In Feburary 2016 29,
Select 'Tools' from inside the CMS program then click on 'User Permissions.'
Select 'ACD' or 'ACD Group' from the 'ACD' field depending on which type of user you need to create according to the company's IT policy.
Click on 'User Data' in the 'Operations' list, and then click 'OK.'
Fill in the user information for the user you are creating. Including user ID, user name, room number, telephone number, default printer, login type, maximum user count, maximum refresh rate and login ACD. Fields other than user ID and user name are optional. You enter the information that applies according to your company's IT policy for new accounts.
Select 'Actions' from the menu bar, and click on 'Add.' The user is added and can now log in to Avaya CMS.
In Feburary 2016 29,
Showing posts with label USER. Show all posts
Showing posts with label USER. Show all posts
Monday, 29 February 2016
Saturday, 27 February 2016
How to Replace a Substring in Oracle SQLIn Feburary 2016 27,
In Feburary 2016 27,
Sign in to SQLPlus.
Type a 'select' command using the 'replace' function and press 'enter':select string_column, replace(string_column, 'co.', 'company') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. In this case, 'co.' is the target and 'company' is the replacement.
Inspect the results to see the replacement. If the 'string column' contained 'abc co.', it should now be converted to 'abc company.'
Translate Function
Sign in to SQLPlus.
Type a 'select' command using the 'translate' function and press 'enter':select string_column, translate(string_column, 'abc', 'xyz') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. The phrase 'abc' is the 'fromlist', and 'xyz' is the 'tolist.'
Inspect the results to see the replacement. If 'string column' contained 'abc co.', it is converted to 'xyz zo.'
In Feburary 2016 27,
Sign in to SQLPlus.
Type a 'select' command using the 'replace' function and press 'enter':select string_column, replace(string_column, 'co.', 'company') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. In this case, 'co.' is the target and 'company' is the replacement.
Inspect the results to see the replacement. If the 'string column' contained 'abc co.', it should now be converted to 'abc company.'
Translate Function
Sign in to SQLPlus.
Type a 'select' command using the 'translate' function and press 'enter':select string_column, translate(string_column, 'abc', 'xyz') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. The phrase 'abc' is the 'fromlist', and 'xyz' is the 'tolist.'
Inspect the results to see the replacement. If 'string column' contained 'abc co.', it is converted to 'xyz zo.'
In Feburary 2016 27,
Labels:
case,
company,
data,
Enter,
representation,
retrieves,
string_column,
string_table,
Type,
USER
How to Find an IP Address With a Forum NameIn Feburary 2016 27,
In Feburary 2016 27,
Log into the forum as an administrator.
Enter the Tools section. Generally an 'Administrative Tools' link is on the top or left of the administrative page.
Click 'User Search.'
Enter the username and click 'Search.'
Click the username. The full user profile and all IP addresses with which the user has accessed the forum will be displayed.
Detecting the IP Address With Added PHP Code
Enter the file manager. Use either an FTP client or a Web-based file manager to access the forum files.
Edit the form post PHP file. After the global code definitions, add the following code:$userID = $_GET['userID']; //userIDif($userID == 'THE USER YOU SEEK'){$userIP = $_SERVER['REMOTE_ADDR']; //USER IP}
Enter further code to write the variable to the forum database. You will need administrative access to the database.
In Feburary 2016 27,
Log into the forum as an administrator.
Enter the Tools section. Generally an 'Administrative Tools' link is on the top or left of the administrative page.
Click 'User Search.'
Enter the username and click 'Search.'
Click the username. The full user profile and all IP addresses with which the user has accessed the forum will be displayed.
Detecting the IP Address With Added PHP Code
Enter the file manager. Use either an FTP client or a Web-based file manager to access the forum files.
Edit the form post PHP file. After the global code definitions, add the following code:$userID = $_GET['userID']; //userIDif($userID == 'THE USER YOU SEEK'){$userIP = $_SERVER['REMOTE_ADDR']; //USER IP}
Enter further code to write the variable to the forum database. You will need administrative access to the database.
In Feburary 2016 27,
Thursday, 25 February 2016
PHP Mkdir Permission Does Not WorkIn Feburary 2016 25,
In Feburary 2016 25,
The list of permissions you supply to the 'mkdir' function are valid only on Linux-based file systems. This means you cannot associate permissions with a directory you create under Windows. If you pass permissions with the 'mkdir' function under Windows, PHP simply ignores them.
Default User Account
Remember that a script run on a Web server from a browser runs under the default user account on the Web server such as 'www-data,' not under your user account. If directory permissions are not working, it may be because you are testing a script under your account instead of the default user account. You can test the script as the default user by typing 'su www-data' and exploring the directory permissions assigned to that user.
Directory Mask
If the resulting permissions of a new directory are different from what you passed, it may be because of a directory mask applied to the permissions. The mask is maintained by the Web server, not by PHP. To circumvent the mask, use the 'umask' function to set the mask to zero, create the directory using 'mkdir' and change the directory permissions using the 'chmod' function. For example:
$save = umask(0);
if (mkdir($newdir)) chmod($newdir, 0755);
umask($save);
?>
Recursive Assignment
The 'mkdir' function takes a second optional argument that creates nested directories recursively. When you assign directory permissions recursively, the permissions may not be executed in the proper order and you might get different results from what you expected. To ensure the proper order, use the 'chmod' function to assign directory permissions to the new directory after you create it with the 'mkdir' function. For example:
if (mkdir($newdir, 0755, true)) chmod($newdir, 0755);
?>
In Feburary 2016 25,
The list of permissions you supply to the 'mkdir' function are valid only on Linux-based file systems. This means you cannot associate permissions with a directory you create under Windows. If you pass permissions with the 'mkdir' function under Windows, PHP simply ignores them.
Default User Account
Remember that a script run on a Web server from a browser runs under the default user account on the Web server such as 'www-data,' not under your user account. If directory permissions are not working, it may be because you are testing a script under your account instead of the default user account. You can test the script as the default user by typing 'su www-data' and exploring the directory permissions assigned to that user.
Directory Mask
If the resulting permissions of a new directory are different from what you passed, it may be because of a directory mask applied to the permissions. The mask is maintained by the Web server, not by PHP. To circumvent the mask, use the 'umask' function to set the mask to zero, create the directory using 'mkdir' and change the directory permissions using the 'chmod' function. For example:
$save = umask(0);
if (mkdir($newdir)) chmod($newdir, 0755);
umask($save);
?>
Recursive Assignment
The 'mkdir' function takes a second optional argument that creates nested directories recursively. When you assign directory permissions recursively, the permissions may not be executed in the proper order and you might get different results from what you expected. To ensure the proper order, use the 'chmod' function to assign directory permissions to the new directory after you create it with the 'mkdir' function. For example:
if (mkdir($newdir, 0755, true)) chmod($newdir, 0755);
?>
In Feburary 2016 25,
Saturday, 20 February 2016
How to Create a Custom Button in PHPIn Feburary 2016 20,
In Feburary 2016 20,
Right-click the PHP file you want to edit and select 'Open With.' Click the PHP editor you prefer to use and click 'Open' to open the file code.
Create the PHP customized button. You must include the button HTML, button name and the value shown to the user. The following code creates a button named 'php_button' and assigns it to the '$button' variable:$button = '
';
Display the button on the page using the 'echo' command. The following code prints out the button to your Web page:echo $button;
Save the changes and run the new code in your PHP debugger. You must upload the page to your host provider for the changes to take effect on the website.
In Feburary 2016 20,
Right-click the PHP file you want to edit and select 'Open With.' Click the PHP editor you prefer to use and click 'Open' to open the file code.
Create the PHP customized button. You must include the button HTML, button name and the value shown to the user. The following code creates a button named 'php_button' and assigns it to the '$button' variable:$button = '
';
Display the button on the page using the 'echo' command. The following code prints out the button to your Web page:echo $button;
Save the changes and run the new code in your PHP debugger. You must upload the page to your host provider for the changes to take effect on the website.
In Feburary 2016 20,
Monday, 15 February 2016
How to Create a Joomla Web SiteIn Feburary 2016 15,
In Feburary 2016 15,
Log in to your website's administrative panel and locate the Fantastico icon, which is usually a smiley face. Click this icon to begin the Joomla installation process.
From the main Fantastico Web page, locate and click on the Joomla 1.5 hot link and select the new Joomla installation option.
By default, a new installation will assume that you will be installing Joomla into the root directory of your website (www.yoursite.com), which is usually the case. If your requirements dictate a different directory, the process does allow you to do so easily.
Assign an administrator user name and password. These credentials will be used to log in to the back end of the website, where most of the work will take place (www.yoursite.com/administrator).
Assign the administrator email address, administrator full name and the name of your website. This information can all be changed later if needed.
Lastly, you are presented an option to install sample data. If you lack Joomla experience, the sample data will be invaluable to help you learn where everything is, what it does, and how it was configured. Then, click the Install button.
Experiencing Joomla
Once Joomla has been properly installed using Fantastico, navigate to the administrative side of your new Joomla site. Open a browser to your website address followed by /administrator (i.e., http://www.yoursitename.com/administrator). Log in with your administrative credentials created during the installation.
From the control panel, explore the Global Configuration area, where you can set the global site meta description and keywords used by search engines to find your website. Configure the search engine optimization settings as appropriate.
Visit the Article Manager and open the various sample pages created from the sample data installation. Note the section, category, and access level settings specifically. Create new sections and categories as required. Modify the viewing access levels on some articles.
Explore the User Manager. Create and modify user accounts and their respective viewing permissions. Log in with one of the new accounts you create. Note which articles you can view with one or more new accounts.
Delve into the Menu Manager by editing existing sample menu items as well as creating new ones. Create a new menu and attach pages, sections and categories to it.
Review the Media Manager and note where and in what format your images can be stored.
In Feburary 2016 15,
Log in to your website's administrative panel and locate the Fantastico icon, which is usually a smiley face. Click this icon to begin the Joomla installation process.
From the main Fantastico Web page, locate and click on the Joomla 1.5 hot link and select the new Joomla installation option.
By default, a new installation will assume that you will be installing Joomla into the root directory of your website (www.yoursite.com), which is usually the case. If your requirements dictate a different directory, the process does allow you to do so easily.
Assign an administrator user name and password. These credentials will be used to log in to the back end of the website, where most of the work will take place (www.yoursite.com/administrator).
Assign the administrator email address, administrator full name and the name of your website. This information can all be changed later if needed.
Lastly, you are presented an option to install sample data. If you lack Joomla experience, the sample data will be invaluable to help you learn where everything is, what it does, and how it was configured. Then, click the Install button.
Experiencing Joomla
Once Joomla has been properly installed using Fantastico, navigate to the administrative side of your new Joomla site. Open a browser to your website address followed by /administrator (i.e., http://www.yoursitename.com/administrator). Log in with your administrative credentials created during the installation.
From the control panel, explore the Global Configuration area, where you can set the global site meta description and keywords used by search engines to find your website. Configure the search engine optimization settings as appropriate.
Visit the Article Manager and open the various sample pages created from the sample data installation. Note the section, category, and access level settings specifically. Create new sections and categories as required. Modify the viewing access levels on some articles.
Explore the User Manager. Create and modify user accounts and their respective viewing permissions. Log in with one of the new accounts you create. Note which articles you can view with one or more new accounts.
Delve into the Menu Manager by editing existing sample menu items as well as creating new ones. Create a new menu and attach pages, sections and categories to it.
Review the Media Manager and note where and in what format your images can be stored.
In Feburary 2016 15,
Labels:
address,
administrator,
changed,
Email,
full,
information,
Lastly,
needed,
place,
USER
Sunday, 14 February 2016
Access 2007 Automatic BackupIn Feburary 2016 14,
In Feburary 2016 14,
Access 2007's included backup feature saves a copy of the currently active database. To open this feature, click the 'Office' button. Highlight 'Manage' and click on 'Back Up Database.' The program will prompt you to choose a backup location and file name.
Automatic Backup
For users who need automatic backup, Windows includes a tool for backing up the specified data on a user-defined schedule. Type 'Backup and Restore' into the 'Start' menu search to open this feature in Windows 7 or Vista. In XP, click the 'Start' menu and navigate to the 'Accessories/System Tools' folder, then click on 'Backup.'
Other Options
Third-party backup programs also work with Access 2007 database files, and may offer additional options, such as online storage. Some computer manufacturers include backup software with new systems, such as the HP Backup and Recovery Manager or Dell DataSafe.
In Feburary 2016 14,
Access 2007's included backup feature saves a copy of the currently active database. To open this feature, click the 'Office' button. Highlight 'Manage' and click on 'Back Up Database.' The program will prompt you to choose a backup location and file name.
Automatic Backup
For users who need automatic backup, Windows includes a tool for backing up the specified data on a user-defined schedule. Type 'Backup and Restore' into the 'Start' menu search to open this feature in Windows 7 or Vista. In XP, click the 'Start' menu and navigate to the 'Accessories/System Tools' folder, then click on 'Backup.'
Other Options
Third-party backup programs also work with Access 2007 database files, and may offer additional options, such as online storage. Some computer manufacturers include backup software with new systems, such as the HP Backup and Recovery Manager or Dell DataSafe.
In Feburary 2016 14,
Friday, 12 February 2016
How to Put a Java Application Into a Web PageIn Feburary 2016 12,
In Feburary 2016 12,
Use the Java Development Kit to create an applet class. An applet class is similar to a normal Java class, but it extends from a parent class called the 'java.applet.Applet' class. This will provide the applet class with additional mechanisms to communicate with Web browsers and interact with Web users. Alternatively, extend the applet from a parent class called the 'javax.swing.JApplet' class if you wish to construct the graphical user interface of the application using Swing components.
Deploy the applet class. Compile the applet class and package along with the necessary resources as a JAR file. The JAR file is a combination of the compiled class file and all its related resources into a stand-alone compressed file. Using a JAR file provides the benefits of security, efficiency, versioning and portability and is recommended by Oracle as a method of deploying Java applications on a Web page.
Create a JNLP file descriptor. JNLP stands for Java Network Launch Protocol and specifies how an applet can be run in the Web page by the Web browser.
Create the Web page to contain the applet. Add a script in the Web page to call the Deployment toolkit. This specifies which applet to run, the width and height of the applet on the Web page and the associated JNLP file. The following is an example of the script call in the Web page:
....<script src='http://www.java.com/js/deployJava.js'></script><script>var attributes = { code:'components.DynamicTreeApplet', width:300, height:300} ;var parameters = {jnlp_href: 'dynamictree-applet.jnlp'} ;deployJava.runApplet(attributes, parameters, '1.6');</script>....
Test the applet to ensure that it displays successfully in a Web page. Place the JAR, JNLP and Web page files in the same folder. Display the Web page using a Web browser that already has the appropriate Java plug-in installed. Programmers can also check the Java Console messages for debugging and error reporting purposes.
In Feburary 2016 12,
Use the Java Development Kit to create an applet class. An applet class is similar to a normal Java class, but it extends from a parent class called the 'java.applet.Applet' class. This will provide the applet class with additional mechanisms to communicate with Web browsers and interact with Web users. Alternatively, extend the applet from a parent class called the 'javax.swing.JApplet' class if you wish to construct the graphical user interface of the application using Swing components.
Deploy the applet class. Compile the applet class and package along with the necessary resources as a JAR file. The JAR file is a combination of the compiled class file and all its related resources into a stand-alone compressed file. Using a JAR file provides the benefits of security, efficiency, versioning and portability and is recommended by Oracle as a method of deploying Java applications on a Web page.
Create a JNLP file descriptor. JNLP stands for Java Network Launch Protocol and specifies how an applet can be run in the Web page by the Web browser.
Create the Web page to contain the applet. Add a script in the Web page to call the Deployment toolkit. This specifies which applet to run, the width and height of the applet on the Web page and the associated JNLP file. The following is an example of the script call in the Web page:
....<script src='http://www.java.com/js/deployJava.js'></script><script>var attributes = { code:'components.DynamicTreeApplet', width:300, height:300} ;var parameters = {jnlp_href: 'dynamictree-applet.jnlp'} ;deployJava.runApplet(attributes, parameters, '1.6');</script>....
Test the applet to ensure that it displays successfully in a Web page. Place the JAR, JNLP and Web page files in the same folder. Display the Web page using a Web browser that already has the appropriate Java plug-in installed. Programmers can also check the Java Console messages for debugging and error reporting purposes.
In Feburary 2016 12,
Thursday, 11 February 2016
How to Create Bulk Emails in CPanelIn Feburary 2016 11,
In Feburary 2016 11,
Log in to the cPanel for your site or blog.
Locate and click on the 'Fantastico Deluxe' icon. The Fantastico window appears, displaying organized script options on the left and domains requiring upgrades on the right.
Click on 'PHPList' under 'Mailing Lists,' then click on 'New Installation.'
Select which domain to send bulk emails from under the drop down menu below 'Installation Location' and type in a name for 'Install in Directory.'
Enter your cPanel administrator's user name and password under 'Admin Access Data.'
Set your email preferences under 'Base Configuration,' such as the number of sequential bounces, allowed lists, criteria and attachments. Select the preferred language.
Create a POP account to use exclusively with PHPList. Enter an email account user name and password in the required fields for the POP/SMTP server connected to your site.
Select the method of processing your message queue. 'Manual' is preferable for mailing lists of 1,000 subscribers and under, and 'Cron' is preferable for mailing lists larger than 1000. Cron will run in the background automatically. If you select Cron, set the frequency of the background Cron jobs from the drop down menu.
Click 'Install PHPList,' then click 'Finish Installation.'
Enter an email address in the 'Send Email' box to create a record of the PHPList user name, password and URL location information provided.
Go to the site's new PHPList administrator web address and log in.
Import emails into PHPList by clicking on 'Import' under 'List and User Functions.' Select one of the four methods to use to import an email list and follow the directions for that method.
Create and send a bulk email message by clicking on 'Send' under 'Message Functions.' Enter the subject and content of the message under the 'Content' tab. Add attachments through the 'Attachment' tab and schedule the date and time for the email release under the 'Scheduling' tab.
Select the list of email addresses to send the bulk email to and then click 'Send a Message to the Selected Mailing Lists.'
In Feburary 2016 11,
Log in to the cPanel for your site or blog.
Locate and click on the 'Fantastico Deluxe' icon. The Fantastico window appears, displaying organized script options on the left and domains requiring upgrades on the right.
Click on 'PHPList' under 'Mailing Lists,' then click on 'New Installation.'
Select which domain to send bulk emails from under the drop down menu below 'Installation Location' and type in a name for 'Install in Directory.'
Enter your cPanel administrator's user name and password under 'Admin Access Data.'
Set your email preferences under 'Base Configuration,' such as the number of sequential bounces, allowed lists, criteria and attachments. Select the preferred language.
Create a POP account to use exclusively with PHPList. Enter an email account user name and password in the required fields for the POP/SMTP server connected to your site.
Select the method of processing your message queue. 'Manual' is preferable for mailing lists of 1,000 subscribers and under, and 'Cron' is preferable for mailing lists larger than 1000. Cron will run in the background automatically. If you select Cron, set the frequency of the background Cron jobs from the drop down menu.
Click 'Install PHPList,' then click 'Finish Installation.'
Enter an email address in the 'Send Email' box to create a record of the PHPList user name, password and URL location information provided.
Go to the site's new PHPList administrator web address and log in.
Import emails into PHPList by clicking on 'Import' under 'List and User Functions.' Select one of the four methods to use to import an email list and follow the directions for that method.
Create and send a bulk email message by clicking on 'Send' under 'Message Functions.' Enter the subject and content of the message under the 'Content' tab. Add attachments through the 'Attachment' tab and schedule the date and time for the email release under the 'Scheduling' tab.
Select the list of email addresses to send the bulk email to and then click 'Send a Message to the Selected Mailing Lists.'
In Feburary 2016 11,
Wednesday, 3 February 2016
The Advantages Disadvantages of Proprietary OpenIn Feburary 2016 03,
In Feburary 2016 03,
Open-source database systems such as MySQL provide access to their source code. This means that anyone can see and edit the source code as well as using it in its compiled executable form. Proprietary databases tend to be closed source, so when you purchase a proprietary database system, for example Oracle or Microsoft Access, you are effectively purchasing the right to use the software rather than the software itself. Although the ability to access the source code used in a database system may not matter to the end user in many cases, it can affect the quality of the code because the open-source communities are able to report and in some cases fix bugs. Because an open-source database can be edited, organizations can alter it to suit their own particular needs.
Releases
Open-source systems tend to be updated more regularly than proprietary systems. This is partly because where proprietary systems are only accessed and worked on by a limited development team within the company responsible for the database product, open-source systems are worked on by an entire community, sometimes on a global scale. This means that bugs tend to be fixed faster and security issues addressed more promptly with open-source systems. Security vulnerabilities are also more visible with an open-source system than with a proprietary system, where only employees of the organization can view the code.
Costs
Proprietary database systems are charged at a commercial rate. Such rates vary for different types of account and usage. In most cases, an organization must purchase a license for each computer or account they plan on using the database system on. With an open-source database system, there is typically no cost and no restriction on the number of computers or users the database may be installed on or accessed by. The costs associated with proprietary database systems vary significantly for different system variants and account types. In some cases, the costs are so great that only large organizations can consider the database an option.
Support
Support is one of the few aspects sometimes considered an advantage with certain proprietary systems. With open-source database systems, support is usually not sourced from a single location or organization, but is sourced from the community as a whole. With a proprietary database system, customers can purchase a license with some level of support included. In such cases the customer can be more assured that the support they require will be made available to them on agreed terms, where the support with an open-source system may be less predictable.
In Feburary 2016 03,
Open-source database systems such as MySQL provide access to their source code. This means that anyone can see and edit the source code as well as using it in its compiled executable form. Proprietary databases tend to be closed source, so when you purchase a proprietary database system, for example Oracle or Microsoft Access, you are effectively purchasing the right to use the software rather than the software itself. Although the ability to access the source code used in a database system may not matter to the end user in many cases, it can affect the quality of the code because the open-source communities are able to report and in some cases fix bugs. Because an open-source database can be edited, organizations can alter it to suit their own particular needs.
Releases
Open-source systems tend to be updated more regularly than proprietary systems. This is partly because where proprietary systems are only accessed and worked on by a limited development team within the company responsible for the database product, open-source systems are worked on by an entire community, sometimes on a global scale. This means that bugs tend to be fixed faster and security issues addressed more promptly with open-source systems. Security vulnerabilities are also more visible with an open-source system than with a proprietary system, where only employees of the organization can view the code.
Costs
Proprietary database systems are charged at a commercial rate. Such rates vary for different types of account and usage. In most cases, an organization must purchase a license for each computer or account they plan on using the database system on. With an open-source database system, there is typically no cost and no restriction on the number of computers or users the database may be installed on or accessed by. The costs associated with proprietary database systems vary significantly for different system variants and account types. In some cases, the costs are so great that only large organizations can consider the database an option.
Support
Support is one of the few aspects sometimes considered an advantage with certain proprietary systems. With open-source database systems, support is usually not sourced from a single location or organization, but is sourced from the community as a whole. With a proprietary database system, customers can purchase a license with some level of support included. In such cases the customer can be more assured that the support they require will be made available to them on agreed terms, where the support with an open-source system may be less predictable.
In Feburary 2016 03,
How to Automate FTP TransfersIn Feburary 2016 03,
In Feburary 2016 03,
Click 'Start,' type 'notepad' and press 'Enter.' You will write your batch script here.
Type the following code, as an example, to create an automatic upload script:@echo offecho user USER > ftpcmd.datecho PASSWORD>> ftpcmd.datecho bin>> ftpcmd.datecho put %1>> ftpcmd.datecho quit>> ftpcmd.datftp -n -s:ftpcmd.dat FTPSITE.COMdel ftpcmd.dat
Replace 'USER,' 'PASSWORD' and 'FTPSITE' with the relevant FTP server details you have. If you want to create an automation script that uploads to multiple servers then repeat the code, minus the '@echo off', directly below the existing script.
Click 'File,' then 'Save As.' Browse to the Windows directory. Click the 'File type' menu and choose 'All Files.' Title the file 'upload.bat' and click 'Save.'
Click 'Start,' then type 'cmd' and press 'Enter.' Type 'upload file.txt' and replace 'file.txt' with the location of, and the file name of, the file you wish to upload. This will now be uploaded to the FTP server.
In Feburary 2016 03,
Click 'Start,' type 'notepad' and press 'Enter.' You will write your batch script here.
Type the following code, as an example, to create an automatic upload script:@echo offecho user USER > ftpcmd.datecho PASSWORD>> ftpcmd.datecho bin>> ftpcmd.datecho put %1>> ftpcmd.datecho quit>> ftpcmd.datftp -n -s:ftpcmd.dat FTPSITE.COMdel ftpcmd.dat
Replace 'USER,' 'PASSWORD' and 'FTPSITE' with the relevant FTP server details you have. If you want to create an automation script that uploads to multiple servers then repeat the code, minus the '@echo off', directly below the existing script.
Click 'File,' then 'Save As.' Browse to the Windows directory. Click the 'File type' menu and choose 'All Files.' Title the file 'upload.bat' and click 'Save.'
Click 'Start,' then type 'cmd' and press 'Enter.' Type 'upload file.txt' and replace 'file.txt' with the location of, and the file name of, the file you wish to upload. This will now be uploaded to the FTP server.
In Feburary 2016 03,
Tuesday, 2 February 2016
How to Connect to the MySQL ServerIn Feburary 2016 02,
In Feburary 2016 02,
Connect to a MySQL server running on localhost. The MySQL command-line client's default behavior is to connect to a server running on localhost. This will connect to the server on localhost as the root user with no password. Example:
mysql -u root
Connect to a MySQL server using a password by adding the -p switch. This will connect to localhost as root and prompt you for a password. Example:
mysql -u root -p
Connect to a remote host using the -h switch. A remote host is any server other than localhost. Using the -h switch will connect to a MySQL server running on example.com as root and prompting for a password. Example:
mysql -u root -p -h example.com
Connect to a remote host running on a non-default port, using the -P switch. Note that this command uses a capital P. It should not be confused with the lowercase -p switch, which means prompt for a password. Using the -P switch will connect, as the root user, to a MySQL server running on example.com port 3330 and prompt for a password. Example:
mysql -u root -p -h example.com -P 3330
Connect to a server and use a database. Specify the database to use on the command-line in place of connecting and manually issuing a USE command. It's faster and makes automated scripts work better. Simply add the name of the database onto the end of the MySQL client command-line. This example connects to the database as root and uses the customers database. Example:
mysql -u root -p -h example.com -P 3330 customers
In Feburary 2016 02,
Connect to a MySQL server running on localhost. The MySQL command-line client's default behavior is to connect to a server running on localhost. This will connect to the server on localhost as the root user with no password. Example:
mysql -u root
Connect to a MySQL server using a password by adding the -p switch. This will connect to localhost as root and prompt you for a password. Example:
mysql -u root -p
Connect to a remote host using the -h switch. A remote host is any server other than localhost. Using the -h switch will connect to a MySQL server running on example.com as root and prompting for a password. Example:
mysql -u root -p -h example.com
Connect to a remote host running on a non-default port, using the -P switch. Note that this command uses a capital P. It should not be confused with the lowercase -p switch, which means prompt for a password. Using the -P switch will connect, as the root user, to a MySQL server running on example.com port 3330 and prompt for a password. Example:
mysql -u root -p -h example.com -P 3330
Connect to a server and use a database. Specify the database to use on the command-line in place of connecting and manually issuing a USE command. It's faster and makes automated scripts work better. Simply add the name of the database onto the end of the MySQL client command-line. This example connects to the database as root and uses the customers database. Example:
mysql -u root -p -h example.com -P 3330 customers
In Feburary 2016 02,
Subscribe to:
Comments (Atom)