The initial set of articles will be oriented towards my new book PHP 8 Programming Tips, Tricks and Best Practices.
|A question on everyone's mind is: how did they get my email address in the first place? This articles explores how email addresses are commonly acquired and what you can do to prevent this.|
|Phishing is a favorite vehicle for attackers to gain access to your system. A lot has been written on this subject, but it's important enough to merit yet another article, this time based upon actual messages received.|
|The PHP ctype_* family of functions is widely used for form data validation. What most developers don't realize is that ctype_digit() holds a hidden trap that can result in false positives. In this article we explore this dirty little secret.|