In Feburary 2016 11,
Open your FTP software and log into your Web hosting account. The root directory of your Web hosting account will launch.
Locate the directory on the Web server that you want to change.
Right-click on the directory and click on 'Properties,' or 'File Permissions' in some cases, then identify the current chmod permissions in the appropriate text field. The permissions will be expressed with three digits, such as '644,' '755,' or '777,' for example.
Go to the Page Resource website (see Resources) and look at the permission numbers. Directories and files are typically assigned the following permissions: '644,' '755,' or '777,' the latter of which is known as 'world writable,' meaning that all users will have access. Confirm the changes.
Exit the FTP application.
In Feburary 2016 11,
Showing posts with label cases. Show all posts
Showing posts with label cases. Show all posts
Thursday, 11 February 2016
Tuesday, 9 February 2016
How Are Web Addresses Constructed?In Feburary 2016 09,
In Feburary 2016 09,
When a user types a web address, she may start the address with the characters 'http://' or 'https://.' These characters indicate the protocol the web browser will use to access the address following the slashes. Most web addresses use the protocol indicator http://,' which indicates that the page will be accessed with Hypertext Transfer Protocol (HTTP); the colon and slashes serve as a separator between the protocol and the beginning of the web address. Also common on the World Wide Web, though not as common as HTTP, is 'https://' or Hypertext Transfer Protocol-Secure. Other protocol indicators might include 'ftp://' for File Transfer Protocol (FTP) or 'telnet://' for data transfer using the text-only Telnet protocol.
The Subdomain
The first several letters immediately following the protocol indicator and slashes indicates the subdomain being accessed on the web server. In most cases, the subdomain is 'www,' which loads the index page in the root directory or specified sub-directory of the server. The subdomain can be used to direct visitors to a specific application or page on the server, though, as is used by 'http://maps.google.com/' for Google Maps or 'http://messenger.yahoo.com/' for the official Yahoo! Messenger site. In some cases, the subdomain may be absent entirely (for example, someone may type http://google.com/), and this omission loads the default page a visitor would get by using the 'www' prefix.
The Domain Name
The domain name is the meat of the web address, and usually serves as a plain text indicator of the destination address. Domain names are as varied as the users who create them and may even be in a number of different languages. Some examples of familiar domain names include Google (http://www.google.com/), Yahoo (http://www.yahoo.com/) or Apple (http://www.apple.com/). This portion of the web address must be unique when combined with the domain extension, as the domain name and extension are bound to the server Internet Protocol (IP) address for proper operation of the web service.
The Extension
The final part of a web address is the extension, usually a three-letter abbreviation that indicates the type of site being accessed. The oldest and most common top-level domain extensions are .com for commercial sites, .org for non-commercial organizations and .net for miscellaneous networks. Some additional domain extensions include .mil for military organizations, .gov for government sites, .edu for schools, and .mobi for web sites designed specifically for mobile use. More than 200 international extensions also exist--including .ca for Canadian sites, .uk for British sites, .cn for Chinese sites, and .ru for Russian sites--and a special .xxx extension has even been proposed for adult-themed web sites.
In Feburary 2016 09,
When a user types a web address, she may start the address with the characters 'http://' or 'https://.' These characters indicate the protocol the web browser will use to access the address following the slashes. Most web addresses use the protocol indicator http://,' which indicates that the page will be accessed with Hypertext Transfer Protocol (HTTP); the colon and slashes serve as a separator between the protocol and the beginning of the web address. Also common on the World Wide Web, though not as common as HTTP, is 'https://' or Hypertext Transfer Protocol-Secure. Other protocol indicators might include 'ftp://' for File Transfer Protocol (FTP) or 'telnet://' for data transfer using the text-only Telnet protocol.
The Subdomain
The first several letters immediately following the protocol indicator and slashes indicates the subdomain being accessed on the web server. In most cases, the subdomain is 'www,' which loads the index page in the root directory or specified sub-directory of the server. The subdomain can be used to direct visitors to a specific application or page on the server, though, as is used by 'http://maps.google.com/' for Google Maps or 'http://messenger.yahoo.com/' for the official Yahoo! Messenger site. In some cases, the subdomain may be absent entirely (for example, someone may type http://google.com/), and this omission loads the default page a visitor would get by using the 'www' prefix.
The Domain Name
The domain name is the meat of the web address, and usually serves as a plain text indicator of the destination address. Domain names are as varied as the users who create them and may even be in a number of different languages. Some examples of familiar domain names include Google (http://www.google.com/), Yahoo (http://www.yahoo.com/) or Apple (http://www.apple.com/). This portion of the web address must be unique when combined with the domain extension, as the domain name and extension are bound to the server Internet Protocol (IP) address for proper operation of the web service.
The Extension
The final part of a web address is the extension, usually a three-letter abbreviation that indicates the type of site being accessed. The oldest and most common top-level domain extensions are .com for commercial sites, .org for non-commercial organizations and .net for miscellaneous networks. Some additional domain extensions include .mil for military organizations, .gov for government sites, .edu for schools, and .mobi for web sites designed specifically for mobile use. More than 200 international extensions also exist--including .ca for Canadian sites, .uk for British sites, .cn for Chinese sites, and .ru for Russian sites--and a special .xxx extension has even been proposed for adult-themed web sites.
In Feburary 2016 09,
Wednesday, 3 February 2016
The Advantages Disadvantages of Proprietary OpenIn Feburary 2016 03,
In Feburary 2016 03,
Open-source database systems such as MySQL provide access to their source code. This means that anyone can see and edit the source code as well as using it in its compiled executable form. Proprietary databases tend to be closed source, so when you purchase a proprietary database system, for example Oracle or Microsoft Access, you are effectively purchasing the right to use the software rather than the software itself. Although the ability to access the source code used in a database system may not matter to the end user in many cases, it can affect the quality of the code because the open-source communities are able to report and in some cases fix bugs. Because an open-source database can be edited, organizations can alter it to suit their own particular needs.
Releases
Open-source systems tend to be updated more regularly than proprietary systems. This is partly because where proprietary systems are only accessed and worked on by a limited development team within the company responsible for the database product, open-source systems are worked on by an entire community, sometimes on a global scale. This means that bugs tend to be fixed faster and security issues addressed more promptly with open-source systems. Security vulnerabilities are also more visible with an open-source system than with a proprietary system, where only employees of the organization can view the code.
Costs
Proprietary database systems are charged at a commercial rate. Such rates vary for different types of account and usage. In most cases, an organization must purchase a license for each computer or account they plan on using the database system on. With an open-source database system, there is typically no cost and no restriction on the number of computers or users the database may be installed on or accessed by. The costs associated with proprietary database systems vary significantly for different system variants and account types. In some cases, the costs are so great that only large organizations can consider the database an option.
Support
Support is one of the few aspects sometimes considered an advantage with certain proprietary systems. With open-source database systems, support is usually not sourced from a single location or organization, but is sourced from the community as a whole. With a proprietary database system, customers can purchase a license with some level of support included. In such cases the customer can be more assured that the support they require will be made available to them on agreed terms, where the support with an open-source system may be less predictable.
In Feburary 2016 03,
Open-source database systems such as MySQL provide access to their source code. This means that anyone can see and edit the source code as well as using it in its compiled executable form. Proprietary databases tend to be closed source, so when you purchase a proprietary database system, for example Oracle or Microsoft Access, you are effectively purchasing the right to use the software rather than the software itself. Although the ability to access the source code used in a database system may not matter to the end user in many cases, it can affect the quality of the code because the open-source communities are able to report and in some cases fix bugs. Because an open-source database can be edited, organizations can alter it to suit their own particular needs.
Releases
Open-source systems tend to be updated more regularly than proprietary systems. This is partly because where proprietary systems are only accessed and worked on by a limited development team within the company responsible for the database product, open-source systems are worked on by an entire community, sometimes on a global scale. This means that bugs tend to be fixed faster and security issues addressed more promptly with open-source systems. Security vulnerabilities are also more visible with an open-source system than with a proprietary system, where only employees of the organization can view the code.
Costs
Proprietary database systems are charged at a commercial rate. Such rates vary for different types of account and usage. In most cases, an organization must purchase a license for each computer or account they plan on using the database system on. With an open-source database system, there is typically no cost and no restriction on the number of computers or users the database may be installed on or accessed by. The costs associated with proprietary database systems vary significantly for different system variants and account types. In some cases, the costs are so great that only large organizations can consider the database an option.
Support
Support is one of the few aspects sometimes considered an advantage with certain proprietary systems. With open-source database systems, support is usually not sourced from a single location or organization, but is sourced from the community as a whole. With a proprietary database system, customers can purchase a license with some level of support included. In such cases the customer can be more assured that the support they require will be made available to them on agreed terms, where the support with an open-source system may be less predictable.
In Feburary 2016 03,
Subscribe to:
Posts (Atom)