


Illustrated tutorial on Phpmyadmin installation and configuration method_PHP tutorial
Phpmyadmin is a WEB database management tool used by most PHP mysql developers now. The installation and configuration method of Phpmyadmin is also very simple. Below I will introduce you to the diagram of the Phpmyadmin installation and configuration method. Friends who need to know more can refer to it. .
Analysis
Find the /libraries/config.default.php file (the old version is the config.inc.php file in the root directory) and edit it with WordPad (do not use Notepad, this is UTF8 encoding).
4. Find $cfg['PmaAbsoluteUri']
Change it to the URL of phpMyAdmin that you will upload to the space
For example: $cfg['PmaAbsoluteUri'] = ‘http://www.xxx.com/phpmyadmin/’;
5. Find $cfg['Servers'][$i]['host'] = 'localhost'; (usually the default is used, there are exceptions, and no modification is required)
6. Find $cfg['Servers'][$i]['auth_type'] = ‘config’;
Use config for debugging on your own machine; if you use cookies in the Internet space, since we have added the URL before, we will change it to cookies. It is recommended to use cookies here.
7. Search for $cfg['Servers'][$i]['user'] = 'root'; // MySQL user (user name, usually just fill in a few letters here; in special cases, you can enter it in your own machine Use root, which is usually your ftp username on the Internet. The virtual host provider will tell you, generally do not change it.)
8. Find $cfg['Servers'][$i]['password'] = ”; // MySQL password (only needed, just leave it blank)
9. Find $cfg['Servers'][$i]['only_db'] = ”; // If set to a db-name, only (If you only have one data, set it to your database name; if If you want to set up a server, it is recommended to leave it blank)
10. Search $cfg['DefaultLang'] = ‘zh’; (Here is the language selection, zh means Simplified Chinese)
11. To find $cfg['blowfish_secret'], please set the cookie of your website in the equal sign of $cfg['blowfish_secret'] = ' '; (the cookie is the domain name used to access phpmyadmin), for example: $cfg['blowfish_secret '] = 'www.xinnethz.net';.
How to solve the problem that the additional features of phpmyadmin's linked table have not been activated?
Going back to the picture above, we see that although the phpmyadmin configuration is complete and can be used, there is still a prompt at the bottom that some configuration work has not been completed. One of the prompts: The additional features of the linked table have not been activated, so how to solve it?
First, click the import link, upload scripts/create_tables.sql and execute it to create the phpmyadmin database.
Secondly, find
in the phpmyadmin configuration file config.default.phpThe code is as follows | Copy code | ||||||||
$cfg['Servers'][$i]['pmadb'] = 'phpmyadmin'; $cfg['Servers'][$i]['bookmarktable'] = 'pma_bookmark'; $cfg['Servers'][$i]['relation'] = 'pma_relation'; $cfg['Servers'][$i]['table_info'] = 'pma_table_info';
|
The code is as follows | Copy code |
$cfg['blowfish_secret'] = 'leapsoul.cn' ?> |
Here I assign the value to leapsoul.cn, this password is used to encrypt Cookies
phpmyadmin login method instructions
In phpmyadmin3, there are a total of four login methods
Config: Just enter the phpmyadmin remote login address directly. Just set the username and password in the configuration file.
http: A dialog box will pop up, enter your username and password and enter
Signon: A login method similar to page jump. At the same time, $cfg['Servers'][$i]['SignonURL'] needs to be set. When you enter the remote login address of phpmyadmin, it will automatically jump to signonURL. URL set.
Cookie: This is the login method when phpmyadmin is configured.
At this point, the entire installation and configuration of phpmyadmin3 is completed. You can experience the new features of the new version of phpmyadmin

In PHP, trait is suitable for situations where method reuse is required but not suitable for inheritance. 1) Trait allows multiplexing methods in classes to avoid multiple inheritance complexity. 2) When using trait, you need to pay attention to method conflicts, which can be resolved through the alternative and as keywords. 3) Overuse of trait should be avoided and its single responsibility should be maintained to optimize performance and improve code maintainability.

Dependency Injection Container (DIC) is a tool that manages and provides object dependencies for use in PHP projects. The main benefits of DIC include: 1. Decoupling, making components independent, and the code is easy to maintain and test; 2. Flexibility, easy to replace or modify dependencies; 3. Testability, convenient for injecting mock objects for unit testing.

SplFixedArray is a fixed-size array in PHP, suitable for scenarios where high performance and low memory usage are required. 1) It needs to specify the size when creating to avoid the overhead caused by dynamic adjustment. 2) Based on C language array, directly operates memory and fast access speed. 3) Suitable for large-scale data processing and memory-sensitive environments, but it needs to be used with caution because its size is fixed.

PHP handles file uploads through the $\_FILES variable. The methods to ensure security include: 1. Check upload errors, 2. Verify file type and size, 3. Prevent file overwriting, 4. Move files to a permanent storage location.

In JavaScript, you can use NullCoalescingOperator(??) and NullCoalescingAssignmentOperator(??=). 1.??Returns the first non-null or non-undefined operand. 2.??= Assign the variable to the value of the right operand, but only if the variable is null or undefined. These operators simplify code logic, improve readability and performance.

CSP is important because it can prevent XSS attacks and limit resource loading, improving website security. 1.CSP is part of HTTP response headers, limiting malicious behavior through strict policies. 2. The basic usage is to only allow loading resources from the same origin. 3. Advanced usage can set more fine-grained strategies, such as allowing specific domain names to load scripts and styles. 4. Use Content-Security-Policy-Report-Only header to debug and optimize CSP policies.

HTTP request methods include GET, POST, PUT and DELETE, which are used to obtain, submit, update and delete resources respectively. 1. The GET method is used to obtain resources and is suitable for read operations. 2. The POST method is used to submit data and is often used to create new resources. 3. The PUT method is used to update resources and is suitable for complete updates. 4. The DELETE method is used to delete resources and is suitable for deletion operations.

HTTPS is a protocol that adds a security layer on the basis of HTTP, which mainly protects user privacy and data security through encrypted data. Its working principles include TLS handshake, certificate verification and encrypted communication. When implementing HTTPS, you need to pay attention to certificate management, performance impact and mixed content issues.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Zend Studio 13.0.1
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 Chinese version
Chinese version, very easy to use