How to handle video without lag in php: 1. Set whether to allow file upload via http; 2. Set the maximum execution time of the script; 3. Set the maximum amount of memory that the script can allocate; 4. Set the allowed file upload The maximum size; 5. Set the post mode to accept the maximum size, etc.
#The operating environment of this article: Windows7 system, PHP7.1, Dell G3.
How does php handle videos without buffering? How to slice and process large video files in PHP
PHP uses the super global variable array $_FILES to record file upload related information.
1.file_uploads=on/off
Whether to allow file upload via http
2.max_execution_time=30
The maximum script execution time allowed, exceeding An error will be reported at this time
3.memory_limit=50M
Set the maximum amount of memory that the script can allocate to prevent runaway scripts from occupying too much memory. This instruction is only set during compilation
It only takes effect when the --enable-memory-limit flag is set
4.upload_max_filesize=20M
The maximum size of files allowed to be uploaded. This command must be less than post_max_size
5.upload_tmp_dir
Temporary storage directory for uploaded files
6.post_max_size=30M
Allow post mode to accept the maximum size
$_FILES['myFile ']['name'] The original name of the client's last file.
$_FILES['myFile']['type'] The MIME type of the file, which requires the browser to provide support for this information, such as "image/gif".
$_FILES['myFile']['size'] The size of the uploaded file, in bytes.
$_FILES['myFile']['tmp_name'] The temporary file name stored on the server after the file is uploaded, usually the system default. It can be specified in upload_tmp_dir in php.ini, but setting it with the putenv() function has no effect.
$_FILES['myFile']['error'] Status code related to the file upload. ['error'] was added in PHP 4.2.0. The following is its description: (They became constants after PHP3.0)
UPLOAD_ERR_OK
Value: 0; No error occurred and the file was uploaded successfully.
UPLOAD_ERR_INI_SIZE
Value: 1; The uploaded file exceeds the limit of the upload_max_filesize option in php.ini.
UPLOAD_ERR_FORM_SIZE
Value: 2; The size of the uploaded file exceeds the value specified by the MAX_FILE_SIZE option in the HTML form.
UPLOAD_ERR_PARTIAL
Value: 3; Only part of the file was uploaded.
UPLOAD_ERR_NO_FILE
Value: 4; No file was uploaded.
Value: 5; The uploaded file size is 0.
After the file is uploaded, it is stored in the temporary directory by default. At this time, you must delete it from the temporary directory or Move it somewhere else, or if it doesn't exist, it will be deleted.
That is, regardless of whether the upload is successful or not, the files in the temporary directory will definitely be deleted after the script is executed.
Attachment: How to modify the size limit of PHP upload files
1. General file upload, unless the file is very small. Like a 5M file, it may take more than a minute to upload. .
But in PHP, the default maximum execution time of the page is 30 seconds. That is to say, if it exceeds 30 seconds, the script will stop executing.
This results in the inability to open the web page. Situation. At this time we can modify max_execution_time
Look in php.ini
max_execution_time
The default is 30 seconds. Change it to
max_execution_time = 0
0 means no limit
2. Modify post_max_size to set the maximum size allowed for POST data. This setting also affects file uploads.
The default post_max_size of php is 2M. If the POST data size is greater than post_max_size, $_POST and $_FILES superglobals will be empty.
Look for post_max_size. Change to
post_max_size = 150M
3. Many people will change the second step. But when uploading files, the maximum size is still 8M.
Why. We also need to change a parameter upload_max_filesize to indicate the maximum size of the uploaded file. .
Look for upload_max_filesize, the default is 8M and change it to
upload_max_filesize = 100M
In addition, it should be noted that post_max_size is better than upload_max_filesize.
Recommended learning: "PHP Video Tutorial"
The above is the detailed content of How to deal with video lag in php. For more information, please follow other related articles on the PHP Chinese website!

The article compares ACID and BASE database models, detailing their characteristics and appropriate use cases. ACID prioritizes data integrity and consistency, suitable for financial and e-commerce applications, while BASE focuses on availability and

The article discusses securing PHP file uploads to prevent vulnerabilities like code injection. It focuses on file type validation, secure storage, and error handling to enhance application security.

Article discusses best practices for PHP input validation to enhance security, focusing on techniques like using built-in functions, whitelist approach, and server-side validation.

The article discusses strategies for implementing API rate limiting in PHP, including algorithms like Token Bucket and Leaky Bucket, and using libraries like symfony/rate-limiter. It also covers monitoring, dynamically adjusting rate limits, and hand

The article discusses the benefits of using password_hash and password_verify in PHP for securing passwords. The main argument is that these functions enhance password protection through automatic salt generation, strong hashing algorithms, and secur

The article discusses OWASP Top 10 vulnerabilities in PHP and mitigation strategies. Key issues include injection, broken authentication, and XSS, with recommended tools for monitoring and securing PHP applications.

The article discusses strategies to prevent XSS attacks in PHP, focusing on input sanitization, output encoding, and using security-enhancing libraries and frameworks.

The article discusses the use of interfaces and abstract classes in PHP, focusing on when to use each. Interfaces define a contract without implementation, suitable for unrelated classes and multiple inheritance. Abstract classes provide common funct


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.