the reason.\r\nFor better styling, you can enqueue custom CSS for admin pages using admin_enqueue_scripts.\r\nIf you want, I can make a version where the iFrame is responsive and styled to match the WordPress admin UI so it feels native. Would you like me to prepare that?\r\n\r\nUndo\r\n\r\n\r\n?php\r\n/*\r\nPlugin Name: Custom Admin PHP Script\r\nDescription: Adds a custom admin page that runs a PHP script.\r\nVersion: 1.0\r\nAuthor: Your Name\r\n*/\r\n\r\n// Hook into admin menu\r\nadd_action(\'admin_menu\', \'cap_add_admin_page\');\r\n\r\nfunction cap_add_admin_page() {\r\n add_menu_page(\r\n \'Custom PHP Script\', // Page title\r\n \'Custom Script\', // Menu title\r\n \'manage_options\', // Capability\r\n \'custom-php-script\', // Menu slug\r\n \'cap_render_admin_page\', // Callback function\r\n \'dashicons-editor-code\', // Icon\r\n 100 // Position\r\n );\r\n}\r\n\r\n// Render the admin page\r\nfunction cap_render_admin_page() {\r\n if (!current_user_can(\'manage_options\')) {\r\n wp_die(\'Unauthorized user\');\r\n }\r\n\r\n echo \'{div class=\"wrap\">{h1>Custom PHP Script Output{/h1>\';\r\n\r\n // Your PHP script logic here\r\n try {\r\n $result = date(\'Y-m-d H:i:s\'); // Example: current date/time\r\n echo \"{p>Server time is: {strong>{$result}{/strong>{/p>\";\r\n } catch (Exception $e) {\r\n echo \'{p style=\"color:red;\">Error: \' . esc_html($e->getMessage()) . \'{/p>\';\r\n }\r\n\r\n echo \'{/div>\';\r\n}','Putting Your Code Into Wordpress Admin','admin embed iframe','Developer Wordpress',9,19,1,0,1,0,'2026-01-19'),(365,'to change the default download location in Firefox,\r\n\r\n open the menu (three horizontal lines) in the top-right corner, \r\n\r\nselect Settings, and scroll down to the Downloads section under the General panel.\r\n Click \"Browse\" next to \"Save files to\" to choose a new folder, or select \"Always ask me where to save files\". Steps to Change Download Location: Access Settings: Click the menu button \\(\\equiv \\) in the top right and select Settings.Locate Downloads: Scroll down to the Files and Applications section and find the Downloads option.Change Folder: Click Browse (or \"Choose\") to select a new folder for downloads.Alternative Option: Select \"Always ask me where to save files\" to choose a destination every time a download starts. Important Notes: You can set Firefox to save to custom locations, including desktop or specific folders.If you select \"Always ask me where to save files,\" you will be prompted for a location with each download.Changes are saved automatically. ','Change The Default Download Location In Firefox','download firefox','Firefox',13,19,0,0,0,0,'2026-02-08'),(366,'\r\n\r\n\r\n\r\nLatitude and Longitude of a Point\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n
Steves Farms -
\r\n
px; height:px;float:left;margin-left:50px;\">\r\n
\r\n\r\n \r\n\r\n\r\n
\r\n
\r\n\r\n
Get the Latitude and Longitude of a Point
\r\n
When you click on the map, move the marker or enter an address the latitude and longitude coordinates of the point are inserted in the boxes below.
Use this if you know the latitude and longitude coordinates of a point and want to see where on the map the point is.\r\n Use:+ for N Lat or E Long - for S Lat or W Long. Example: +40.689060 -74.044636 Note: Your entry should not have any embedded spaces.
\r\n
\r\n\r\n
Example: +34 40 50.12 for 34N 40\' 50.12\"
\r\n\r\n
\r\n\r\n
\r\n\r\n\r\n\r\n\r\n\r\n\r\n
\r\n
\r\n','Gps Google Map Copy','gps','Google Map Calculations Backup',2,28,0,0,1,1,'2026-02-20'),(15,'mysql settings- root folder wp-config.php\r\n\r\n[current page]\r\n$temp = get_page_template();\r\n$path = pathinfo($temp);\r\n$temp = $path[\'filename\'] . \".\" . $path[\'extension\'];\r\necho $temp;','Show Current Page','mysql setting current page','',22,9,0,0,1,1995,'2023-09-09'),(16,'w\r\n\r\n \r\n\r\n \r\n\r\n
\r\n
FIND A STORE
\r\n \r\nOnreset \r\nThe onreset() event handler (like onsubmit) is attached to the form itself. This event is triggered if the form contains a reset button and that button is pressed. \r\nOnmouseover and Onmouseout \r\nThe mouseover and mouseout events are triggered when your visitor moves the mouse on or off of a particular object on your page. \r\n\r\nSee how these event handler works for yourself, the following links will execute alerts when the appropriate event handlers are triggered: onmouseover onmouseout \r\n\r\nOnclick \r\nThe onclick event is triggered when your visitors click their mouse on an object on your web page. Unlike the other mouse events the onclick event can also be triggered from the keyboard when your visitor selects the object by pressing the enter key when that object has the focus. \r\n\r\nSee how this event handler works for yourself: onclick \r\n\r\nOnmousedown and Onmouseup \r\nA mouse button click consists of two movements. First your visitor depresses the mouse button and then they release it. If you need to trigger different events for these two actions then you can use onmousedown and onmouseup instead of onclick. These event handlers don\\\'t get triggered by selecting the object from the keyboard though. \r\n\r\nSee how these event handler works for yourself: onmousedown onmouseup \r\n\r\nOnmousemove \r\nThe final mouse event handler that is common to all browsers (there are some extras that are browser specific) is the onmousemove event handler which (as its name suggests) is triggered by moving the mouse cursor over the selected object. \r\n\r\n\r\nKeyboard:\r\nOnfocus and Onblur \r\nThe focus and blur events are triggered when a particular object on your page gains or loses the focus. Just as you can have multiple windows open on your screen and the one you are working in has the focus, each level of objects within your web page will similarly have one that has the focus. The browser provides a means of moving the focus from one object in the page to another using either the keyboard or (in some cases) the mouse. When the focus is moved from one object to another the onblur event will be triggered for the object losing the focus and the onfocus event will be triggered for the object gaining the focus. \r\n\r\nThese two events can also often be used in place of onmousedown and onmouseup to allow the processing to be triggered from the keyboard as well as from a mouse click. \r\n\r\nSee how these event handler works for yourself, the following links will execute alerts when the appropriate event handlers are triggered: onfocus onblur \r\n\r\nNote that the standards actually say that these two events only apply to form fields however most browsers have implemented onfocus for most web page objects. Support for onblur is somewhat more limited but still extends beyond just form fields in most browsers.\r\n\r\nOnkeydown and Onkeyup \r\nThe onkeydown and onkeyup events are triggered when your visitors presses a key on their keyboard and they acts on the object on your web page that currently has the focus. As their name sugges the onkey down is triggered when a key is depressed and onkeyup is triggered when it is released.\r\n\r\nFocus Events\r\nEvent Occurs When\r\nonblur An element loses focus\r\nonfocus An element gets focus\r\nonfocusin An element is about to get focus\r\nonfocusout An element is about to lose focus\r\n=================\r\n\r\n\r\n\r\nKeyboard Events\r\nEvent Occurs When\r\nonkeydown A user presses a key\r\nonkeypress A user presses a key\r\nonkeyup A user releases a key\r\n=================\r\nKeyboardEvent Properties\r\nProperty Returns\r\naltKey If the ALT key was pressed\r\ncharCode Deprecated (Avoid using it)\r\ncode The code of the key that triggered the event\r\nctrlKey If the CTRL key was pressed\r\nisComposing If the state of the event is composing or not\r\nkey The value of the key that triggered the event\r\nkeyCode Deprecated (Avoid using it)\r\nlocation The location of a key on the keyboard or device\r\nmetaKey If the META key was pressed\r\nrepeat If a key is being hold down repeatedly, or not\r\nshiftKey If the SHIFT key was pressed\r\nwhich Deprecated (Avoid using it)\r\n\r\n\r\nMouse Events\r\nEvent Occurs When\r\nonclick A user clicks on an element\r\noncontextmenu A user right-clicks on an element\r\nondblclick A user double-clicks on an element\r\nonmousedown A mouse button is pressed over an element\r\nonmouseenter The mouse pointer moves into an element\r\nonmouseleave The mouse pointer moves out of an element\r\nonmousemove The mouse pointer moves over an element\r\nonmouseout The mouse pointer moves out of an element\r\n\r\n=================\r\n\r\nMouseEvent Properties\r\nProperty Returns\r\naltKey If the ALT key is pressed\r\nbutton Which mouse button is pressed\r\nbuttons Which mouse buttons were pressed\r\nclientX The X coordinate of the mouse pointer (window relative)\r\nclientY The Y coordinate of the mouse pointer (window relative)\r\nctrlKey If the CTRL key is pressed\r\ndetail The details about an event\r\nmetaKey If the META key is pressed\r\noffsetX The X coordinate of the mouse pointer (target relative)\r\noffsetY The Y coordinate of the mouse pointer (target relative)\r\npageX The X coordinate of the mouse pointer (document relative)\r\npageY The Y coordinate of the mouse pointer (document relative)\r\nrelatedTarget The element that triggered the mouse event\r\nscreenX The X coordinate of the mouse pointer (screen relative)\r\nscreenY The Y coordinate of the mouse pointer (screen relative)\r\nshiftKey If the SHIFT key is pressed\r\nwhich Deprecated (Avoid using it)\r\nUse the button property instead\r\nonmouseover The mouse pointer moves onto an element\r\nonmouseup A mouse button is released over an element','Form Fields - Events','form events onchange','',2,4,0,0,1,2027,'2026-01-03'),(30,'indexOf:\r\nvar ss = \\\"a string index of test \\\";\r\nvar result = ss.indexOf(\\\"ri\\\");\r\n\r\nlength:\r\n\r\n\r\nReplace Function: Global Regular Expression\r\nBy enabling the global property of our regular expression, we can go from replacing one match at a time to replacing all matches at once. To enable the global property, just put a \\\"g\\\" at the end of the regular expression.\r\n\r\nreplace:\r\n\r\nDisplay:\r\nOld string = Hello username! I hope you enjoy your stay username.\r\nNew string = Hello Chuck! I hope you enjoy your stay Chuck. \r\n\r\nsubstring:\r\n \r\nThe output of the code above will be: lo w\r\n\r\nQuestion: How do I convert numbers to strings in JavaScript? \r\n\r\nAnswer: The simplest way to convert any variable to a string is to add an empty string to that variable (i.e. concatenate it with an empty string \\\'\\\'), for example: \r\n\r\n\r\na = a+\\\'\\\' // This converts a to string\r\nb += \\\'\\\' // This converts b to string\r\n\r\n5.41 + \\\'\\\' // Result: the string \\\'5.41\\\'\r\nMath.PI + \\\'\\\' // Result: the string \\\'3.141592653589793\\\'','String Manipulations','replace indexof substring length','',2,1,1,0,1,1246,'2023-09-09'),(31,'function addData(value1){\r\n if(document.getElementById(\'li\'+value1).checked==true){\r\n if(document.getElementById(value1).value==""){\r\n document.getElementById(value1).value=1;\r\n }\r\n }\r\n}\r\n\r\nSet background color\r\ndocument.getElementById(\'colorcheck\').style.backgroundcolor= toHex(R)+toHex(G)+toHex(B)','GetElementById','getelementbyid get element by id','',2,7,0,0,1,1251,'2023-09-09'),(32,'JavaScript Confirm Example\r\nBelow is an example of how you would use a confirm dialogue box to warn users about something, giving them the option to either continue on or stay put.\r\n\r\nHTML & JavaScript Code:\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\nDisplay:\r\n\r\n \r\nNote the part in red. This is where all the magic happens. We call the confirm function with the message, \"Leave Tizag?\". JavaScript then makes a popup window with two choices and will return a value to our script code depending on which button the user clicks.\r\n\r\nIf the user clicks OK, a value of 1 is returned. If a user clicks cancel, a value of 0 is returned.. We store this value in answer by setting it equal to the confirm function call.\r\n\r\nAfter answer has stored the value, we then use answer as a conditional statement. If answer is anything but zero, then we will send the user away from Tizag.com. If answer is equal to zero, we will keep the user at Tizag.com because they clicked the Cancel button. \r\n\r\nIn either case, we have a JavaScript alert box that appears to inform the user on what is going to happen. It will say, \"Bye bye!\" if they choose to leave and, \"Thanks for sticking around!\" if they choose to stay.','Confirm()','yes no cancel message box','',2,7,0,0,1,2000,'2023-09-09'),(33,'JavaScript - Is it Enabled?\r\nThis lesson will first teach you how to enable JavaScript in Internet Explorer, Firefox, and Opera, then show you how you can write a very simple script to separate website visitors who don\\\'t have JavaScript enabled from those who do.\r\n\r\nAdvertise on Tizag.com \r\nEnable JavaScript - Internet Explorer\r\nIn Internet Explorer 6/7 (download Internet Explorer), you can check to see if JavaScript is enabled by navigating to the custom security settings that are somewhat buried (don\\\'t worry; we\\\'ll help you find it).\r\n\r\n1.Click on the Tools menu\r\n2.Choose Internet Options... from the menu\r\n3.Click the Security tab on the Internet Options pop up\r\n4.Click the Custom Level... button to access your security settings\r\n5.Scroll almost all the way down to the Scripting section\r\n6.Select the Enable button for Active scripting\r\n7.Click OK to finish the process\r\n8.Click Yes when asked to confirm\r\n\r\nEnable JavaScript - Firefox\r\nIn Firefox 2 (download Firefox) you can check to see if JavaScript is enabled by navigating to the Content settings under Options.\r\n\r\n1.Click on the Tools menu\r\n2.Choose Options... from the menu\r\n3.Click the Content tab in the Options pop up\r\n4.Make sure that Enable JavaScript is checked\r\n5.Click OK to finish the process\r\n\r\nEnable JavaScript - Opera\r\nIn Opera (download Opera) you can check to see if JavaScript is enabled by navigating to the Content settings under Preferences.\r\n\r\n1.Click on the Tools menu\r\n2.Choose Preferences... from the menu\r\n3.Click the Advanced tab in the Preferences pop up\r\n4.Select Content from the list of items on the left\r\n5.Make sure that Enable JavaScript is checked\r\n6.Click OK to finish the process\r\nJavaScript Detection\r\nThese days, it\\\'s basically impossible to navigate the web without a JavaScript-enabled browser, so checking whether or not a user has JavaScript enabled is not all that important. Chances are, the only way it be disabled is if the company\\\'s IT staff has decided to disable JavaScript for some reason. However, if you still want to be sure your users are JavaScript enabled, this script will get it done.\r\n\r\nThe only sure fire way to separate users who don\\\'t have JavaScript from those who do is to use a simple redirect script that will only work for those with JavaScript enabled. If a person\\\'s browser does not have JavaScript enabled, the script will not run, and they will remain on the same page.\r\n\r\nJavaScript Code:\r\n\r\nReplace the example URL with the webpage of your choice','Is Javascript Enabled','enable javascript','',2,7,1,0,1,1211,'2023-09-09'),(34,'JavaScript While Loop Explained\r\nThere are two key parts to a JavaScript while loop:\r\n\r\n1.The conditional statement which must be True for the while loop\\\'s code to be executed.\r\n2.The while loop\\\'s code that is contained in curly braces \\\"{ and }\\\" will be executed if the condition is True.\r\nWhen a while loop begins, the JavaScript interpreter checks if the condition statement is true. If it is, the code between the curly braces is executed. At the end of the code segment \\\"}\\\", the while loop loops back to the condition statement and begins again. \r\n\r\nIf the condition statement is always True, then you will never exit the while loop, so be very careful when using while loops!\r\n\r\nCreating a Simple While Loop\r\nThis example shows how to create a basic while loop that will execute a document.write 10 times and then exit the loop statement.\r\n\r\nJavaScript Code:\r\n\r\n\r\nDisplay:\r\nWhile loop is beginning\r\nmyCounter = 0\r\nmyCounter = 1\r\nmyCounter = 2\r\nmyCounter = 3\r\nmyCounter = 4\r\nmyCounter = 5\r\nmyCounter = 6\r\nmyCounter = 7\r\nmyCounter = 8\r\nmyCounter = 9\r\nWhile loop is finished! \r\nOur variable myCounter started off at 0, which is less than 10, so our while loop executed its code. The value 0 was printed to the browser and then myCounter was incremented by 1 and the while loop started over again.\r\n\r\n1 was less than 10 so the while loop\\\'s code was executed... and the process repeats itself a few more times until...\r\n\r\nmyCounter was 10 which was not less than 10 so the while loop\\\'s code did not execute. You can see this in the Display: because the last value to be printed out was 9.\r\n\r\nNote: Advanced programmers may recognize that a for loop would be a better solution for this example, but we hope you can ignore this for our needs to create an easy example!','While Loop','while loop','',2,7,0,0,1,1170,'2023-09-09'),(35,'Creating Single Line Comments\r\nTo create a single line comment in JavaScript, you place two slashes \\\"//\\\" in front of the code or text you wish to have the JavaScript interpreter ignore. When you place these two slashes, all text to the right of them will be ignored, until the next line.\r\n\r\nThese types of comments are great for commenting out single lines of code and writing small notes.\r\n\r\nJavaScript Code:\r\n\r\n\r\nDisplay:\r\nI have comments in my JavaScript code! \r\nEach line of code that is colored red is commented out and will not be interpreted by the JavaScript engine.\r\n\r\nCreating Multi-line Comments\r\nAlthough a single line comment is quite useful, it can sometimes be burdensome to use when disabling long segments of code or inserting long-winded comments. For this large comments you can use JavaScript\\\'s multi-line comment that begins with /* and ends with */.\r\n\r\nJavaScript Code:\r\n\r\n\r\nDisplay:\r\nI have multi-line comments! \r\nQuite often text editors have the ability to comment out many lines of code with a simple key stroke or option in the menu. If you are using a specialized text editor for programming, be sure that you check and see if it has an option to easily comment out many lines of code!','Comment Out Lines','comment rem','',2,7,1,0,1,1507,'2023-09-09'),(36,'Back in the day, you\\\'d often see prompts on personal webpages asking for your name. After you typed in the information, you would be greeted with a page that had a welcome message, such as, \\\"Welcome to My Personal WebPage John Schmieger!\\\" (If your name just so happened to be John Schmieger).\r\n\r\nThe JavaScript prompt is not very useful and many find it slightly annoying, but hey, this tutorial is here to educate you, so let\\\'s learn how to make that prompt!\r\n\r\nSimple JavaScript Prompt\r\nYou can use a prompt for a wide variety of useless tasks, but below we use it for an exceptionally silly task. Our prompt is used to gather the user\\\'s name to be displayed in our alert dialogue box.\r\n\r\nHTML & JavaScript Code:\r\n\r\n\r\n\r\n\r\n\r\n\r\nDisplay:\r\n \r\nRecap on JavaScript Prompt\r\nIt sure is a quick way to gather some information, but it is not as reliable an information gatherer as other options available to you. If you want to find out someone\\\'s name and information, the best way to request this information would be through the use of HTML Forms. And if you want to use the information you collected in your website, you might use some PHP to get that job done in a more sophisticated manner.','Prompt For','prompt input','',2,4,1,0,1,1477,'2023-09-09'),(37,'JavaScript Date and Time Object\r\nThe Date object is useful when you want to display a date or use a timestamp in some sort of calculation. In Java, you can either make a Date object by supplying the date of your choice, or you can let JavaScript create a Date object based on your visitor\\\'s system clock. It is usually best to let JavaScript simply use the system clock.\r\n\r\nAdvertise on Tizag.com \r\nWhen creating a Date object based on the computer\\\'s (not web server\\\'s!) internal clock, it is important to note that if someone\\\'s clock is off by a few hours or they are in a different time zone, then the Date object will create a different times from the one created on your own computer.\r\n\r\nJavaScript Date Today (Current)\r\nTo warm up our JavaScript Date object skills, let\\\'s do something easy. If you do not supply any arguments to the Date constructor (this makes the Date object) then it will create a Date object based on the visitor\\\'s internal clock.\r\n\r\nHTML & JavaScript Code:\r\n
It is now \r\n\r\n
\r\nDisplay:\r\nIt is now\r\nNothing shows up! That\\\'s because we still don\\\'t know the methods of the Date object that let us get the information we need (i.e. Day, Month, Hour, etc). \r\n\r\nGet the JavaScript Time\r\nThe Date object has been created, and now we have a variable that holds the current date! To get the information we need to print out, we have to utilize some or all of the following functions:\r\n\r\n•getTime() - Number of milliseconds since 1/1/1970 @ 12:00 AM\r\n•getSeconds() - Number of seconds (0-59)\r\n•getMinutes() - Number of minutes (0-59)\r\n•getHours() - Number of hours (0-23)\r\n•getDay() - Day of the week(0-6). 0 = Sunday, ... , 6 = Saturday\r\n•getDate() - Day of the month (0-31)\r\n•getMonth() - Number of month (0-11)\r\n•getFullYear() - The four digit year (1970-9999)\r\nNow we can print out the date information. We will be using the getDate, getMonth, and getFullYear methods in this example.\r\n\r\nHTML & JavaScript Code:\r\n
It is now \r\n\r\n
\r\n\r\nDisplay:\r\nIt is now 1/8/2011 !\r\nNotice that we added 1 to the month variable to correct the problem with January being 0 and December being 11. After adding 1, January will be 1, and December will be 12.\r\n\r\nJavaScript Current Time Clock\r\nNow, instead of displaying the date we, will display the format you might see on a typical digital clock -- HH:MM AM/PM (H = Hour, M = Minute).\r\n\r\nHTML & JavaScript Code:\r\n
It is now \r\n\r\n
\r\n\r\nDisplay:\r\nIt is now 23:09 PM \r\nAbove, we check to see if either the hours or minutes variable is less than 10. If it is, then we need to add a zero to the beginning of minutes. This is not necessary, but if it is 1:01 AM, our clock would output \\\"1:1 AM\\\", which doesn\\\'t look very nice at all!','Date And Time','date time','',2,7,0,0,1,1569,'2023-09-09'),(38,'The JavaScript print function window.print() will print the current webpage when executed. In this example script, we will be placing the function on a JavaScript button that will perform the print operation when the onClick event occurs.\r\n\r\nHTML & JavaScript Code:\r\n','Print Web Page','print button','',2,10,1,0,1,1423,'2023-09-09'),(39,'If you\\\'re a Google Documents user, you know that it takes several steps to create a new document. However, you can create a shortcut icon or a shortcut key combo in Windows 7 that will let you create a new document in a single click. Here\\\'s how: \r\nClick an empty space on your Windows 7 desktop. \r\nSelect New | Shortcut. \r\nIn the dialog box, type in the following URL:\r\nhttp://docs.google.com/?action=newdoc \r\nAssign a shortcut key combination that\\\'s not already in use. You can also create shortcuts to create new spreadsheets or presentations, using the following URLs:\r\nhttp://spreadsheets.google.com /ccc?new\r\nhttp://docs.google.com/?action=new_presentation \r\nThese work for the standard Google Docs service. If you use Google Apps, you\\\'ll need to include your domain and you\\\'ll probably want to use SSL for security (https). For example:\r\nhttps://docs.google.com/a//?action=newdoc','How To Add Google Docs Shortcut To Windows 7 Desktop','shortcut google desktop','',18,5,0,0,1,1214,'2023-09-09'),(40,'Click Start, click Run, type cmd, and then press ENTER..\r\nTo view the syntax for the Attrib command, type attrib /? at the command prompt.\r\nTo remove the Read-only attribute and to set the System attribute, use the following command:\r\n\r\nattrib -r +s drive:\\\\`path`\\\\`foldername`\r\n\r\nFor example, to remove the Read-only attribute and to set the System attribute for the C:\\\\Test folder, use the following command: \r\n\r\nattrib -r +s c:\\\\test\r\n\r\nBe aware that some programs may not operate correctly with folders for which the System attribute and the Read-only attribute are set. Therefore, use the following command to remove these attributes: \r\n\r\nattrib -r -s drive:\\\\`path`\\\\`foldername`\r\n\r\nFor example, to remove both the Read-only and the System attributes from the C:\\\\Test folder, use the following command: \r\n\r\nattrib -r -s c:\\\\test\r\n\r\nIf the Run command is not listed on the Start menu, do the following: \r\nClick Start, click All Programs, click Accessories, and then click Run.','To View Or To Remove The Read-only Or The System Attributes Of Folders','readonly attribute','',18,5,0,0,1,1382,'2023-09-09'),(41,'In Windows XP, an event is any significant occurrence in the system or in a program that requires users to be notified, or an entry added to a log. The Event Log Service records application, security, and system events in Event Viewer. With the event logs in Event Viewer, you can obtain information about your hardware, software, and system components, and monitor security events on a local or remote computer. Event logs can help you identify and diagnose the source of current system problems, or help you predict potential system problems.
Event Log Types
A Windows XP-based computer records events in the following three logs:
Application log
The application log contains events logged by programs. For example, a database program may record a file error in the application log. Events that are written to the application log are determined by the developers of the software program.
Security log
The security log records events such as valid and invalid logon attempts, as well as events related to resource use, such as the creating, opening, or deleting of files. For example, when logon auditing is enabled, an event is recorded in the security log each time a user attempts to log on to the computer. You must be logged on as Administrator or as a member of the Administrators group in order to turn on, use, and specify which events are recorded in the security log.
System log
The system log contains events logged by Windows XP system components. For example, if a driver fails to load during startup, an event is recorded in the system log. Windows XP predetermines the events that are logged by system components.
How to View Event Logs
To open Event Viewer, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in.
In the console tree, click Event Viewer.
The Application, Security, and System logs are displayed in the Event Viewer window.
How to View Event Details
To view the details of an event, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in.
In the console tree, expand Event Viewer, and then click the log that contains the event that you want to view.
In the details pane, double-click the event that you want to view.
The Event Properties dialog box containing header information and a description of the event is displayed.
To copy the details of the event, click the Copy button, then open a new document in the program in which you want to paste the event (for example, Microsoft Word), and then click Paste on the Edit menu.
To view the description of the previous or next event, click the UP ARROW or DOWN ARROW.
How to Interpret an Event
Each log entry is classified by type, and contains header information, and a description of the event.
Event Header
The event header contains the following information about the event:
Date
The date the event occurred.
Time
The time the event occurred.
User
The user name of the user that was logged on when the event occurred.
Computer
The name of the computer where the event occurred.
Event ID
An event number that identifies the event type. The Event ID can be used by product support representatives to help understand what occurred in the system.
Source
The source of the event. This can be the name of a program, a system component, or an individual component of a large program.
Type
The type of event. This can be one of the following five types: Error, Warning, Information, Success Audit, or Failure Audit.
Category
A classification of the event by the event source. This is primarily used in the security log.
Event Types
The description of each event that is logged depends on the type of event. Each event in a log can be classified into one of the following types:
Information
An event that describes the successful operation of a task, such as an application, driver, or service. For example, an Information event is logged when a network driver loads successfully.
Warning
An event that is not necessarily significant, however, may indicate the possible occurrence of a future problem. For example, a Warning message is logged when disk space starts to run low.
Error
An event that describes a significant problem, such as the failure of a critical task. Error events may involve data loss or loss of functionality. For example, an Error event is logged if a service fails to load during startup.
Success Audit (Security log)
An event that describes the successful completion of an audited security event. For example, a Success Audit event is logged when a user logs on to the computer.
Failure Audit (Security log)
An event that describes an audited security event that did not complete successfully. For example, a Failure Audit may be logged when a user cannot access a network drive.
How to Find Events in a Log
The default view of event logs is to list all its entries. If you want to find a specific event, or view a subset of events, you can either search the log, or you can apply a filter to the log data.
How to Search for a Specific Log Event
To search for a specific log event, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in.
In the console tree, expand Event Viewer, and then click the log that contains the event that you want to view.
On the View menu, click Find.
Specify the options for the event that you want to view in the Find dialog box, and then click Find Next.
The event that matches your search criteria is highlighted in the details pane. Click Find Next to locate the next occurrence of an event as defined by your search criteria.
How to Filter Log Events
To filter log events, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in.
In the console tree, expand Event Viewer, and then click the log that contains the event that you want to view.
On the View menu, click Filter.
Click the Filter tab (if it is not already selected).
Specify the filter options that you want, and then click OK.
Only events that match your filter criteria are displayed in the details pane.
To return the view to display all log entries, click Filter on the View menu, and then click Restore Defaults.
How to Manage Log Contents
By default, the initial maximum of size of a log is set to 512 KB, and when this size is reached, new events overwrite older events as needed. Depending on your requirements, you can change these settings, or clear a log of its contents.
How to Set Log Size and Overwrite Options
To specify log size and overwrite options, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in.
In the console tree, expand Event Viewer, and then right-click the log in which you want to set size and overwrite options.
Under Log size, type the size that you want in the Maximum log size box.
Under When maximum log size is reached, click the overwrite option that you want.
If you want to clear the log contents, click Clear Log.
Click OK.
How to Archive a Log
If you want to save your log data, you can archive event logs in any of the following formats:
Log-file format (.evt)
Text-file format (.txt)
Comma-delimited text-file format (.csv)
To archive a log, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in.
In the console tree, expand Event Viewer, and then right-click the log in which you want to archive, and then click Save Log File As.
Specify a file name and location where you want to save the file. In the Save as type box, click the format that you want, and then click Save.
The log file is saved in the format that you specified.','Event Viewer','events log','',18,2,0,0,1,1914,'2023-09-09'),(42,'To create a new network place, you must have the necessary permissions to access the network resource. To create a new network place:
Click Start, click Control Panel, and then click Network and Internet Connections.
Under See Also, click My Network Places.
Click Add a network place. The Add Network Place Wizard starts.
Click Next to continue.
Click Choose another network location, and then click Next.
In the Internet or network address box, type the name of the network share that you want to use, or click Browse to locate the network share that you want.
For example, use one of the following methods (where Servername is the name of the remote server and Sharename is the name of the shared network resource):
Type a network address by using the following format:
\\\\\\\\Servername\\\\Sharename
Type an Internet address by using the following format:
http://Servername/Sharename
Type a File Transfer Protocol (FTP) site by using the following format:
ftp://ftp.domain.com
Click Next.
In the Type a name for this network place box, type the name that you want, and then click Next.
Click Finish.
How to Remove a Network Place
To remove a network place:
Open My Network Places. To do this:
Click Start, click Control Panel, and then click Network and Internet Connections.
Under See Also, click My Network Places.
Right-click the network place that you want to delete, and then click Delete.
When you are prompted to confirm the deletion, click Yes. The connection to the shared network resource is removed. Note that this does not remove the files in the remote folder.
','How To Create A New Network Place','network','',18,2,0,0,1,1415,'2023-09-09'),(43,'Folders:\r\nThere is Microsoft\\\'s algorithm, for converting a regular (long) filename to a DOS (short) filename, which you can probably find on MSDN. The most basic operation is indeed to construct an \\\"8.3\\\" abbreviation by appending \\\"~1\\\" to the first 6 chars, then dropping everything else, up to the first (?) \\\".\\\", and taking only the first 3 chars after that, for the \\\"extension\\\". But the algorithm continues, if you have a lot of files with similar names, for instance (after you run out of \\\"~2\\\", \\\"~3\\\", ...).\r\n\r\nBut then, there is the entirely different operation, of taking a directory in a FAT32/NTFS filesystem, and getting the actual (short and long) names stored for the files in it (as in \\\"DIR /X\\\"), IF the filesystem has generated a short name for each file (I think in the NTFS version used in WindowsXP, the short name is no longer generated and stored, by default, for every file?).\r\n\r\nSo, using Microsoft\\\'s algorithm you can predict what the short name should be, but retrieving the actual short name from the directory is a different operation. The two should match, except in the newer filesystems e.g. NTFS under WinXP, where there may no longer be a short name stored for a given file (I think you can still create and store the short name for a given file, on demand if needed?).\r\n\r\n\r\nFiles:\r\nWindows supports long file names up to 255 characters in length. Windows also generates an MS-DOS-compatible (short) file name in 8.3 format to allow MS-DOS-based or 16-bit Windows-based programs to access the files. \r\nMORE INFORMATIONWindows generates short file names from long file names in the following manner:...Windows generates short file names from long file names in the following manner: \r\n\r\nWindows deletes any invalid characters and spaces from the file name. Invalid characters include:\r\n. \\\" / \\\\ [ ] : ; = , \r\nBecause short file names can contain only one period (.), Windows removes additional periods from the file name if valid, non-space characters follow the final period in the file name. For example, Windows generates the short file name \r\nThisis~1.txt \r\nfrom the long file name \r\nThis is a really long filename.123.456.789.txt \r\nOtherwise, Windows ignores the final period and uses the next to the last period. For example, Windows generates the short file name\r\nThisis~1.789 \r\nfrom the long file name \r\nThis is a really long filename.123.456.789. \r\nWindows truncates the file name, if necessary, to six characters and appends a tilde (~) and a digit. For example, each unique file name created ends with \\\"~1.\\\" Duplicate file names end with \\\"~2,\\\" \\\"~3,\\\" and so on. \r\nWindows truncates the file name extension to three characters or less. \r\nWindows translates all characters in the file name and extension to uppercase. \r\nNote that if a folder or file name contains a space, but less than eight characters, Windows still creates a short file name. This behavior may cause problems if you attempt to access such a file or folder over a network. To work around this situation, substitute a valid character, such as an underscore (_), for the space. If you do so, Windows does not create a different short file name \r\n\r\nFor example, \\\"Afile~1.doc\\\" is generated from \\\"A file.doc\\\" because the long file name contains a space. \r\n\r\nNo short file name is generated from \\\"A_file.doc\\\" because the file name contains less than eight characters and does not contain a space. \r\n\r\nThe short file name \\\"Alongf~1.txt\\\" is generated from the long file name \\\"A long filename.txt\\\" because the long file name contains more than eight characters. \r\n\r\n--------------------------------------------------------------------------------','Short Filenames','dos short file names','',18,9,0,0,1,2443,'2023-09-09'),(44,'$sessionid=strtotime(date(\\\"Y-m-d H:i:s\\\"));\r\n\r\nformat character Description Example returned values \r\na Lowercase Ante meridiem and Post meridiem am or pm \r\nA Uppercase Ante meridiem and Post meridiem AM or PM \r\nB Swatch Internet time 000 through 999 \r\nc ISO 8601 date (added in PHP 5) 2004-02-12T15:19:21+00:00 \r\nd Day of the month, 2 digits with leading zeros 01 to 31 \r\nD A textual representation of a day, three letters Mon through Sun \r\nF A full textual representation of a month, such as January or March January through December \r\ng 12-hour format of an hour without leading zeros 1 through 12 \r\nG 24-hour format of an hour without leading zeros 0 through 23 \r\nh 12-hour format of an hour with leading zeros 01 through 12 \r\nH 24-hour format of an hour with leading zeros 00 through 23 \r\ni Minutes with leading zeros 00 to 59 \r\nI (capital i) Whether or not the date is in daylights savings time 1 if Daylight Savings Time, 0 otherwise. \r\nj Day of the month without leading zeros 1 to 31 \r\nl (lowercase \\\'L\\\') A full textual representation of the day of the week Sunday through Saturday \r\nL Whether it\\\'s a leap year 1 if it is a leap year, 0 otherwise. \r\nm Numeric representation of a month, with leading zeros 01 through 12 \r\nM A short textual representation of a month, three letters Jan through Dec \r\nn Numeric representation of a month, without leading zeros 1 through 12 \r\nO Difference to Greenwich time (GMT) in hours Example: +0200 \r\nr RFC 2822 formatted date Example: Thu, 21 Dec 2000 16:01:07 +0200 \r\ns Seconds, with leading zeros 00 through 59 \r\nS English ordinal suffix for the day of the month, 2 characters st, nd, rd or th. Works well with j \r\nt Number of days in the given month 28 through 31 \r\nT Timezone setting of this machine Examples: EST, MDT ... \r\nU Seconds since the Unix Epoch (January 1 1970 00:00:00 GMT) See also time() \r\nw Numeric representation of the day of the week 0 (for Sunday) through 6 (for Saturday) \r\nW ISO-8601 week number of year, weeks starting on Monday (added in PHP 4.1.0) Example: 42 (the 42nd week in the year) \r\nY A full numeric representation of a year, 4 digits Examples: 1999 or 2003 \r\ny A two digit representation of a year Examples: 99 or 03 \r\nz The day of the year (starting from 0) 0 through 365 \r\nZ Timezone offset in seconds. The offset for timezones west of UTC is always negative, and for those east of UTC is always positive. -43200 through 43200 \r\n\r\n\r\nUnrecognized characters in the format string will be printed as-is. The Z format will always return 0 when using gmdate(). \r\n\r\nExample 1. date() examples\r\n****************************************\r\na \\\"am\\\" or \\\"pm\\\" \r\nA \\\"AM\\\" or \\\"PM\\\" \r\nB Swatch Internet time \r\nd day of the month, 2 digits with leading zeros; i.e. \\\"01\\\" to \\\"31\\\" \r\nD day of the week, textual, 3 letters; i.e. \\\"Fri\\\" \r\nF month, textual, long; i.e. \\\"January\\\" \r\ng hour, 12-hour format without leading zeros; i.e. \\\"1\\\" to \\\"12\\\" \r\nG hour, 24-hour format without leading zeros; i.e. \\\"0\\\" to \\\"23\\\" \r\nh hour, 12-hour format; i.e. \\\"01\\\" to \\\"12\\\" \r\nH hour, 24-hour format; i.e. \\\"00\\\" to \\\"23\\\" \r\ni minutes; i.e. \\\"00\\\" to \\\"59\\\" \r\nI (capital i) \\\"1\\\" if Daylight Savings Time, \\\"0\\\" otherwise. \r\nj day of the month without leading zeros; i.e. \\\"1\\\" to \\\"31\\\" \r\nl (lowercase \\\'L\\\') day of the week, textual, long; i.e. \\\"Friday\\\" \r\nL boolean for whether it is a leap year; i.e. \\\"0\\\" or \\\"1\\\" \r\nm month; i.e. \\\"01\\\" to \\\"12\\\" \r\nM month, textual, 3 letters; i.e. \\\"Jan\\\" \r\nn month without leading zeros; i.e. \\\"1\\\" to \\\"12\\\" \r\nr RFC 822 formatted date; i.e. \\\"Thu, 21 Dec 2000 16:01:07 +0200\\\" (added in PHP 4.0.4) \r\ns seconds; i.e. \\\"00\\\" to \\\"59\\\" \r\nS English ordinal suffix, textual, 2 characters; i.e. \\\"th\\\", \\\"nd\\\" \r\nt number of days in the given month; i.e. \\\"28\\\" to \\\"31\\\" \r\nT Timezone setting of this machine; i.e. \\\"MDT\\\" \r\nU seconds since the epoch \r\nw day of the week, numeric, i.e. \\\"0\\\" (Sunday) to \\\"6\\\" (Saturday) \r\nY year, 4 digits; i.e. \\\"1999\\\" \r\ny year, 2 digits; i.e. \\\"99\\\" \r\nz day of the year; i.e. \\\"0\\\" to \\\"365\\\" \r\nZ timezone offset in seconds (i.e. \\\"-43200\\\" to \\\"43200\\\"). The offset for timezones west of UTC is always negative, and for those east of UTC is always positive','Date Functions','time date','',1,13,1,0,1,2090,'2023-09-09'),(46,'syntax:<fieldset><legend>Mytext</legend></fieldset>\r\n fieldset{border:1px solid #000000;padding:10px 10px 10px 10px;text-align:left;margin: 0px 5px 15px 20px; }\r\nlegend{border:1px solid #000000;padding:2px 2px 2px 2px;text-align:left; }\r\n\r\nfieldset { \r\n display: block;\r\n margin-left: 2px;\r\n margin-right: 2px;\r\n padding-top: 0.35em;\r\n padding-bottom: 0.625em;\r\n padding-left: 0.75em;\r\n padding-right: 0.75em;\r\n border: 2px groove (internal value);\r\n}','Fieldsets And Legends','border box fieldset legend','Web',4,3,0,0,1,1447,'2023-09-09'),(47,'function message(form){\r\n var value = form.payment.options[form.payment.selectedIndex].value;\r\n var message=\\\"\\\";\r\n if(value==\\\"PHONE\\\"){\r\n message=\\\"Complete your order by scrolling to the bottom of this page and clicking the NEXT button.\\\\n\\\\n That will complete your order and provide you with your order number and total.\\\\n\\\\n I accept Visa or MasterCard.\\\\n\\\\n Call Denise at 970-454-2152 or cell phone at 970-590-2162.\\\\n\\\\n I will need your order # and the total amount of your order. Please provide me with your credit card number, expiration date, and the last 3 digits of the number on the back of your card.\\\\n\\\\n I also need the billing address of the credit card if you did not provide it on the order form. If for some reason I am unable to take your call, please leave me a message and I\\\'ll call you back as soon as possible. You may leave this information on my answering machine.\\\\n\\\\n Please call between 7:30am and 9:30pm (Mountain Standard Time) 9:30am and 11:30pm (Eastern Standard Time).\\\\n\\\\n Thank You.\\\";\r\n }\r\n if(value==\\\"CHECK\\\"){\r\n message=\\\"You have selected pay by check\\\";\r\n }\r\n if(value==\\\"MONEY ORDER\\\"){\r\n message=\\\"You have selected MONEY ORDER\\\";\r\n }\r\n if(value==\\\"PAYPAL\\\"){\r\n message=\\\"If you are paying by credit card with our secure online page, we accept Visa, MasterCard, Discover and American Express.\\\\n\\\\nIf you do not receive a confirmation email after completing the credit card payment, we will not be notified either. Contact us to confirm your order.\\\";\r\n }\r\n alert (message);\r\n}\r\n*************\r\n\r\n\r\n\r\n[example 2]\r\n\r\nHow do I find the value of a SELECT element?\r\nApr 17th, 2000 16:04\r\nMartin Honnen, \r\n\r\n\r\n\r\n\r\nNN6 and IE4+ provide a\r\n value\r\nproperty for SELECT elements thus\r\n document.formName.selectName.value\r\nis sufficient with these browsers. For other browsers and cross browser \r\ncode use\r\n var select = document.formName.selectName;\r\n var value = select.options[select.selectedIndex].value\r\n\r\n__________________________________\r\n[select name=\\\'navi\\\' onChange=\\\"go()\\\">\r\nfunction go()\r\n{\r\n box = document.forms[0].navi;\r\n destination = box.options[box.selectedIndex].value;\r\n if (destination) location.href = destination;\r\n}\r\n____________________________________________________\r\nWhere: qxq-features.php\r\n','Select- Combo Box','index combo','',2,4,1,0,1,1752,'2024-10-05'),(216,'\"35\",\"Ben\"=>\"37\",\"Joe\"=>\"43\");\r\narsort($age);\r\n?>\r\nDefinition and Usage\r\nThe arsort() function sorts an associative array in descending order, according to the value.\r\n\r\nTip: Use the asort() function to sort an associative array in ascending order, according to the value.\r\n\r\nTip: Use the krsort() function to sort an associative array in descending order, according to the key.\r\n\r\nSyntax\r\narsort(array, sorttype)\r\nParameter Values\r\nParameter Description\r\narray Required. Specifies the array to sort\r\nsorttype Optional. Specifies how to compare the array elements/items. Possible values:\r\n0 = SORT_REGULAR - Default. Compare items normally (don\'t change types)\r\n1 = SORT_NUMERIC - Compare items numerically\r\n2 = SORT_STRING - Compare items as strings\r\n3 = SORT_LOCALE_STRING - Compare items as strings, based on current locale\r\n4 = SORT_NATURAL - Compare items as strings using natural ordering\r\n5 = SORT_FLAG_CASE -\r\n\r\n?>','Using Arrays','array','',1,23,0,0,1,2,'2023-09-09'),(217,'Imports System.IO\r\n\r\n[DELETE FILE]\r\n If File.Exists(TREE3 + FLD(0, 0) + \"_header.php\") Then File.Delete(TREE3 + FLD(0, 0) + \"_header.php\")\r\n\r\n==============\r\nFunction DriveAvailable(driveLetter As String) As Boolean\r\n Try\r\n Dim driveInfo As New DriveInfo(driveLetter)\r\n Return driveInfo.IsReady \' Returns True if the drive is ready\r\n Catch ex As Exception\r\n Return False \' Return False if an exception occurs (e.g., invalid drive)\r\n End Try\r\n End Function\r\n\r\nSub LoadFilesListBox(ByRef coBox As ListBox, ByVal folderPath As String, ByVal Pattern As String)\r\n Dim M0 As Integer = 1, fileName1 As String = \"\", M1 As Integer, M As Integer \'PatternSection As String\r\n \'Dim di As New IO.DirectoryInfo(folderPath), diar1 As IO.FileInfo(), dra As IO.FileInfo\r\n With coBox\r\n .Items.Clear()\r\n End With\r\n Dim AllowedExtension As String = \"*.*\"\r\n If Not System.IO.Directory.Exists(folderPath) Then MsgBox(\"This folder seems to have disappeared.\") : Exit Sub\r\n For Each file As String In IO.Directory.GetFiles(folderPath, \"*.*\")\r\n M1 = file.LastIndexOf(\"\\\") + 1 : M = file.Length - M1\r\n fileName1 = file.Substring(M1, M)\r\n coBox.Items.Add(fileName1)\r\n Next\r\n End Sub','Directory Files Into A List Box Checking Drive Available','delete files directory drive listbox','',15,9,0,0,1,2,'2023-09-09'),(49,'http://www.zdnet.com/blog/bott/the-one-security-tool-every-windows-user-should-know-about/2848?pg=1\r\nnew zero-day security hole in all versions of Windows is the subject of targeted attacksMicrosoft says. The flaw, according to Microsoft Security Advisory 2488013, occurs when an attacker exploits the creation of uninitialized memory during a CSS function within Internet Explorer. The result? It is possible under certain conditions for the memory to be leveraged by an attacker using a specially crafted Web page to gain remote code execution.\r\nSimilar holes have been spotted in the past in applications such as Adobe Reader, Adobe Flash, and Apples QuickTime.\r\nThe definitive fix for a vulnerability like this is a vendor-supplied patch. But what do you do while youre waiting for the patch? And how do you deal with vulnerabilities in legacy applications that cant be easily repaired?\r\nThats the goal of Microsofts Enhanced Mitigation Experience Toolkit (EMET), a simple but powerful configuration utility that allows you to harden applications that werent originally designed to take advantage of Windows security features. EMET version 2 was released a few months ago and runs on all currently supported Windows client and server editions, including Windows 7, Windows Vista (Service Pack 1 or later), Windows XP (Service Pack 3), Windows Server 2008 R2, Windows Server 2008, and Windows Server 2003 (Service Pack 1 or later).\r\nAlthough its possible to configure some of these settings in other ways, EMET offers a straightforward, clean interface that works identically across multiple Windows versions. Its not a magic bullet, but it is an extremely potent addition to a thorough, in-depth approach to Windows security.\r\nEMET gives you more granular control over Data Execution Prevention (DEP), a security feature that has been a part of Windows since XP Service Pack 2. Hardware-enforced DEP blocks the execution of code in memory locations that should contain only data, such as the stack or the heap, preventing a common form of exploit. Using EMET, you can turn on DEP for applications that were not originally compiled to be compatible with the feature. (For more on how DEP works, see the two-part Understanding DEP as a mitigation technology series on the Microsoft Security Research & Defense blog: Part 1, Part 2).\r\nYou can also use EMET to overcome a limitation of Address Space Layout Randomization (ASLR). This feature is designed to prevent attackers from jumping to predictable memory addresses to exploit vulnerabilities in code. The problem with ASLR is that it works on a per-process basis; dynamic-link libraries (DLLs) associated with that process can still be located at predictable addresses, where vulnerabilities can be exploited. Thats the attack vector used in the unpatched zero-day vulnerability I mention at the beginning of this post. EMET supports mandatory ASLR, which forces the relocation of DLLs associated with a process and thus blocks this entire class of exploits.\r\nOther features in EMET mitigate against common tricks that hackers use to exploit flaws in code, by blocking common heap spraying techniques and validating exceptions before calling an exception handler.\r\nThe EMET documentation acknowledges that these are stopgap fixes:\r\n Please note this is a pseudo mitigation designed to break current exploit techniques. It is not designed to break future exploits as well. As exploit techniques continue to evolve, so will EMET.\r\nIn fact, thats one of the promises of EMET. It exists outside the Windows code base, so it can be updated more aggressively. As the official users guide explains:\r\n EMET is a living tool designed to be updated as new mitigation technologies become available. This provides a chance for users to try out and benefit from cutting edge mitigations. The release cycle for EMET is also not tied to any product. EMET updates can be made dynamically as soon as new mitigations are ready.\r\nEMET is distributed as a very small (4.7MB) installer and can be downloaded here. On the next page, I walk you through some of the basics of installation and setup.\r\nInstalling Microsofts Enhanced Mitigation Experience Toolkit (EMET) is straightforward for individual Windows PCs, although Microsoft acknowledges that the current version is not convenient to deploy in an enterprise setting. On Windows XP and Windows Server 2003, you must first ensure that the Microsoft .NET Framework 2.0 is installed. There are no prerequisites for other supported Windows versions.\r\nFor a step-by-step illustrated walkthrough, see the accompanying image gallery.\r\nAfter downloading the installer package, log on using an administrator account and run EMET Setup.msi. A restart is not required. Then open the EMET application using its Start menu shortcut.\r\nThe EMET interface is divided into two parts. The top shows the system status; the bottom shows a list of running processes and whether they are currently running with EMET enabled.\r\nYou can use EMET to adjust systemwide security settings. Click Configure System to display the dialog box shown here. You can configure any of the three settings individually or use the drop-down menu at the top to apply preconfigured groups of settings.\r\nAlthough it sounds tempting, I dont recommend the Maximum Security Settings option for Windows 7. Thats especially true in a business setting, where compatibility issues can have financial consequences. For Windows XP, however, this option does make sense. Your XP options are more limited, because XP doesnt support SEHOP or ASLR. Enabling DEP universally on XP is a smart idea.\r\nMost zero-day threats attack commonly used Internet-facing applications, such as Internet Explorer add-ons, Adobe Acrobat and Reader, Apple QuickTime, and so on. To tighten security on one of these individual programs, click Configure Apps.\r\nClick Add and then browse to the location of the executable file associated with that program. For the default 32-bit versions of Internet Explorer, this is C:Program FilesInternet ExplorerIexplore.exe [on 64-bit Windows installations, this file is in the Program Files (x86) folder]. For Adobe Reader, start in Program Files [or Program Files (x86) on a 64-bit Windows system]; the executable file, AcroRd32.exe, is typically in the AdobeReader subfolder (this folder name might include a version number as well).\r\nAfter you add an executable file, it appears in the Application Configuration dialog box, shown here, where you can enable or disable specific mitigations. By default, all options for a given process are selected.\r\nTo view the security status of programs, open the main EMET UI and look in the Running Processes list. If youve just added a program, you might have to close and restart it, then click the Refresh button to the right of the Running Processes heading. Click the Running EMET heading to sort the list so that all EMET-enabled apps are grouped together.\r\nIm interested in hearing feedback from readers who use EMET? Have you noticed specific compatibility issues? Have you checked specific exploits with and without EMET enabled? Leave your comments in the Talkback section or send me an e-mail using the Contact link in my bio, at the bottom of this post.','The One Security Tool Every Windows User Should Know About','tools applications','',18,15,0,0,1,1638,'2023-09-09'),(50,'[Collation]\r\nTo change the default character set and collation of a table including those of existing columns (note the convert to clause):\r\n\r\nalter table convert to character set utf8mb4 collate utf8mb4_unicode_ci;\r\n\r\n[Reset auto increment to the lowest possible value]\r\nALTER TABLE tablename AUTO_INCREMENT = 1\r\n\r\n[rename Engine]\r\nALTER TABLE tablename ENGINE = INNODB;\r\n\r\n[Single Add]\r\nALTER TABLE `equipment` ADD `hp` SMALLINT NOT NULL AFTER `price`;\r\n\r\n[Add Multiple Fields] \\\' the field before this was interstate.\r\nALTER TABLE warehouse \r\n ADD fire_protection tinyint(4) NOT NULL default \\\'0\\\' AFTER interstate,\r\n ADD fire_water tinyint(4) NOT NULL default \\\'0\\\' AFTER fire_protection,\r\n ADD fire_inertgas tinyint(4) NOT NULL default \\\'0\\\' AFTER fire_water,\r\n ADD fire_CO2 tinyint(4) NOT NULL default \\\'0\\\' AFTER fire_inertgas; \r\n\r\n[rename fields]\r\nExample:\r\nTo rename a column named prod_name to product_full_name while keeping its data type as VARCHAR(100) and NOT NULL constraint:\r\n\r\nALTER TABLE lastbackup CHANGE COLUMN table_folder source VARCHAR(75) NOT NULL;\r\nALTER TABLE lastbackup CHANGE COLUMN database_name source_from VARCHAR(30) NOT NULL;\r\n\r\n\r\n\r\n\r\nALTER TABLE `eqMaintenance` CHANGE `filter2id` `filter_options` varchar(60) \r\n\r\n\r\n\r\nRENAME TABLE current_db.tbl_name TO other_db.tbl_name;\r\n\r\nALTER TABLE orders\r\n ADD `responsecode` tinyint(4) NOT NULL default \\\'0\\\',\r\n ADD `responsesubcode` tinyint(4) NOT NULL default \\\'0\\\',\r\n ADD `reasoncode` tinyint(4) NOT NULL default \\\'0\\\',\r\n ADD `reasontext` varchar(255) NOT NULL default \\\'\\\',\r\n ADD `authcode` varchar(20) NOT NULL default \\\'\\\',\r\n ADD `avscode` varchar(5) NOT NULL default \\\'\\\',\r\n ADD `transid` tinyint(4) NOT NULL default \\\'0\\\';\r\n\r\n[EMPTY TABLE]\r\nTRUNCATE TABLE table','Alter Tables','add field delete alter table rename update table auto increment engine collation','',11,12,0,0,1,1770,'2023-09-09'),(51,'Personally, I don\\\'t like the Categories view of Control Panel; I always immediately switch back to the \\\"Classic\\\" Control Panel view. But some folks find the categorization useful - yet don\\\'t necessarily agree that Microsoft has put everything into the right category. Well, if you\\\'re brave enough to venture into the registry, you can actually assign a different category to a Control Panel item. Here\\\'s how: \r\n\r\nIn your registry editor, navigate to the following key: HKEY_LOCAL_MACHINE \\\\ SOFTWARE \\\\ Microsoft \\\\ Windows \\\\ CurrentVersion \\\\ Control Panel \\\\ Extended Properties \\\\ {305CA226-D286-468e-B848-2B2E8E697B74} 2 \r\nNow in the right pane, find the item that you want to recategorize. Double click it to bring up its properties box. \r\nChange the DWORD value to the number that corresponds to the category where you want to place it. See the list below for the numbers for each category. \r\nOther Control Panel Options - 0 \r\nAppearance and Themes - 1 \r\nPrinters and other Hardware - 2 \r\nNetwork and Internet Connections - 3 \r\nSounds, Speed and Audio Devices - 4 \r\nPerformance and Maintenance - 5 \r\nDate, Time, Language and Regional Options - 6 \r\nAccessibility Options - 7 \r\nAdd or Remove Programs - 8 \r\nUser Accounts - 9','How To Change The Categories Arrangement In Control Panel','classic view control panel','',18,3,0,0,1,1601,'2023-09-09'),(52,'The old way to center a table was easy: \r\n\r\n
\r\n ...\r\n
\r\nThe \"align\" attribute has been deprecated, however, in favor of CSS (Cascading Style Sheets), and this is a good thing. However, it\'s not so obvious how to center a table using CSS. \r\n\r\nThe obvious way might appear to use the CSS \"text-align: center;\" somewhere, maybe like one of these: \r\n\r\n
\r\nOR \r\n\r\n
\r\n
\r\n ...\r\n
\r\n
\r\nOR, if you get really desperate, \r\n\r\n \r\n
\r\n ...\r\n
\r\n \r\nNone of these will work. The table itself will be left-aligned, but all the content in the table cells will be centered. \r\n\r\nWhy? Because \"text-align\" applies to inline content, not to a block-level element like \"table\". \r\n\r\nMethod 1 \r\n\r\nTo center a table, you need to set the margins, like this: \r\n\r\n table.center {margin-left:auto; margin-right:auto;}\r\nAnd then do this: \r\n\r\n
\r\n ...\r\n
\r\nAt this point, Mozilla and Opera will center your table. Internet Explorer 5.5 and up, however, needs you to add this to your CSS as well: \r\n\r\n body {text-align:center;}\r\nMethod 2 \r\n\r\nIf you want your table to be a certain percentage width, you can do this: \r\n\r\n table#table1 {width:70%; margin-left:15%; margin-right:15%;}\r\nAnd then in your HTML/XHTML, you would do this: \r\n\r\n
\r\n ...\r\n
\r\nNote that I was using an id to describe the table. You can only use an id once on a page. If you had many tables on a page that you wanted to be the same width and centered, you would do this in your CSS: \r\n\r\n table.center {width:70%; margin-left:15%; margin-right:15%;}\r\nAnd this in your HTML: \r\n\r\n
\r\n ...\r\n
\r\n
\r\n ...\r\n
\r\nMethod 3 \r\n\r\nIf you want your table to be of fixed width, define your CSS like this: \r\n\r\n div.container {width:98%; margin:1%;}\r\n table#table1 {text-align:center; margin-left:auto; margin-right:auto; width:100px;}\r\n tr,td {text-align:left;}\r\nSet \"width:100px\" to whatever width you need. \r\n\r\n\"text-align: center\" is there for Internet Explorer, which won\'t work without it. Unfortunately, \"text-align: center\" will center all the text inside your table cells, but we counter that by setting \"tr\" and \"td\" to align left. \r\n\r\nIn your HTML, you would then do this: \r\n\r\n
\r\n
\r\n ...\r\n
\r\n
\r\nOnce again, I\'m using an id. If you need to center several tables the same way, use a class instead of an id.','Centering A Table','center table','',4,3,0,0,1,1744,'2023-09-09'),(53,'The Windows clipboard is where the text, graphics, etc. that you cut or copy reside, waiting for you to paste them to another location. In Windows XP, it was easy to view the contents of the clipboard with clipbrd.exe, but Microsoft removed that feature in Vista and Windows 7, due to security concerns. However, you can copy the file from an XP computer and install it on Vista or Windows 7. Here\\\'s how:\r\n \r\nOn the XP computer, right click Start, click Explore and navigate to: C: \\\\ Windows \\\\ System32 \r\nFind the file named clipbrd.exe and copy it to a USB thumb drive or a location on the network that\\\'s accessible to the Vista/Windows 7 computer. \r\n\r\nNow on the Vista/Windows 7 computer, copy it to that computer\\\'s System32 folder. Note: If you can\\\'t see the System32 folder, in Explorer first click Organize | Layout and check \\\"Menu Bar\\\" to display the menu bar, then click Tools | Folder Options, click the View tab, and under Advanced Settings, scroll down and check the option to \\\"Show hidden files, folders and drives.\\\" Then uncheck the option to \\\"Hide protected operating system drives (recommended) and click \\\"Yes\\\" when asked if you\\\'re sure you want to do this.','How To View The Contents Of The Clipboard','clipboard','',18,9,0,0,1,1855,'2023-09-09'),(54,'NOBR - no break\r\n\r\nDescription\r\n\r\nThe NOBR tag ensures that a line of text does not wrap to the next line. This tag is useful for words or phrases that must be kept together on one line. However, note that if the line of text is long, it can extend beyond the margin of the browser window, so the user must use scrollbars to view the text.\r\n\r\nSyntax\r\n\r\n....\r\n\r\nAttributes\r\n\r\nNo Attributes.\r\n\r\n tells browser not creeate space but do not break the phrase','Restricting Line Breaks','no line breaks','',3,3,0,0,1,1571,'2023-09-09'),(55,'function moveOn(field,nextFieldID,e){\r\n var unicode=e.keyCode? e.keyCode : e.charCode\r\n if(unicode!=39 && unicode!=37){\r\n if(field.value.length >= field.maxLength){\r\n document.getElementById(nextFieldID).focus();\r\n }\r\n }\r\n}\r\n\r\n\r\n -\r\n -\r\n \\\";','Move To Next Field Automatically When Textbox Is Full','auto move text box event keycode focus','',2,16,1,0,1,1542,'2023-09-09'),(56,'Have you ever tried to share a link to a website in a text, tweet, or message and wound up with a long ugly URL? Fortunately, there are many services that make it easy to shorten any URL (including your own web address) into an abbreviated URL that you can place into email, messages, websites, and social media posts. We\'ll show you how to use the best free options for shortening a URL on your computer, Android, iPhone, and iPad.\r\n\r\nURL shortening services like Bitly, TinyCC, and TinyURL can instantly shorten any URL to something that\'s more memorable and easy to share.\r\nMost URL shorteners allow you to create an account so you can update your destination links and track clicks.\r\n\r\nSeveral URL shorteners have paid options that allow you to link your domain name to create custom branded links.','Reduce Long Url To Short Url','short url','All',13,4,1,0,1,1468,'2023-09-09'),(57,'Many folks these days have more than one wi-fi network set up. You might have one that\\\'s connected to your Ethernet network and another that\\\'s entirely separate. That way, guests, the kids or others who don\\\'t need access to the wired network can connect to the second wi-fi network, which allows them to access the Internet. Your Windows 7 based wireless laptop will try to connect to those networks in the order in which they appear in its list of networks - which might or might not be the priority you prefer. The good news is that you can change the order of the wireless networks in your computer\\\'s wi-fi properties. Here\\\'s how: \r\n\r\nClick Start | Control Panel \r\nClick Network and Sharing Center \r\nIn the left pane, click Manage Wireless Networks \r\nIn the list of wi-fi networks, right click the one that you want Windows to try first, and select Move Up \r\nMove it up to the top of the list \r\nClick OK to close the dialog box\r\n \r\nNow Windows will try your top priority network first, which should make connection a tad faster.','How To Change The Wireless Network Priority','wireless network wi-fi','',18,15,1,0,1,1437,'2023-09-09'),(58,'QUESTION: \r\nI don\\\'t know if there\\\'s a way to have what I want but here goes. I had some custom icons on my desktop that I really liked. I changed to a different theme and it changed those icons too. Is there a way to apply the new theme but keep my custom icons? Just curious. - Elton D. \r\n\r\nANSWER: \r\nLuckily, this is an easy fix. Right click an empty space on the desktop and select Personalize. Over in the left pane of the dialog box, click Change Desktop Icons. Now down at the bottom of that dialog box, uncheck the box that says \\\"Allow themes to change desktop icons.\\\"','New Theme Changed My Icons','themes icons desktop','',18,3,1,0,1,1765,'2023-09-09'),(59,'You want to change your desktop background (wallpaper) to something else. That\\\'s simple enough, right? But sometimes you might encounter this situation: when you try to do it through Control Panel (Appearance and Personalization | Change Desktop Background), the check boxes aren\\\'t selected when you click them and the Select All and Clear All buttons don\\\'t work, either. So you try to right click a picture in Explorer and choose Set as Desktop Background, but you get a message saying the image can\\\'t be set as wallpaper because an internal error occurred. What\\\'s going on here? Well, there are actually several issues that can cause this problem. You\\\'ll find methods for resolving them in KB article 2504610 at \r\nhttp://www.win7news.net/R3JAT1/110217-MS-Support-2504610','Unable To Change Desktop Background In Windows 7','background wallpaper','',18,3,0,0,1,1256,'2023-09-09'),(60,'To fix this problem, use the following methods in the order in which they are listed. After each method, check the USB device to see whether the problem is fixed. If the problem is not fixed, try the next method. \r\n\r\nThis article also includes a workaround that you can try if these methods do not work. \r\nBack to the top\r\nMethod 1: Use Device Manager to scan for hardware changes\r\nUse Device Manager to scan for hardware changes. After your computer scans for hardware changes, it might recognize the USB device that is connected to the USB port so that you can use the device.\r\n\r\nTo scan for hardware changes, follow these steps:\r\nClick Start, and then click Run.\r\n\r\nNote If you are running Windows Vista, click Start, and then use the Start Search box.\r\nType devmgmt.msc, and then click OK. Device Manager opens.\r\nIn Device Manager, click your computer so that it is highlighted.\r\nClick Action, and then click Scan for hardware changes.\r\nCheck the USB device to see whether it is working.\r\nIf scanning for hardware changes fixed the problem, you are finished. If this method did not fix the problem, go to Method 2.\r\nBack to the top\r\nMethod 2: Restart the computer\r\nIf scanning for new hardware did not fix the problem, try restarting the computer. After the computer has restarted, check the USB device to see whether it is working.\r\n\r\nIf restarting the computer fixed the problem, you are finished. If this method did not fix the problem, go to Method 3.\r\nBack to the top\r\nMethod 3: Disable and re-enable the USB controller\r\nUse Device Manager to disable and re-enable all the USB controllers. This lets the controllers recover the USB port from its unresponsive condition. The USB controllers represent the USB ports in Device Manager. If you are not comfortable with advanced troubleshooting, try the steps in the \"Workaround\" section.\r\n\r\nTo disable and re-enable the USB controllers, follow these steps:\r\nClick Start, and then click Run.\r\n\r\nNote If you are running Windows Vista, click Start, and then use the Start Search box.\r\nType devmgmt.msc, and then click OK. Device Manager opens.\r\nExpand Universal Serial Bus controllers. \r\n\r\nNote You might have to scroll down the list to find this item.\r\nRight-click the first USB controller under Universal Serial Bus controllers, and then click Uninstall to remove it.\r\nRepeat step 4 for each USB controller that is listed under Universal Serial Bus controllers.\r\nRestart the computer. After the computer starts, Windows will automatically scan for hardware changes and reinstall all the USB controllers that you uninstalled.\r\nCheck the USB device to see whether it is working.\r\nIf the USB port recognizes the device and if you can use the device, you are finished.\r\n\r\nIf this method fixed the problem, you are finished. If this method did not fix the problem, go to the \"Workaround\" section. \r\n\r\nBack to the top\r\nWorkaroundIf none of these methods worked for you, you can disable the Selective Suspend f...If none of these methods worked for you, you can disable the Selective Suspend feature. However, be aware that when the Selective Suspend feature is disabled, all USB host controller drivers (and therefore all USB ports and connected USB devices) in the system are affected. Therefore, your computer cannot suspend any USB devices that are connected to it, and the USB devices can continue to use power while connected to the computer. Additionally, the Allow the computer to turn off this device to save power check box does not appear on the Power Management tab for the USB Root Hub.\r\n\r\nTo have us disable the Selective Suspend feature for you, go to the \"Fix it for me\" section. If you would rather do this yourself, and you are comfortable with advanced troubleshooting, go to the \"Let me fix it myself\" section.\r\n\r\nBack to the top\r\nFix it for me\r\nTo fix this problem automatically, click the Fix this problem link. Then click Run in the File Download dialog box, and follow the steps in this wizard. \r\n\r\n\r\nFix this problem \r\nMicrosoft Fix it 50052\r\n\r\n\r\nNote this wizard may be in English only; however, the automatic fix also works for other language versions of Windows. \r\n\r\nNote If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem. \r\n\r\n\r\nBack to the top\r\nLet me fix it myself\r\nThis section is intended for an advanced computer user. \r\n\r\nYou can disable the USB Selective Suspend feature as a workaround by editing the registry. The USB device may become unresponsive because of a race condition in the Selective Suspend feature. The Selective Suspend feature suspends the USB device to efficiently maintain battery power by enabling the computer to turn off the USB device. However, sometimes this feature may not correctly wake up the USB device. Therefore, the USB device is unresponsive when you try to use it. \r\n\r\nYou might want to disable this feature for server products where power management is not important or required. \r\n\r\nImportant This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base: \r\n322756 (http://support.microsoft.com/kb/322756/ ) How to back up and restore the registry in Windows\r\nTo disable the Selective Suspend feature, follow these steps:\r\nClick Start, and then click Run.\r\n\r\nNote If you are running Windows Vista, click Start, and then use the Start Search box.\r\nType regedit, and then click OK. Registry Editor opens.\r\nLocate and then click the following registry subkey: \r\nHKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\USB\r\nIf the DisableSelectiveSuspend registry entry is present, double-click it. If it is not present, create the entry. To create the entry, follow these steps:\r\nOn the Edit menu, point to New, and then click DWORD. \r\nType DisableSelectiveSuspend, and then press ENTER. \r\nOn the Edit menu, click Modify.\r\nIn the Value data field, type 1 to disable the Selective Suspend feature, and then click OK. \r\nNow go to the \"Did this fix the problem?\" section.\r\nBack to the top\r\nDid this fix the problem?Check whether the problem is fixed. If the problem is fixed, you are finished wi...Check whether the problem is fixed. If the problem is fixed, you are finished with this article. If the problem is not fixed, you can contact support (http://support.microsoft.com/contactus) .\r\nBack to the top\r\nCauseThis problem may occur because of a timing issue that prevents the computer from...This problem may occur because of a timing issue that prevents the computer from detecting the USB device.\r\n\r\nMicrosoft and the hardware vendors that manufacture the chips that are used for USB have investigated the problem. However, the results were inconclusive because of the intermittent nature of the problem.','USB Port May Stop Working After You Remove Or Insert A USB Device','usb port inactive','',18,7,0,0,1,1752,'2023-09-09'),(61,'
You can make your various Windows 7 computers (such as a desktop and a laptop) work better together by linking them all to your Windows Live ID. Here\\\'s how you do it: \r\n
\r\nOn each Windows 7 computer, click Start | Control Panel \r\n
Click the User Accounts applet \r\n
In the left pane, click \\\"Link online IDs\\\" \r\n
Click \\\"Add on online ID provider\\\" at the bottom of the page \r\n
In the web page that opens in your web browser, select the \\\"Windows Live\\\" logo \r\n
In the new web page that opens, download and install the Windows Live ID Sign-in Assistant \r\n
Back in the Control Panel | User Accounts | Link Online IDs dialog box, click \\\"Add linked ID\\\" and provide your logon credentials in the box that appears \r\n
Click the \\\"Sign in\\\" button \r\n
\r\n
This will allow others in a homegroup to share files with you, without creating a user account for you on their computers, and it will enable you to use the online ID to access files on your computer from another computer.','How To Link Your Windows 7 User Account With Your Windows Live ID','file sharing network','',18,17,1,0,1,1611,'2023-09-09'),(62,'
System Restore can be a lifesaver - but only if you have a restore point when you need it. What if you restart the computer and find that your restore points are now gone? You can create new ones - but if you restart the system again, poof! They disappear, too! What\\\'s up with that? Well, it might be that the maxium storage size limit for shadow storage is set too low. Find out how to fix it, in KB article 2506576.
\r\n\r\nTo resolve this issue, adjust the maximum shadow storage allocation. To do this, follow the steps listed below:\r\n\r\nClick Start, type System in the Search box and then click System from the list under Control panel\r\nClick System protection in the task pane\r\nUnder Protection Settings click to select Local Disk (C:) (System) and then click Configure\r\nUnder Disk Space Usage, move the Max Usage slider to the right to increase the disk space usage for System Restore points\r\n\r\nNote: If protection is turned on for additional drives you might consider increasing the Max Usage for those drives as well.\r\n\r\n\r\nBack to the top\r\nMORE INFORMATIONWhen the issue happens, one or more of the following events might be logged in t...When the issue happens, one or more of the following events might be logged in the Event log:\r\n\r\nEvent ID 25:\r\n\r\nThe shadow copies of volume C: were deleted because the shadow copy storage could not grow in time. Consider reducing the IO load on the system or choose a shadow copy storage volume that is not being shadow copied.\\\"\r\n\r\nEvent ID 22:\r\n\r\nVolume Shadow Copy Service error: A critical component required by the Volume Shadow Copy service is not registered. This might happened if an error occurred during Windows setup or during installation of a Shadow Copy provider. The error returned from CoCreateInstance on class with CLSID {e579ab5f-1cc4-44b4-bed9-de0991ff0623} and Name IVssCoordinatorEx2 is [0x80040154, Class not registered]. \r\n\r\nEvent ID 8193:\r\n\r\nVolume Shadow Copy Service error: Unexpected error calling routine CoCreateInstance. hr = 0x80040154, Class not registered.\r\n\r\nTo increase the size of shadow storage using command prompt commands follow these steps:\r\n\r\nOpen a command prompt with administrative privileges\r\nAt the command prompt type Vssadmin list shadowstorage\r\nTake note of what the shadow storage allocation is on the drive you\\\'re having issues with\r\nChange the allocation by using the Vssadmin command, syntax: vssadmin resize shadowstorage /On=C: /For=C: /Maxsize=1G (where Maxsize=the amount of disk space you\\\'ve allocated to System Restore points, you should increase it larger)\r\nThen reboot your computer\r\n\r\nRestore point deletion can also be caused by the following:\r\n\r\nSome 3rd party disk applications like Diskeeper can cause restore points to be deleted. To test for this issue disable these types of applications to see if it can resolve the problem.\r\nCorrupted ACLs for pagefiles.sys and hiberfil.sys can also cause the issue. To test for this issue, disable pagefile and hiberfil on your system, defrag the drive to verify that these files have been deleted and then enable pagefile and hiberfil. Reboot the computer and create restore points and verify that restore points are not deleted over the next few days.\r\nSystems with a dual boot with Windows XP will also cause system restore points to be deleted. See KB 926185 (http://support.microsoft.com/kb/926185) for more details.','System Restore Points Are Deleted When You Restart Your Windows 7 Comp','system restore points delete','',18,9,0,0,1,5196,'2023-09-09'),(63,'convert a date into a string\r\n$dateString = strval($paid_date[$value]);\r\n\r\n\r\nFind postion of something:\r\nstrpos($string,$character,$offset);\r\n\r\nHtml tags REMOVE:\r\n$allowTheseTags=\\\"List all tags allowed\\\"\r\necho strip_tags($text, \\\'$allowTheseTags\\\');\r\n\r\nLength of:\r\nstrlen($string)\r\n\r\nLower and Upper Case:\r\n$stringnew=strtolower($string); $stringnew=strtoupper($string);\r\n\r\n
Replace something with something else:
\r\n$longadd=str_replace(chr(13),\\\' \\\',$longadd);\r\n\r\n\r\n$string = \"The quick brown fox jumps over the lazy dog.\";\r\n$search = array(\"\",\"