Welcome to Maxi‑Pedia. We are dedicated to providing expert and practical knowledge, and answers to your intriguing questions. Maxi‑Pedia: Your trusted resource for finance and IT!



Allow shared folders to be published

Allow shared folders to be published is a policy related to allowing network users to share resources on your network. If Allow shared folders to be published is enabled or not configured at all, your users will be able to make their shared folders available to other users across your network through Active Directory. The Allow shared folders to be published group policy is a setting that can help a lot with the management of your corporate shared resources.

.


Allow DFS roots to be published

Allow DFS roots to be published is a Microsoft Windows setting; it is a group policy setting which determines whether your network users can publish so-called DFS roots in Active Directory. The Allow DFS roots to be published policy is important not only as a security measure but also from the file management strategy perspective. Allow DFS roots to be published is a setting that can help a lot with the administration of your corporate shared drives.

.


Prevent email address harvesting (part 2)

How to prevent email address harvesting is something that web masters often ask when figuring out how to block email address harvesting programs and robots from harvesting or stealing email addresses from their or their client's websites. The How to prevent email address harvesting question can be answered with a few programming tips. Successful implementation of these tips can help significantly in improving your web site content security.

.


How to protect web pages from email harvesting

How to protect web pages from email harvesting is the question that every webmaster should ask. While the very original techniques for building web sites were sufficient in the early stages of internet, they open door to hackers and spammers today. How your web pages are coded and designed plays a very important role in your web security. So, how can we protect web pages from email harvesting?

.


PHP loop through string

PHP loop through string - If you made it to this page, you probably want to know how to loop through a string in PHP and evaluate its every character. Let's say you have a string $string = "abcde", and you want to evaluate its every character and perhaps replace it with something. Looping through strings is very easy in PHP.

.


Order allow,deny

Order allow,deny is a setting in your Apache web server configuration that is used to restrict access to certain directories (folders) or even globally. Configuring who can access your directories is very important for your web site security. Order allow,deny is one way to restrict who can see what.

.


IndexIgnore

IndexIgnore is an important security setting in your Apache configuration files which commands what gets displayed to the visitor coming to your website. IndexIgnore is a simple setting which is often forgotten or neglected. Not having IndexIgnore set properly can have negative consequences and compromise your website server security.

.


PHP display array content

How to display PHP array content is something that every developer asks sooner or later when playing and working with arrays in PHP. Displaying content of array in PHP is not so complicated for simple arrays, let's say for a single-dimensional array, but it can get nasty for multi-dimensional arrays. So, how to display content of a multi-dimensional PHP array?

.


How to check if string contains substring PHP

Once in a while we need to check whether a string contains substring, some other string or characters or a value. Checking for existence of a string (or substring) inside another string is easier than it might seem. The following article describes how to check for whether a string contains string in PHP, or simply said how to find string within string in PHP.

.


Difference between symbolic link and hard link

What is the difference between symbolic link and hard link? Explaining the difference between a symbolic link or a symlink and a hard link is easy and vital to knowing about how Linux/Unix environments work. Understanding the difference between a symbolic link and a hard link is also important for web server maintenance and understanding how modern websites work.

.
.