Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

123

Wednesday, October 31, 2018

History Of PHP

The History Of Php  PHP is an "HTML-embedded scripting language" primarily used for dynamic Web applications. The first part of this definition means that PHP code can be interspersed with HTML, making it simple to generate dynamic pieces of Web pages on the fly. As a scripting language, PHP code requires the presence of the PHP processor. PHP code is normally...

Sunday, October 28, 2018

Create a MySQL Database Using MySQLi and PDO

The following examples create a database named "myDB": <?php $servername = "localhost"; $username = "username"; $password = "password"; // Create connection$conn = new mysqli($servername, $username, $password); // Check connectionif ($conn->connect_error) {     die("Connection failed: " . $conn->connect_error); }  // Create database$sql = "CREATE DATABASE myDB"; if ($conn->query($sql)...

Saturday, October 27, 2018

Php Mysql Login Video Tutorial

...

Simple Login with php & mysql

Creating the Database Table:- Execute the following SQL query to create the users table inside your MySql database. CREATE TABLE users ( id INT NOT NULL PRIMARY KEY AUTO_INCREMENT, username VARCHAR(50) NOT NULL UNIQUE, password VARCHAR(255) NOT NULL, created_at DATETIME DEFAULT CURRENT_TIMESTAMP ); create config.php :- <?php define('DB_SERVER', 'localhost'); define('DB_USERNAME', 'root'); define('DB_PASSWORD', ''); define('DB_NAME',...

MySql vs MySqli

Basically, MySQL is the old database driver, and MySQLi is the Improved driver. The "i" stands for "improved" so it is MySQL improved. MySQLi can be done procedural and object-oriented whereas MySQL can only be used procedurally. Mysqli also supports prepared statements which protect from SQL Injection. MySQL extension added in PHP version 2.0. and deprecated as of PHP...

Cyber Attack

What is Cyber Attack ? A cyber attack is a malicious act by persons, groups or organizations against a computer system that is intended to destroy or damage it, fool it or take control of it in order to carry out illegitimate operations or steal data. A cyber attack can be against a computer, a server, peripherals (printers, external hard drives) or mobile communication...

Welcome To My Blog

                                                                                  Welcome EveryOne... This is my Blog. My Name is Mainak Parui. I am a 26 years old...